Sherman S. M. Chow
Sherman S. M. Chow
Department of Information Engineering, The Chinese University of Hong Kong
Verified email at ie.cuhk.edu.hk
TitleCited byYear
Privacy-Preserving Public Auditing for Secure Cloud Storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375, 2013
3419*2013
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
8702009
Efficient Unidirectional Proxy Re-Encryption
SSM Chow, J Weng, Y Yang, R Deng
Progress in Cryptology–AFRICACRYPT 2010, 316-332, 2010
3762010
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems, 2014
3512014
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
SSM Chow, SM Yiu, LCK Hui, KP Chow
Information Security and Cryptology-ICISC 2003, 352-369, 2004
2572004
Constant-Size Dynamic k-Times Anonymous Authentication
MH Au, W Susilo, Y Mu, SSM Chow
IEEE Systems Journal 7 (2), 249-261, 2013
229*2013
Optimal Sybil-resilient node admission control
N Tran, J Li, L Subramanian, SSM Chow
INFOCOM, 2011 Proceedings IEEE, 3218-3226, 2011
1952011
Storing Shared Data on the Cloud via Security-Mediator
B Wang, SSM Chow, M Li, H Li
International Conference on Distributed Computing Systems (ICDCS), 2013
1932013
Efficient Identity Based Ring Signature
SSM Chow, SM Yiu, L Hui
Applied Cryptography and Network Security, 277-291, 2005
1892005
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment
SSM Chow, YJ He, L Hui, SM Yiu
Applied Cryptography and Network Security, 526-543, 2012
1812012
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
SSM Chow, Y Dodis, Y Rouselakis, B Waters
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1722010
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
SSM Chow, LCK Hui, SM Yiu, KP Chow
Australasian Conference on Information Security and Privacy, 355-411, 2005
1562005
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1472011
Conditional Proxy Broadcast Re-Encryption
CK Chu, J Weng, SSM Chow, J Zhou, R Deng
Australasian Conference on Information Security and Privacy, 327-342, 2009
1302009
Dynamic Secure Cloud Storage with Provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Festschrift Jean-Jacques Quisquater, 442-464, 2011
1232011
Removing Escrow from Identity-Based Encryption
SSM Chow
Public Key Cryptography–PKC 2009, 256-276, 2009
1192009
Identity Based Threshold Ring Signature
SSM Chow, LCK Hui, SM Yiu
Information Security and Cryptology–ICISC 2004, 697-699, 2005
97*2005
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
T Yuen, SSM Chow, Y Zhang, S Yiu
Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012
952012
Security-Mediated Certificateless Cryptography
SSM Chow, C Boyd, J Nieto
Public Key Cryptography-PKC 2006, 508-524, 2006
942006
Ring Signatures Without Random Oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
932006
The system can't perform the operation now. Try again later.
Articles 1–20