Duncan S. Wong
Duncan S. Wong
Associate Professor of Computer Science, City University of Hong Kong
Verified email at cityu.edu.hk
TitleCited byYear
A new implementation of the element free Galerkin method
YY Lu, T Belytschko, L Gu
Computer methods in applied mechanics and engineering 113 (3-4), 397-414, 1994
9221994
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng
International Conference on Applied Cryptography and Network Security, 293-308, 2006
3342006
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Australasian Conference on Information Security and Privacy, 325-335, 2004
3172004
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3022007
A Ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
2652013
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2342007
Key replacement attack against a generic construction of certificateless signature
BC Hu, DS Wong, Z Zhang, X Deng
Australasian Conference on Information Security and Privacy, 235-246, 2006
2302006
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2032008
Surveying the development of biometric user authentication on mobile phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2014
1442014
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
1442014
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
1422017
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1422011
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1362010
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Cryptographers’ Track at the RSA Conference, 119-131, 2010
1332010
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1312015
Certificateless signature: a new security model and an improved generic construction
BC Hu, DS Wong, Z Zhang, X Deng
Designs, Codes and Cryptography 42 (2), 109-126, 2007
1202007
Efficient and mutually authenticated key exchange for low power computing devices
DS Wong, AH Chan
International Conference on the Theory and Application of Cryptology and …, 2001
1192001
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European Symposium on Research in Computer Security, 257-272, 2014
1142014
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel
International Conference on Information Security and Cryptology, 331-350, 2012
1132012
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
1102012
The system can't perform the operation now. Try again later.
Articles 1–20