The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Joseph K. Liu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:325-335 [Conf]
  2. Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen
    Ring signatures without random oracles. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:297-302 [Conf]
  3. Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu
    Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:290-301 [Conf]
  4. Tony K. Chan, Karyin Fung, Joseph K. Liu, Victor K. Wei
    Blind Spontaneous Anonymous Group Signatures for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2004, pp:82-94 [Conf]
  5. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Efficient Verifiable Ring Encryption for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:1-13 [Conf]
  6. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong
    Recoverable and Untraceable E-Cash. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:206-214 [Conf]
  7. Yuen-Yan Chan, Chi-Hong Leung, Joseph K. Liu
    Evaluation on Security and Privacy of Web-Based Learning Systems. [Citation Graph (0, 0)][DBLP]
    ICALT, 2003, pp:308-309 [Conf]
  8. Yuen-Yan Chan, Sebastian Fleissner, Joseph K. Liu, Jin Li
    Single Sign-On and Key Establishment for Ubiquitous Smart Environments. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:406-415 [Conf]
  9. Joseph K. Liu, Duncan S. Wong
    Linkable Ring Signatures: Security Models and New Schemes. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:614-623 [Conf]
  10. Duncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei
    On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:34-46 [Conf]
  11. Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu
    Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:389-409 [Conf]
  12. Joseph K. Liu, Duncan S. Wong
    On the Security Models of (Threshold) Ring Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:204-217 [Conf]
  13. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:12-26 [Conf]
  14. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
    Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:364-378 [Conf]
  15. Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong
    Separable Linkable Threshold Ring Signatures. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:384-398 [Conf]
  16. Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen
    Certificate Based (Linkable) Ring Signature. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:79-92 [Conf]
  17. Joseph K. Liu, Duncan S. Wong
    A Restricted Multi-show Credential System and Its Application on E-Voting. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:268-279 [Conf]
  18. Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong
    ID-Based Ring Signature Scheme Secure in the Standard Model. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:1-16 [Conf]
  19. Joseph K. Liu, Willy Susilo, Duncan S. Wong
    Ring Signature with Designated Linkability. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:104-119 [Conf]
  20. Joseph K. Liu, Sandy H. Wong, Duncan S. Wong
    Transferable E-Cash Revisit. [Citation Graph (0, 0)][DBLP]
    SEC, 2005, pp:171-188 [Conf]
  21. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    Custodian-Hiding Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:51-64 [Conf]
  22. Joseph K. Liu, Duncan S. Wong
    Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. [Citation Graph (0, 0)][DBLP]
    Int. J. Found. Comput. Sci., 2006, v:17, n:6, pp:1403-1422 [Journal]
  23. Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo
    (Convertible) Undeniable Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:83-97 [Conf]

  24. Traceable and Retrievable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  25. A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack. [Citation Graph (, )][DBLP]


  26. An Efficient Identity-Based Online/Offline Encryption Scheme. [Citation Graph (, )][DBLP]


  27. Sanitizable Signatures Revisited. [Citation Graph (, )][DBLP]


  28. Practical ID-based encryption for wireless sensor network. [Citation Graph (, )][DBLP]


  29. Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. [Citation Graph (, )][DBLP]


  30. Online/Offline Ring Signature Scheme. [Citation Graph (, )][DBLP]


  31. Certificate-Based Signature Schemes without Pairings or Random Oracles. [Citation Graph (, )][DBLP]


  32. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP]


  33. Efficient Certificate-Based Encryption in the Standard Model. [Citation Graph (, )][DBLP]


  34. Certificate-based sequential aggregate signature. [Citation Graph (, )][DBLP]


Search in 0.023secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002