Sherman S. M. Chow
Sherman S. M. Chow
Department of Information Engineering, The Chinese University of Hong Kong
Verified email at
TitleCited byYear
Privacy-Preserving Public Auditing for Secure Cloud Storage
C Wang, SSM Chow, Q Wang, K Ren, W Lou
IEEE Transactions on Computers 62 (2), 362-375, 2013
Improving Privacy and Security in Multi-Authority Attribute-Based Encryption
M Chase, SSM Chow
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Efficient Unidirectional Proxy Re-Encryption
SSM Chow, J Weng, Y Yang, R Deng
Progress in Cryptology–AFRICACRYPT 2010, 316-332, 2010
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE Transactions on Parallel and Distributed Systems, 2014
Efficient Forward and Provably Secure ID-based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
SSM Chow, SM Yiu, LCK Hui, KP Chow
Information Security and Cryptology-ICISC 2003, 352-369, 2004
Constant-Size Dynamic k-Times Anonymous Authentication
MH Au, W Susilo, Y Mu, SSM Chow
IEEE Systems Journal 7 (2), 249-261, 2013
Optimal Sybil-resilient node admission control
N Tran, J Li, L Subramanian, SSM Chow
INFOCOM, 2011 Proceedings IEEE, 3218-3226, 2011
Efficient Identity Based Ring Signature
SSM Chow, SM Yiu, L Hui
Applied Cryptography and Network Security, 277-291, 2005
Storing Shared Data on the Cloud via Security-Mediator
B Wang, SSM Chow, M Li, H Li
International Conference on Distributed Computing Systems (ICDCS), 2013
Practical Leakage-Resilient Identity-Based Encryption from Simple Assumptions
SSM Chow, Y Dodis, Y Rouselakis, B Waters
Proceedings of the 17th ACM conference on Computer and communications …, 2010
SPICE–Simple Privacy-Preserving Identity-Management for Cloud Environment
SSM Chow, YJ He, L Hui, SM Yiu
Applied Cryptography and Network Security, 526-543, 2012
Two Improved Partially Blind Signature Schemes from Bilinear Pairings
SSM Chow, LCK Hui, SM Yiu, KP Chow
Australasian Conference on Information Security and Privacy, 355-411, 2005
Multi-Authority Ciphertext-Policy Attribute-Based Encryption with Accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
Conditional Proxy Broadcast Re-Encryption
CK Chu, J Weng, SSM Chow, J Zhou, R Deng
Australasian Conference on Information Security and Privacy, 327-342, 2009
Dynamic Secure Cloud Storage with Provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Festschrift Jean-Jacques Quisquater, 442-464, 2011
Removing Escrow from Identity-Based Encryption
SSM Chow
Public Key Cryptography–PKC 2009, 256-276, 2009
Identity Based Threshold Ring Signature
SSM Chow, LCK Hui, SM Yiu
Information Security and Cryptology–ICISC 2004, 697-699, 2005
Ring Signatures Without Random Oracles
SSM Chow, VK Wei, JK Liu, TH Yuen
Proceedings of the 2006 ACM Symposium on Information, computer and …, 2006
Identity-Based Encryption Resilient to Continual Auxiliary Leakage
T Yuen, SSM Chow, Y Zhang, S Yiu
Advances in Cryptology–EUROCRYPT 2012, 117-134, 2012
Security-Mediated Certificateless Cryptography
SSM Chow, C Boyd, J Nieto
Public Key Cryptography-PKC 2006, 508-524, 2006
The system can't perform the operation now. Try again later.
Articles 1–20