If you made any changes in Pure these will be visible here soon.

Research Output 2001 2019

Filter
Conference Paper
2016

Towards certificate-based group encryption

Ren, Y., Luo, X., Wu, Q., Liu, J. K. & Zhang, P., 2016, Provable Security: 10th International Conference, ProvSec 2016, Nanjing, China, November 10–11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Cham, Switzerland: Springer, p. 296-305 10 p. (Lecture Notes in Computer Science ; vol. 10005 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

15 Citations (Scopus)

Trusted Boolean Search on Cloud Using Searchable Symmetric Encryption

Zuo, C., Macindoe, J., Yang, S., Steinfeld, R. & Liu, J. K., 2016, 2016 IEEE Trustcom/BigDataSE/ISPA: Tianjin, China, 23-26 August, 2016, [Proceedings]. Xiang, Y., Ren, K. & Feng, D. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 113-120 8 p. 7846936

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

While mobile encounters with clouds

Au, M. H. A., Liang, K. A., Liu, J. K. & Lu, R., 2016, Network and System Security : 10th International Conference, NSS 2016, Taipei, Taiwan, September 28–30, 2016, Proceedings. Chen, J., Piuri, V., Su, C. & Yung, M. (eds.). Cham, Switzerland: Springer, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 9955 ).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

2015
4 Citations (Scopus)

A new public remote integrity checking scheme with user privacy

Feng, Y., Mu, Y., Yang, G. & Liu, K. S., 2015, Information Security and Privacy: 20th Australian Conference (ACISP 2015). Foo, E. & Stebila, D. (eds.). Cham Switzerland: Springer, Vol. 9144. p. 377 - 394 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

9 Citations (Scopus)

Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W., 2015, ASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. Zhou, J. & Ahn, G-J. (eds.). New York NY USA: Association for Computing Machinery (ACM), p. 393 - 404 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

57 Citations (Scopus)

Extended proxy-assisted approach: Achieving revocable fine-grained encryption of cloud data

Yang, Y., Liu, K. S., Liang, K. A., Choo, K-K. R. & Zhou, J., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part II (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 146 - 166 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Fully secure ciphertext-policy attribute based encryption with security mediator

Chen, Y., Jiang, Z. L., Yiu, S. M., Liu, J. K., Au, M. H. A. & Wang, X., 2015, Information and Communications Security: 16th International Conference, ICICS 2014 Hong Kong, China, December 16–17, 2014 Revised Selected Papers. C.K. Hui, L., Qing, S. H., Shi, E. & Yiu, S. M. (eds.). Cham Switzerland: Springer, p. 274-289 16 p. (Lecture Notes in Computer Science ; vol. 8958).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Lightweight anonymous authentication for ad Hoc group: A ring signature approach

Yang, X., Wu, W., Liu, K. S. & Chen, X., 2015, 9th International Conference on Provable Security (ProvSec 2015). Au, M-H. & Miyaji, A. (eds.). Cham Switzerland: Springer, p. 215 - 226 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Message from LSNS 2015 Workshop Chairs

Wang, H. & Liu, J. K., 30 Oct 2015, Proceedings - 2015 9th International Conference on Frontier of Computer Science and Technology, FCST 2015. p. xiv 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOther

PEVTS: Privacy-preserving electric vehicles test-bedding scheme

Yang, X., Liu, J. K., Wu, W., Au, M. H. A. & Susilo, W., Dec 2015, Proceedings of the 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS 2015): 14-17 December 2015, Melbourne, Victoria, Australia. Gu, T. & Prasanna, V. K. (eds.). Piscataway, NJ: IEEE, Institute of Electrical and Electronics Engineers, p. 282-289 8 p. 7384306

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

9 Citations (Scopus)

Practical threshold password-authenticated secret sharing protocol

Yi, X., Hao, F., Chen, L. & Liu, K. S., 2015, 20th European Symposium on Research in Computer Security: Proceedings, Part I (ESORICS 2015). Pernul, G., Ryan, P. Y. A. & Weippl, E. (eds.). Cham Switzerland: Springer, p. 347 - 365 19 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2014
75 Citations (Scopus)

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Liang, K. A., Liu, J. K., Wong, D. S. & Susilo, W., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 257-272 16 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

Efficient and verifiable algorithm for secure outsourcing of large-scale linear programming

Nie, H., Chen, X., Li, J., Liu, J. & Lou, W., 2014, Proceedings - 2014 IEEE/AINA 28th International Conference on Advanced Information Networking and Applications, AINA 2014: 13-16 May 2014, University of Victoria, Victoria, Canada. Barolli, L., Fun Li, K., Enokido, T., Xhafa, F. & Takizawa, M. (eds.). Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers, p. 591-596 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

GO-ABE: group-oriented attribute-based encryption

Li, M., Huang, X., Liu, J. K. & Xu, L., 2014, Network and System Security: 8th International Conference, NSS 2014 Xi’an, China, October 15-17, 2014 Proceedings. Au, M. H., Carminati, B. & Kuo, C-C. J. (eds.). Heidelberg Germany: Springer, p. 260-270 11 p. (Lecture Notes in Computer Science; vol. 8792).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

25 Citations (Scopus)

Identity-based encryption with post-challenge auxiliary inputs for secure cloud applications and sensor networks

Yuen, T. H., Zhang, Y., Yiu, S. M. & Liu, J. K., 2014, Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 130-147 18 p. (Lecture Notes in Computer Science; vol. 8712).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

New insight to preserve online survey accuracy and privacy in big data era

Liu, J. K., Au, M. H. A., Huang, X., Susilo, W., Zhou, J. & Yu, Y., 2014, Computer Security - ESORICS 2014: 9th European Symposium on Research in Computer Security Wroclaw, Poland, September 7-11, 2014 - Proceedings, Part II. Kutylowski, M. & Vaidya, J. (eds.). Heidelberg Germany: Springer, p. 182-199 18 p. (Lecture Notes in Computer Science; vol. 8713).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)

TIMER: Secure and reliable cloud storage against data re-outsourcing

Jiang, T., Chen, X., Li, J., Wong, D. S., Ma, J. & Liu, J. K., 2014, Proceedings of the 10th International Confrerence on Information Security Practice and Experience (ISPEC 2014). Huang, X. & Zhou, J. (eds.). Heidelberg Germany: Springer, Vol. 8434. p. 346 - 358 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2013
23 Citations (Scopus)

Privacy-preserving smart metering with regional statistics and personal enquiry services

Chu, C-K., Liu, J. K., Wong, J. W., Zhao, Y. & Zhou, J., 2013, Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security (ASIA CSS 2013). Li, N. & Tzeng, W-G. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 369 - 379 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Threshold-oriented optimistic fair exchange

Wang, Y., Au, M. H. A., Liu, J. K., Yuen, T. H. & Susilo, W., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013). Lopez, J., Huang, X. & Sandhu, R. (eds.). Heidelberg Germany: Springer, Vol. 7873. p. 424 - 438 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Towards anonymous ciphertext indistinguishability with identity leakage

Yuen, T. H., Zhang, C., Chow, S. S-M. & Liu, J. K., 2013, 7th International Conference on Provable Security (ProvSec 2013). Susilo, W. & Reyhanitabar, R. (eds.). Heidelberg Germany: Springer, Vol. 8209. p. 139 - 153 15 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2012
7 Citations (Scopus)

Efficient escrow-free identity-based signature

Zhang, Y., Liu, J. K., Huang, X., Au, M. H. A. & Susilo, W., 2012, 6th International Conference on Provable Security (ProvSec 2012). Takagi, T., Qin, Z. & Yu, Y. (eds.). Heidelberg Germany: Springer, Vol. 7496. p. 161 - 174 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

20 Citations (Scopus)

Enhancing location privacy for electric vehicles (at the right time)

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2012, Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012). Foresti, S., Yung, M. & Martinelli, F. (eds.). Heidelberg Germany: Springer, Vol. 7459. p. 397 - 414 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Forward secure attribute-based signatures

Yuen, T. H., Liu, J. K., Huang, X., Au, M. H., Susilo, W. & Zhou, J., 2012, Proceedings of the 14th International Conference on Information and Communications Security (ICICS 2012). Chim, T. W. & Yuen, T. H. (eds.). Heidelberg Germany: Springer, Vol. 7618. p. 167 - 177 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

7 Citations (Scopus)

Verifier-local revocation group signatures with time-bound keys

Chu, C-K., Liu, J. K., Huang, X. & Zhou, J., 2012, Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2012). Lai, X. & Reiter, M. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 1 - 11 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2011
15 Citations (Scopus)

Forward secure ring signature without random oracles

Liu, J. K., Yuen, T. H. & Zhou, J., 2011, Proceedings of the 13th International Conference on Information and Communications Security (ICICS 2011). Qing, S., Susilo, W., Wang, G. & Liu, D. (eds.). Heidelberg Germany: Springer, Vol. 7043. p. 1 - 14 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

42 Citations (Scopus)

Identity-based online/offline key encapsulation and encryption

Chow, S. S-M., Liu, J. K. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 52 - 60 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Identity-based server-aided decryption

Liu, J. K., Chu, C-K. & Zhou, J., 2011, Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Proceedings. Springer, Vol. 6812 LNCS. p. 337-352 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6812 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

16 Citations (Scopus)

Short and efficient certificate-based signature

Liu, J. K., Bao, F. & Zhou, J., 2011, Proceedings of the Networking 2011 Workshops: Workshop on Wireless Cooperative Networks Security (WCNS 2011). Casares-Giner, V., Manzoni, P. & Pont, A. (eds.). Heidelberg Germany: Springer, Vol. 6827. p. 167 - 178 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

13 Citations (Scopus)

Threshold ring signature without random oracles

Yuen, T. H., Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2011, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011). Sandhu, R. & Wong, D. S. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 261 - 267 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2010
30 Citations (Scopus)

A suite of non-pairing ID-based threshold ring signature schemes with different levels of anonymity

Tsang, P. P., Au, M. H. A., Liu, J. K., Susilo, W. & Wong, D. S., 2010, 4th International Conference on Provable Security (ProvSec 2010). Heng, S-H. & Kurosawa, K. (eds.). Heidelberg Germany: Springer, Vol. 6402. p. 166 - 183 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

21 Citations (Scopus)

Online/offline identity-based signcryption revisited

Liu, J. K., Baek, J. & Zhou, J., 2010, Proceedings of the 6th International Conference on Information Security and Cryptology (Inscrypt 2010). Lai, X., Yung, M. & Lin, D. (eds.). Heidelberg Germany: Springer, Vol. 6584. p. 36 - 51 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

27 Citations (Scopus)

Practical ID-based encryption for wireless sensor network

Chu, C-K., Liu, J. K., Zhou, J., Bao, F. & Deng, R. H., 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communication Security (ASIACCS 2010). Basin, D. & Liu, P. (eds.). New York NY USA: Association for Computing Machinery (ACM), Vol. 1. p. 337 - 340 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

4 Citations (Scopus)

Short generic transformation to strongly unforgeable signature in the standard model

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2010, Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010). Gritzalis, D., Preneel, B. & Theoharidou, M. (eds.). Heidelberg Germany: Springer, Vol. 6345. p. 168 - 181 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2009
39 Citations (Scopus)

An efficient identity-based online/offline encryption scheme

Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 156 - 167 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

A new variant of the cramer-shoup KEM secure against chosen ciphertext attack

Baek, J., Susilo, W., Liu, J. K. & Zhou, J., 2009, Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 2009). Abdalla, M., Pointcheval, D., Fouque, P-A. & Vergnaud, D. (eds.). Heidelberg Germany: Springer, Vol. 5536. p. 143 - 155 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

8 Citations (Scopus)

Certificate-Based Sequential Aggregate Signature

Liu, J. K., Baek, J. & Zhou, J., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 21-28 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

10 Citations (Scopus)

Online/offline ring signature scheme

Liu, J. K., Au, M. H. A., Susilo, W. & Zhou, J., 2009, Proceedings of the 11th International Conference on Information and Communications Security (ICICS 2009). Qing, S., Mitchell, C. J. & Wang, G. (eds.). Heidelberg Germany: Springer, Vol. 5927. p. 80 - 90 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2008
66 Citations (Scopus)

Certificate-based signature schemes without pairings or random Oracles

Liu, J. K., Baek, J., Susilo, W. & Zhou, J., 28 Nov 2008, Information Security - 11th International Conference, ISC 2008, Proceedings. p. 285-297 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5222 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

42 Citations (Scopus)

Efficient certificate-based encryption in the standard model

Liu, J. K. & Zhou, J., 25 Sep 2008, Security and Cryptography for Networks - 6th International Conference, SCN 2008, Proceedings. p. 144-155 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5229 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

15 Citations (Scopus)

Sanitizable signatures revisited

Yuen, T. H., Susilo, W., Liu, J. K. & Mu, Y., 1 Dec 2008, Cryptology and Network Security - 7th International Conference, CANS 2008, Proceedings. p. 80-97 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5339 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

36 Citations (Scopus)

Traceable and retrievable identity-based encryption

Au, M. H., Huang, Q., Liu, J. K., Susilo, W., Wong, D. S. & Yang, G., 30 Jun 2008, Applied Cryptography and Network Security - 6th International Conference, ACNS 2008, Proceedings. p. 94-110 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5037 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

2007
15 Citations (Scopus)

(Convertible) undeniable signatures without random oracles

Yuen, T. H., Au, M. H., Liu, J. K. & Susilo, W., 1 Dec 2007, Information and Communications Security - 9th International Conference, ICICS 2007, Proceedings. p. 83-97 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4861 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

55 Citations (Scopus)

Certificate based (linkable) ring signature

Au, M. H. A., Liu, J. K., Susilo, W. & Yuen, T. H., 2007, Proceedings of the 3rd International Conference on Information Security Practice and Experience (ISPEC 2007). Dawson, E. & Wong, D. S. (eds.). Heidelberg Germany: Springer, Vol. 4464. p. 79 - 92 14 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

171 Citations (Scopus)

Malicious KGC attacks in certificateless cryptography

Au, M. H., Mu, Y., Chen, J., Wong, D. S., Liu, J. K. & Yang, G., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, ASIACCS '07. New York NY USA: Association for Computing Machinery (ACM), p. 302-311 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Preface

Susilo, W. & Liu, J. K., 2007, 1st International Conference on Provable Security 2007. Springer, 1 p. (Lecture Notes in Computer Science; vol. 4784).

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

173 Citations (Scopus)

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model

Liu, J. K., Au, M. H. & Susilo, W., 2007, Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York NY USA: Association for Computing Machinery (ACM), p. 273-283 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperOtherpeer-review

2006
31 Citations (Scopus)

Constant-size id-based linkable and revocable-iff-linked ring signature

Au, M. H., Liu, J. K., Susilo, W. & Yuen, T. H., 1 Jan 2006, Progress in Cryptology: INDOCRYPT 2006 - 7th International Conference on Cryptology, Proceedings. Barua, R. & Lange, T. (eds.). Springer, p. 364-378 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4329 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

57 Citations (Scopus)

ID-based ring signature scheme secure in the standard model

Au, M. H., Liu, J. K., Yuen, T. H. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

61 Citations (Scopus)

Ring signatures without random oracles

Chow, S. S. M., Wei, V. K., Liu, J. K. & Yuen, T. H., 2006, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06. New York NY USA : Association for Computing Machinery (ACM), p. 297-302 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

17 Citations (Scopus)

Ring signature with designated linkability

Liu, J. K., Susilo, W. & Wong, D. S., 1 Jan 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer, p. 104-119 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review