Sherman S. M. Chow
Sherman S. M. Chow
Department of Information Engineering, The Chinese University of Hong Kong
Verified email at
Cited by
Cited by
Privacy-Preserving Public Auditing for Secure Cloud Storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375, 2013
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
M Chase, SSM Chow
Proceedings of the 16th ACM Conference on Computer and Communications …, 2009
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems 25 (2), 468-477, 2014
Efficient Unidirectional Proxy Re-Encryption
SSM Chow, J Weng, Y Yang, R Deng
Progress in Cryptology–AFRICACRYPT 2010, 316-332, 2010
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
SSM Chow, SM Yiu, LCK Hui, KP Chow
Information Security and Cryptology-ICISC 2003, 352-369, 2004
Constant-Size Dynamic k-Times Anonymous Authentication
MH Au, W Susilo, Y Mu, SSM Chow
IEEE Systems Journal 7 (2), 249-261, 2013
Storing Shared Data on the Cloud via Security-Mediator
B Wang, SSM Chow, M Li, H Li
International Conference on Distributed Computing Systems (ICDCS), 124-133, 2013
Optimal Sybil-Resilient Node Admission Control
N Tran, J Li, L Subramanian, SSM Chow
INFOCOM, 2011 Proceedings IEEE, 3218-3226, 2011
Efficient Identity Based Ring Signature
SSM Chow, SM Yiu, L Hui
Applied Cryptography and Network Security, 277-291, 2005
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment
SSM Chow, YJ He, L Hui, SM Yiu
Applied Cryptography and Network Security, 526-543, 2012
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
SSM Chow, Y Dodis, Y Rouselakis, B Waters
Proceedings of the 17th ACM Conference on Computer and Communications …, 2010
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
SSM Chow, LCK Hui, SM Yiu, KP Chow
Australasian Conference on Information Security and Privacy, 355-411, 2005
Conditional Proxy Broadcast Re-Encryption
CK Chu, J Weng, SSM Chow, J Zhou, R Deng
Australasian Conference on Information Security and Privacy, 327-342, 2009
Dynamic Secure Cloud Storage with Provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Festschrift Jean-Jacques Quisquater, 442-464, 2011
Removing Escrow from Identity-Based Encryption
SSM Chow
Public Key Cryptography–PKC 2009, 256-276, 2009
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
T Yuen, SSM Chow, Y Zhang, S Yiu
Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012
Security-Mediated Certificateless Cryptography
SSM Chow, C Boyd, J Nieto
Public Key Cryptography-PKC 2006, 508-524, 2006
Cloud-assisted Mobile-access of Health Data with Privacy and Auditability
Y Tong, J Sun, SSM Chow, P Li
IEEE Journal of Biomedical and Health Informatics 18 (2), 419-429, 2014
Ring Signatures Without Random Oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, Computer and …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20