Search the dblp DataBase
Duncan S. Wong :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Bessie C. Hu , Duncan S. Wong , Zhenfeng Zhang , Xiaotie Deng Key Replacement Attack Against a Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:235-246 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:325-335 [Conf ] Guomin Yang , Duncan S. Wong , Xiaotie Deng Deposit-Case Attack Against Secure Roaming. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:417-428 [Conf ] Zhenfeng Zhang , Duncan S. Wong , Jing Xu , Dengguo Feng Certificateless Public-Key Signature: Security Model and Efficient Construction. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:293-308 [Conf ] Guomin Yang , Duncan S. Wong , Xiaotie Deng Efficient Anonymous Roaming and Its Security Analysis. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:334-349 [Conf ] Duncan S. Wong , Hector Ho Fuentes , Agnes Hui Chan The Performance Measurement of Cryptographic Primitives on Palm Devices. [Citation Graph (0, 0)][DBLP ] ACSAC, 2001, pp:92-101 [Conf ] Duncan S. Wong , Agnes Hui Chan Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:272-289 [Conf ] Jonathan Wong , Duncan S. Wong Known Session Key Attack Against a Collection of Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] Security and Management, 2005, pp:119-126 [Conf ] Xiaojian Tian , Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:34-51 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:1-13 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong Recoverable and Untraceable E-Cash. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:206-214 [Conf ] Joseph K. Liu , Duncan S. Wong Linkable Ring Signatures: Security Models and New Schemes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:614-623 [Conf ] Duncan S. Wong , Karyin Fung , Joseph K. Liu , Victor K. Wei On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:34-46 [Conf ] Guomin Yang , Duncan S. Wong , Huaxiong Wang , Xiaotie Deng Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:82-91 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong , Robert W. Zhu Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:389-409 [Conf ] Joseph K. Liu , Duncan S. Wong On the Security Models of (Threshold) Ring Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:204-217 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:12-26 [Conf ] Duncan S. Wong , Agnes Hui Chan , Feng Zhu Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:827-834 [Conf ] Patrick P. Tsang , Victor K. Wei , Tony K. Chan , Man Ho Au , Joseph K. Liu , Duncan S. Wong Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:384-398 [Conf ] Duncan S. Wong , Agnes Hui Chan , Feng Zhu More Efficient Password Authenticated Key Exchange Based on RSA. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:375-387 [Conf ] Joseph K. Liu , Duncan S. Wong A Restricted Multi-show Credential System and Its Application on E-Voting. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:268-279 [Conf ] Guomin Yang , Duncan S. Wong , Xiaotie Deng Analysis and Improvement of a Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP ] ISC, 2005, pp:218-232 [Conf ] Feng Zhu , Duncan S. Wong , Agnes Hui Chan , Robbie Ye Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:150-161 [Conf ] Man Ho Au , Joseph K. Liu , Tsz Hon Yuen , Duncan S. Wong ID-Based Ring Signature Scheme Secure in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:1-16 [Conf ] Joseph K. Liu , Willy Susilo , Duncan S. Wong Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:104-119 [Conf ] Duncan S. Wong Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2005, pp:284-288 [Conf ] Guomin Yang , Duncan S. Wong , Xiaotie Deng , Huaxiong Wang Anonymous Signature Schemes. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:347-363 [Conf ] Joseph K. Liu , Sandy H. Wong , Duncan S. Wong Transferable E-Cash Revisit. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:171-188 [Conf ] Robert W. Zhu , Guomin Yang , Duncan S. Wong An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. [Citation Graph (0, 0)][DBLP ] WINE, 2005, pp:500-509 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:51-64 [Conf ] Shoulun Long , Josef Pieprzyk , Huaxiong Wang , Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2006, v:40, n:2, pp:191-209 [Journal ] Bessie C. Hu , Duncan S. Wong , Zhenfeng Zhang , Xiaotie Deng Certificateless signature: a new security model and an improved generic construction. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:42, n:2, pp:109-126 [Journal ] Reihaneh Safavi-Naini , Huaxiong Wang , Duncan S. Wong Resilient Lkh: Secure Multicast Key Distribution Schemes. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2006, v:17, n:5, pp:1205-1222 [Journal ] Joseph K. Liu , Duncan S. Wong Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2006, v:17, n:6, pp:1403-1422 [Journal ] Duncan S. Wong An optimized authentication protocol for mobile network reconsidered. [Citation Graph (0, 0)][DBLP ] Mobile Computing and Communications Review, 2002, v:6, n:4, pp:74-76 [Journal ] Qiong Huang , Duncan S. Wong Generic Certificateless Key Encapsulation Mechanism. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:215-229 [Conf ] Xinyi Huang , Yi Mu , Willy Susilo , Duncan S. Wong , Wei Wu Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:308-322 [Conf ] Qiong Huang , Duncan S. Wong , Yiming Zhao Generic Transformation to Strongly Unforgeable Signatures. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:1-17 [Conf ] Guomin Yang , Jing Chen , Duncan S. Wong , Xiaotie Deng , Dongsheng Wang A More Natural Way to Construct Identity-Based Identification Schemes. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:307-322 [Conf ] Sherman S. M. Chow , Duncan S. Wong Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:203-219 [Conf ] Chung Ki Li , Guomin Yang , Duncan S. Wong , Xiaotie Deng , Sherman S. M. Chow An Efficient Signcryption Scheme with Key Privacy. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:78-93 [Conf ] Bessie C. Hu , Duncan S. Wong , Qiong Huang , Guomin Yang , Xiaotie Deng Time Capsule Signature: Efficient and Provably Secure Constructions. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:126-142 [Conf ] Haimin Jin , Duncan S. Wong , Yinlong Xu An Efficient Password-Only Two-Server Authenticated Key Exchange System. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:44-56 [Conf ] Dennis Y. W. Liu , Duncan S. Wong , Xinyi Huang , Guilin Wang , Qiong Huang , Yi Mu , Willy Susilo Formal Definition and Construction of Nominative Signature. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:57-68 [Conf ] Qiong Huang , Duncan S. Wong Generic Certificateless Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:278-291 [Conf ] Dennis Y. W. Liu , Shuang Chang , Duncan S. Wong , Yi Mu Nominative Signature from Ring Signature. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:396-411 [Conf ] Guilin Wang , Joonsang Baek , Duncan S. Wong , Feng Bao On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:43-60 [Conf ] Robert W. Zhu , Guomin Yang , Duncan S. Wong An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2007, v:378, n:2, pp:198-207 [Journal ] Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP ] Generic Security-Amplifying Methods of Ordinary Digital Signatures. [Citation Graph (, )][DBLP ] Ambiguous Optimistic Fair Exchange. [Citation Graph (, )][DBLP ] Efficient Non-interactive Range Proof. [Citation Graph (, )][DBLP ] Further Discussions on the Security of a Nominative Signature Scheme. [Citation Graph (, )][DBLP ] Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP ] Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. [Citation Graph (, )][DBLP ] The Design of A Rule-based and Event-driven Trust Management Framework. [Citation Graph (, )][DBLP ] TinyPairing: Computing Tate Pairing on Sensor Nodes with Higher Speed and Less Memory. [Citation Graph (, )][DBLP ] Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP ] A More Efficient Convertible Nominative Signature. [Citation Graph (, )][DBLP ] TinyPairing: A Fast and Lightweight Pairing-Based Cryptographic Library for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs