Privacy-Preserving Public Auditing for Secure Cloud Storage C Wang, SSM Chow, Q Wang, K Ren, W Lou IEEE Transactions on Computers 62 (2), 362-375, 2013 | 4786* | 2013 |
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption M Chase, SSM Chow 16th ACM Conference on Computer and Communications Security (CCS), 121-130, 2009 | 1232 | 2009 |
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng IEEE Transactions on Parallel and Distributed Systems (TPDS) 25 (2), 468-477, 2014 | 511 | 2014 |
Efficient Unidirectional Proxy Re-Encryption SSM Chow, J Weng, Y Yang, RH Deng Progress in Cryptology–AFRICACRYPT, 316-332, 2010 | 434 | 2010 |
Constant-Size Dynamic k-Times Anonymous Authentication MH Au, W Susilo, Y Mu, SSM Chow IEEE Systems Journal 7 (2), 249-261, 2013 | 418* | 2013 |
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity SSM Chow, SM Yiu, LCK Hui, KP Chow Information Security and Cryptology-ICISC 2003, 352-369, 2004 | 304 | 2004 |
Storing Shared Data on the Cloud via Security-Mediator B Wang, SSM Chow, M Li, H Li 33rd IEEE International Conference on Distributed Computing Systems (ICDCS …, 2013 | 254 | 2013 |
Efficient Identity Based Ring Signature SSM Chow, SM Yiu, LCK Hui Applied Cryptography and Network Security (ACNS), 277-291, 2005 | 254 | 2005 |
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment SSM Chow, YJ He, LCK Hui, SM Yiu Applied Cryptography and Network Security (ACNS), 526-543, 2012 | 239 | 2012 |
Optimal Sybil-Resilient Node Admission Control N Tran, J Li, L Subramanian, SSM Chow 30th IEEE Conference on Computer Communications (INFOCOM), 3218-3226, 2011 | 230 | 2011 |
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie 6th ACM Symposium on Information, Computer and Communications Security, 386-390, 2011 | 230 | 2011 |
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions SSM Chow, Y Dodis, Y Rouselakis, B Waters 17th ACM Conference on Computer and Communications Security (CCS), 152-161, 2010 | 220 | 2010 |
Two Improved Partially Blind Signature Schemes from Bilinear Pairings SSM Chow, LCK Hui, SM Yiu, KP Chow Australasian Conference on Information Security and Privacy, 355-411, 2005 | 187 | 2005 |
Conditional Proxy Broadcast Re-Encryption CK Chu, J Weng, SSM Chow, J Zhou, RH Deng Australasian Conference on Information Security and Privacy, 327-342, 2009 | 183 | 2009 |
Removing Escrow from Identity-Based Encryption SSM Chow IACR International Conference on Public Key Cryptography (PKC), 256-276, 2009 | 182* | 2009 |
Dynamic Secure Cloud Storage with Provenance SSM Chow, CK Chu, X Huang, J Zhou, RH Deng Festschrift Jean-Jacques Quisquater, 442-464, 2011 | 168 | 2011 |
Searchable Encryption over Feature-Rich Data Q Wang, M He, M Du, SSM Chow, RWF Lai, Q Zou IEEE Transactions on Dependable and Secure Computing 15 (3), 496-510, 2018 | 166 | 2018 |
Multi-Authority Fine-Grained Access Control with Accountability and Its Application in Cloud J Li, X Chen, SSM Chow, Q Huang, DS Wong, Z Liu Journal of Network and Computer Applications 112, 89-96, 2018 | 147 | 2018 |
Short Linkable Ring Signatures Revisited MH Au, SSM Chow, W Susilo, P Tsang European Public Key Infrastructure Workshop (EuroPKI), 101-115, 2006 | 146 | 2006 |
Secure Cloud Storage meets with Secure Network Coding F Chen, T Xiang, Y Yang, SSM Chow IEEE Transactions on Computers 65 (6), 1936-1948, 2015 | 141 | 2015 |