-
3
-
-
84939220113
-
-
Available
-
Google App Engine [Online]. Available http://code.google.com/appengine/, 2014.
-
(2014)
Google App Engine [Online]
-
-
-
4
-
-
84939226238
-
-
Available
-
Yahoo Pig [Online]. Available http://labs.yahoo.com/project/pig/, 2014.
-
(2014)
Yahoo Pig [Online]
-
-
-
5
-
-
84939235961
-
-
Available
-
Salesforce.com [Online]. Available http://www.salesforce.com/, 2014.
-
(2014)
Salesforce.Com [Online]
-
-
-
6
-
-
84871816306
-
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction
-
M. H. Au, J. K. Liu, W. Susilo, and T. H. Yuen, "Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction," Theor. Comput. Sci., vol. 469, pp. 1-14, 2013.
-
(2013)
Theor. Comput. Sci.
, vol.469
, pp. 1-14
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
7
-
-
84888085041
-
Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE
-
Nov. 6
-
M. H. Au, J. K. Liu, W. Susilo, and J. Zhou, "Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE," IEEE Trans. Inf. Forensics Security, vol. 8, no. 12, pp. 1909-1922, Nov. 6, 2013.
-
(2013)
IEEE Trans. Inf. Forensics Security
, vol.8
, Issue.12
, pp. 1909-1922
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Zhou, J.4
-
8
-
-
33749993205
-
Constant-size dynamic k-taa
-
M. H. Au, W. Susilo, and Y. Mu, "Constant-size dynamic k-taa," in Proc. SCN, 2006, pp. 111-125.
-
Proc. SCN, 2006
, pp. 111-125
-
-
Au, M.H.1
Susilo, W.2
Mu, Y.3
-
9
-
-
41149174785
-
Like technology from an advanced alien culture: Google apps for education at ASU
-
K. Barlow and J. Lane, "Like technology from an advanced alien culture: Google apps for education at ASU," in Proc. 35th Annu. ACM SIGUCCS Fall Conf., 2007, pp. 8-10.
-
Proc. 35th Annu. ACM SIGUCCS Fall Conf., 2007
, pp. 8-10
-
-
Barlow, K.1
Lane, J.2
-
10
-
-
0003745894
-
-
Ph.D. thesis, Israel Inst. Technol., Technion, Haifa, Israel
-
A. Beimel, "Secure schemes for secret sharing and key distribution," Ph.D. thesis, Israel Inst. Technol., Technion, Haifa, Israel, 1996.
-
(1996)
Secure Schemes for Secret Sharing and Key Distribution
-
-
Beimel, A.1
-
12
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. IEEE Symp. Security Privacy, 2007, pp. 321-334.
-
Proc. IEEE Symp. Security Privacy, 2007
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
13
-
-
35048841300
-
Efficient selective-ID secure identity-based encryption without random oracles
-
D. Boneh and X. Boyen, "Efficient selective-ID secure identity-based encryption without random oracles," in Proc. EUROCRYPT, 2004, pp. 223-238.
-
Proc. EUROCRYPT, 2004
, pp. 223-238
-
-
Boneh, D.1
Boyen, X.2
-
14
-
-
37149007674
-
Full-domain subgroup hiding and constant-size group signatures
-
T. Okamoto, and X. Wang, Eds.
-
X. Boyen and B. Waters, "Full-domain subgroup hiding and constant-size group signatures," in T. Okamoto, and X. Wang, Eds., in Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography, 2007, pp. 1-15.
-
Proc. 10th Int. Conf. Practice Theory Public-Key Cryptography, 2007
, pp. 1-15
-
-
Boyen, X.1
Waters, B.2
-
15
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya, and M. Meyerovich, "How to win the clonewars: Efficient periodic n-times anonymous authentication," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 201-210.
-
Proc. ACM Conf. Comput. Commun. Security, 2006
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
16
-
-
33845246483
-
Ring signatures without random oracles
-
S. S. Chow, J. K. Liu, V. K. Wei, and T. H. Yuen, "Ring signatures without random oracles," in Proc. ASIACCS, 2006, pp. 297-302.
-
Proc. ASIACCS, 2006
, pp. 297-302
-
-
Chow, S.S.1
Liu, J.K.2
Wei, V.K.3
Yuen, T.H.4
-
17
-
-
84957802212
-
Efficient zero-knowledge proofs of knowledge without intractability assumptions
-
R. Cramer, I. Damgaô rd, and P. D. MacKenzie, "Efficient zero-knowledge proofs of knowledge without intractability assumptions," in Proc. 3rd Int. Workshop Practice Theory Public Key Cryptography: Public Key Cryptography, 2000, pp. 354-373.
-
Proc. 3rd Int. Workshop Practice Theory Public Key Cryptography: Public Key Cryptography, 2000
, pp. 354-373
-
-
Cramer, R.1
Damgaô Rd, I.2
MacKenzie, P.D.3
-
19
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine-grained access control of encrypted data," in Proc. ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
-
Proc. ACM Conf. Comput. Commun. Security, 2006
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
20
-
-
79952523629
-
Decentralizing attribute-based encryption
-
[Online]. Available
-
A. Lewko and B. Waters. (2010). Decentralizing attribute-based encryption, Cryptology ePrint Archive, Rep. 2010/351 [Online]. Available: http://eprint.iacr.org/
-
(2010)
Cryptology ePrint Archive
-
-
Lewko, A.1
Waters, B.2
-
21
-
-
36549022482
-
Revocable ring signature
-
D. Y. W. Liu, J. K. Liu, Y. Mu, W. Susilo, and D. S. Wong, "Revocable ring signature," J. Comput. Sci. Technol., vol. 22, no. 6, pp. 785-794, 2007.
-
(2007)
J. Comput. Sci. Technol.
, vol.22
, Issue.6
, pp. 785-794
-
-
Liu, D.Y.W.1
Liu, J.K.2
Mu, Y.3
Susilo, W.4
Wong, D.S.5
-
22
-
-
84906495257
-
New insight to preserve online survey accuracy and privacy in big data era
-
J. K. Liu, M. H. Au, X. Huang, W. Susilo, J. Zhou, and Y. Yu, "New insight to preserve online survey accuracy and privacy in big data era," in Proc. 19th Eur. Symp. Res. Comput. Security, Wroclaw, Poland, Sep. 7-11, 2014, pp. 182-199.
-
Proc. 19th Eur. Symp. Res. Comput. Security, Wroclaw, Poland, Sep. 7-11, 2014
, pp. 182-199
-
-
Liu, J.K.1
Au, M.H.2
Huang, X.3
Susilo, W.4
Zhou, J.5
Yu, Y.6
-
23
-
-
84890338882
-
Linkable ring signature with unconditional anonymity
-
Jan
-
J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, "Linkable ring signature with unconditional anonymity," IEEE Trans. Knowl. Data Eng., vol. 26, no. 1, pp. 157-165, Jan. 2014.
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.1
, pp. 157-165
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
Zhou, J.4
-
24
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)
-
J. K. Liu, V. K. Wei, and D. S. Wong, "Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)," in Proc. 9th Australasian Conf. Inf. Security Privacy, 2004, pp. 325-335.
-
Proc. 9th Australasian Conf. Inf. Security Privacy, 2004
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
25
-
-
33845535348
-
Enhanced security models and a generic construction approach for linkable ring signature
-
J. K. Liu and D. S. Wong, "Enhanced security models and a generic construction approach for linkable ring signature," Int. J. Found. Comput. Sci., vol. 17, no. 6, pp. 1403-1422, 2006.
-
(2006)
Int. J. Found. Comput. Sci.
, vol.17
, Issue.6
, pp. 1403-1422
-
-
Liu, J.K.1
Wong, D.S.2
-
26
-
-
81055144575
-
Forward secure ring signature without random oracles
-
J. K. Liu, T. H. Yuen, and J. Zhou, "Forward secure ring signature without random oracles," in Proc. 13th Int. Conf. Inf. Commun. Security, 2011, pp. 1-14.
-
Proc. 13th Int. Conf. Inf. Commun. Security, 2011
, pp. 1-14
-
-
Liu, J.K.1
Yuen, T.H.2
Zhou, J.3
-
27
-
-
79951783454
-
Attribute-based signatures
-
H. K. Maji, M. Prabhakaran, and M. Rosulek, "Attribute-based signatures," in Proc. Cryptographers' Track RSA Conf., 2011, pp. 376-392.
-
Proc. Cryptographers' Track RSA Conf., 2011
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
28
-
-
84944878354
-
-
Boca Raton, FL, USA: CRC Press
-
A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL, USA: CRC Press, 1997.
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
29
-
-
84887271407
-
Efficient dynamic k-times anonymous authentication
-
L. Nguyen, "Efficient dynamic k-times anonymous authentication," in Proc. VIETCRYPT, 2006, pp. 81-98.
-
Proc. VIETCRYPT, 2006
, pp. 81-98
-
-
Nguyen, L.1
-
32
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. ACM Conf. Comput. Commun. Security, 2007, pp. 195-203.
-
Proc. ACM Conf. Comput. Commun. Security, 2007
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
33
-
-
84946833891
-
How to leak a secret
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," in Proc. 7th Int. Conf. Theory Appl. Cryptology Inf. Security: Adv. Cryptology, 2001, pp. 552-565.
-
Proc. 7th Int. Conf. Theory Appl. Cryptology Inf. Security: Adv. Cryptology, 2001
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
35
-
-
35048839792
-
K-times anonymous authentication (extended abstract)
-
I. Teranishi, J. Furukawa, and K. Sako, "k-times anonymous authentication (extended abstract)," in Proc. ASIACRYPT, 2004, pp. 308-322.
-
Proc. ASIACRYPT, 2004
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
37
-
-
78449233611
-
A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity
-
P. P. Tsang, M. H. Au, J. K. Liu, W. Susilo, and D. S. Wong, "A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity," in Proc. ProvSec, 2010, pp. 166-183.
-
Proc. ProvSec, 2010
, pp. 166-183
-
-
Tsang, P.P.1
Au, M.H.2
Liu, J.K.3
Susilo, W.4
Wong, D.S.5
-
38
-
-
24644503853
-
Separable linkable threshold ring signatures
-
P. P. Tsang, V. K. Wei, T. K. Chan, M. H. Au, J. K. Liu, and D. S. Wong, "Separable linkable threshold ring signatures," in Proc. Int. Conf. Cryptol. India, 2004, pp. 384-398.
-
Proc. Int. Conf. Cryptol. India, 2004
, pp. 384-398
-
-
Tsang, P.P.1
Wei, V.K.2
Chan, T.K.3
Au, M.H.4
Liu, J.K.5
Wong, D.S.6
-
39
-
-
85017355493
-
Lightweight anonymous authentication with TLS and DAA for embedded mobile devices
-
C. Wachsmann, L. Chen, K. Dietrich, H. Lo€hr, A.-R. Sadeghi, and J. Winter, "Lightweight anonymous authentication with TLS and DAA for embedded mobile devices," in Proc. 13th Int. Conf. Inf. Security, 2010, pp. 84-98.
-
Proc. 13th Int. Conf. Inf. Security, 2010
, pp. 84-98
-
-
Wachsmann, C.1
Chen, L.2
Dietrich, K.3
Löhr, H.4
Sadeghi, A.-R.5
Winter, J.6
-
40
-
-
84863392301
-
HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing
-
Z. Wan, J. Liu, and R. H. Deng, "HASBE: A hierarchical attribute-based solution for flexible and scalable access control in cloud computing," IEEE Trans. Inf. Forensics Secur., vol. 7, no. 2, pp. 743-754, 2012.
-
(2012)
IEEE Trans. Inf. Forensics Secur.
, vol.7
, Issue.2
, pp. 743-754
-
-
Wan, Z.1
Liu, J.2
Deng, R.H.3
-
41
-
-
79955983400
-
Threshold ring signature without random oracles
-
T. H. Yuen, J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, "Threshold ring signature without random oracles," in Proc. 6th ACM Symp. Inf., Comput. Commun. Security, Hong Kong, Mar. 22-24, 2011, pp. 261-267.
-
Proc. 6th ACM Symp. Inf., Comput. Commun. Security, Hong Kong, Mar. 22-24, 2011
, pp. 261-267
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
42
-
-
84875690586
-
Efficient linkable and/or threshold ring signature without random oracles
-
T. H. Yuen, J. K. Liu, M. H. Au, W. Susilo, and J. Zhou, "Efficient linkable and/or threshold ring signature without random oracles," Comput. J., vol. 56, no. 4, pp. 407-421, 2013.
-
(2013)
Comput. J.
, vol.56
, Issue.4
, pp. 407-421
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
43
-
-
84868332239
-
Forward secure attribute-based signatures
-
T. H. Yuen, J. K. Liu, X. Huang, M. H. Au, W. Susilo, and J. Zhou, "Forward secure attribute-based signatures," in Proc. 14th Int. Conf. Inf. Commun. Security, Hong Kong, Oct. 29-31, 2012, pp. 167-177.
-
Proc. 14th Int. Conf. Inf. Commun. Security, Hong Kong, Oct. 29-31, 2012
, pp. 167-177
-
-
Yuen, T.H.1
Liu, J.K.2
Huang, X.3
Au, M.H.4
Susilo, W.5
Zhou, J.6
|