Search the dblp DataBase
Joseph K. Liu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Joseph K. Liu , Victor K. Wei , Duncan S. Wong Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:325-335 [Conf ] Sherman S. M. Chow , Victor K.-W. Wei , Joseph K. Liu , Tsz Hon Yuen Ring signatures without random oracles. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:297-302 [Conf ] Sherman S. M. Chow , Zhengjun Cao , Joseph K. Liu Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:290-301 [Conf ] Tony K. Chan , Karyin Fung , Joseph K. Liu , Victor K. Wei Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP ] ESAS, 2004, pp:82-94 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:1-13 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong Recoverable and Untraceable E-Cash. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:206-214 [Conf ] Yuen-Yan Chan , Chi-Hong Leung , Joseph K. Liu Evaluation on Security and Privacy of Web-Based Learning Systems. [Citation Graph (0, 0)][DBLP ] ICALT, 2003, pp:308-309 [Conf ] Yuen-Yan Chan , Sebastian Fleissner , Joseph K. Liu , Jin Li Single Sign-On and Key Establishment for Ubiquitous Smart Environments. [Citation Graph (0, 0)][DBLP ] ICCSA (4), 2006, pp:406-415 [Conf ] Joseph K. Liu , Duncan S. Wong Linkable Ring Signatures: Security Models and New Schemes. [Citation Graph (0, 0)][DBLP ] ICCSA (2), 2005, pp:614-623 [Conf ] Duncan S. Wong , Karyin Fung , Joseph K. Liu , Victor K. Wei On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:34-46 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong , Robert W. Zhu Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:389-409 [Conf ] Joseph K. Liu , Duncan S. Wong On the Security Models of (Threshold) Ring Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:204-217 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:12-26 [Conf ] Man Ho Au , Joseph K. Liu , Willy Susilo , Tsz Hon Yuen Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:364-378 [Conf ] Patrick P. Tsang , Victor K. Wei , Tony K. Chan , Man Ho Au , Joseph K. Liu , Duncan S. Wong Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2004, pp:384-398 [Conf ] Man Ho Au , Joseph K. Liu , Willy Susilo , Tsz Hon Yuen Certificate Based (Linkable) Ring Signature. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:79-92 [Conf ] Joseph K. Liu , Duncan S. Wong A Restricted Multi-show Credential System and Its Application on E-Voting. [Citation Graph (0, 0)][DBLP ] ISPEC, 2005, pp:268-279 [Conf ] Man Ho Au , Joseph K. Liu , Tsz Hon Yuen , Duncan S. Wong ID-Based Ring Signature Scheme Secure in the Standard Model. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:1-16 [Conf ] Joseph K. Liu , Willy Susilo , Duncan S. Wong Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:104-119 [Conf ] Joseph K. Liu , Sandy H. Wong , Duncan S. Wong Transferable E-Cash Revisit. [Citation Graph (0, 0)][DBLP ] SEC, 2005, pp:171-188 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:51-64 [Conf ] Joseph K. Liu , Duncan S. Wong Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. [Citation Graph (0, 0)][DBLP ] Int. J. Found. Comput. Sci., 2006, v:17, n:6, pp:1403-1422 [Journal ] Tsz Hon Yuen , Man Ho Au , Joseph K. Liu , Willy Susilo (Convertible) Undeniable Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:83-97 [Conf ] Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP ] A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP ] An Efficient Identity-Based Online/Offline Encryption Scheme. [Citation Graph (, )][DBLP ] Sanitizable Signatures Revisited. [Citation Graph (, )][DBLP ] Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP ] Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP ] Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP ] Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP ] Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP ] Efficient Certificate-Based Encryption in the Standard Model. [Citation Graph (, )][DBLP ] Certificate-based sequential aggregate signature. [Citation Graph (, )][DBLP ] Search in 0.023secs, Finished in 0.025secs