Aldar C.-F. Chan

Orcid: 0000-0002-8279-3416

According to our database1, Aldar C.-F. Chan authored at least 27 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Non-Intrusive Protection for Legacy SCADA Systems.
IEEE Commun. Mag., June, 2023

2022
Toward Safe Integration of Legacy SCADA Systems in the Smart Grid.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
UTXO in Digital Currencies: Account-based or Token-based? Or Both?
CoRR, 2021

Security and Privacy of Wireless Beacon Systems.
CoRR, 2021

2016
Scalable Two-Factor Authentication Using Historical Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
A Secure, Intelligent Electric Vehicle Ecosystem for Safe Integration With the Smart Grid.
IEEE Trans. Intell. Transp. Syst., 2015

2014
Cyber-Physical Device Authentication for the Smart Grid Electric Vehicle Ecosystem.
IEEE J. Sel. Areas Commun., 2014

2013
On optimal cryptographic key derivation.
Theor. Comput. Sci., 2013

On smart grid cybersecurity standardization: Issues of designing with NISTIR 7628.
IEEE Commun. Mag., 2013

2012
Distributed Private Key Generation for Identity Based Cryptosystems in Ad Hoc Networks.
IEEE Wirel. Commun. Lett., 2012

2011
A security framework for privacy-preserving data aggregation in wireless sensor networks.
ACM Trans. Sens. Networks, 2011

Efficient defence against misbehaving TCP receiver DoS attacks.
Comput. Networks, 2011

2009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
ACM Trans. Sens. Networks, 2009

A Graph Theoretic Approach for Optimizing Key Pre-distribution in Wireless SensorNetworks
CoRR, 2009

A graph theoretic approach for optimizing key pre-distribution in wireless sensor networks.
Proceedings of the 7th International Symposium on Modeling and Optimization in Mobile, 2009

Symmetric-Key Homomorphic Encryption for Encrypted Data Processing.
Proceedings of IEEE International Conference on Communications, 2009

2008
Cryptographic Defence against Misbehaving TCP Receivers
CoRR, 2008

On the (Im)possibility of aggregate message authentication codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

On compression of cryptographic keys.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
On the Privacy of Concealed Data Aggregation.
Proceedings of the Computer Security, 2007

2006
Conditionally Verifiable Signature.
Proceedings of the Progress in Cryptology, 2006

2005
Conditionally Verifiable Signatures.
IACR Cryptol. ePrint Arch., 2005

Scalable, Server-Passive, User-Anonymous Timed Release Cryptography.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

2004
Scalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing.
IACR Cryptol. ePrint Arch., 2004

Distributed Symmetric Key Management for Mobile Ad hoc Networks.
Proceedings of the Proceedings IEEE INFOCOM 2004, 2004

Probabilistic distributed key predistribution for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

2003
A graph-theoretical analysis of multicast authentication.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003


  Loading...