Server‐aided revocable attribute‐based encryption for cloud computing services
Cui, Hui, Hon Yuen, Tsz, Deng, Robert H., Wang, Guilin
Published in Concurrency and computation (25.07.2020)
Published in Concurrency and computation (25.07.2020)
Get full text
Journal Article
Improvements on an authentication scheme for vehicular sensor networks
Liu, Joseph K., Yuen, Tsz Hon, Au, Man Ho, Susilo, Willy
Published in Expert systems with applications (01.04.2014)
Published in Expert systems with applications (01.04.2014)
Get full text
Journal Article
Non-Interactive Multi-Client Searchable Encryption: Realization and Implementation
Sun, Shi-Feng, Zuo, Cong, Liu, Joseph K., Sakzad, Amin, Steinfeld, Ron, Yuen, Tsz Hon, Yuan, Xingliang, Gu, Dawu
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Published in IEEE transactions on dependable and secure computing (01.01.2022)
Get full text
Journal Article
k -Times Attribute-Based Anonymous Access Control for Cloud Computing
Tsz Hon Yuen, Liu, Joseph K., Man Ho Au, Xinyi Huang, Susilo, Willy, Jianying Zhou
Published in IEEE transactions on computers (01.09.2015)
Published in IEEE transactions on computers (01.09.2015)
Get full text
Journal Article
BlindHub: Bitcoin-Compatible Privacy-Preserving Payment Channel Hubs Supporting Variable Amounts
Qin, Xianrui, Pan, Shimin, Mirzaei, Arash, Sui, Zhimei, Ersoy, Oguzhan, Sakzad, Amin, Esgin, Muhammed F., Liu, Joseph K., Yu, Jiangshan, Yuen, Tsz Hon
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01.05.2023)
Get full text
Conference Proceeding
How to construct identity-based signatures without the key escrow problem
Yuen, Tsz Hon, Susilo, Willy, Mu, Yi
Published in International journal of information security (01.08.2010)
Published in International journal of information security (01.08.2010)
Get full text
Journal Article
ID-Based Ring Signature Scheme Secure in the Standard Model
Au, Man Ho, Liu, Joseph K., Yuen, Tsz Hon, Wong, Duncan S.
Published in Advances in Information and Computer Security (2006)
Published in Advances in Information and Computer Security (2006)
Get full text
Book Chapter
Conference Proceeding
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature
Au, Man Ho, Liu, Joseph K., Susilo, Willy, Yuen, Tsz Hon
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Book Chapter
Conference Proceeding
WebQuest Markup Language (WQML) for Sharable Inquiry-Based Learning
Fleissner, Sebastian, Chan, Yuen-Yan, Yuen, Tsz Hon, Ng, Victor
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Published in Computational Science and Its Applications - ICCSA 2006 (2006)
Get full text
Book Chapter
Conference Proceeding
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
Get full text
Book Chapter
Conference Proceeding
Escrowed Linkability of Ring Signatures and Its Applications
Chow, Sherman S. M., Susilo, Willy, Yuen, Tsz Hon
Published in Lecture notes in computer science (2006)
Published in Lecture notes in computer science (2006)
Get full text
Book Chapter
Conference Proceeding