Cheng-Kang Chu

Orcid: 0000-0002-1429-7955

According to our database1, Cheng-Kang Chu authored at least 41 papers between 2002 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
How to Securely Delegate and Revoke Partial Authorization Credentials.
IEEE Trans. Dependable Secur. Comput., 2025

Delegatable Multi-Authority Attribute-Based Anonymous Credentials.
IEEE Trans. Cloud Comput., 2025

2024
Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA.
Comput. J., 2024

2023
Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation.
IEEE Trans. Reliab., 2023

SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network.
IEEE Access, 2023

An Overview of Trust Standards for Communication Networks and Future Digital World.
IEEE Access, 2023

2022
SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network.
CoRR, 2022

Towards Trustworthy DeFi Oracles: Past, Present and Future.
CoRR, 2022

Toward Trustworthy DeFi Oracles: Past, Present, and Future.
IEEE Access, 2022

Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study.
CoRR, 2021

On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study.
IEEE Access, 2021

2020
Advances of Security and Privacy Techniques in Emerging Wireless Networks.
IEEE Wirel. Commun., 2020

2019
Keyed Non-parametric Hypothesis Tests.
Proceedings of the Network and System Security - 13th International Conference, 2019

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

PreCrime to the rescue: defeating mobile malware one-step ahead.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

Building trusted path on untrusted device drivers for mobile devices.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2013
Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Comput., 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
Proceedings of the Applied Cryptography and Network Security, 2013

2012
Enhanced authentication for commercial video services.
Secur. Commun. Networks, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-Based Server-Aided Decryption.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Practical ID-based encryption for wireless sensor network.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes.
J. Inf. Sci. Eng., 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Efficient k-out-of-n Oblivious Transfer Schemes.
J. Univers. Comput. Sci., 2008

2007
Optimal resilient threshold GQ signatures.
Inf. Sci., 2007

Identity-Based Proxy Re-encryption Without Random Oracles.
Proceedings of the Information Security, 10th International Conference, 2007

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Conditional Oblivious Cast.
Proceedings of the Public Key Cryptography, 2006

2005
Efficient <i>k</i>-Out-of-<i>n</i> Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Proceedings of the Public Key Cryptography, 2005

2004
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries.
IACR Cryptol. ePrint Arch., 2004

2003
A Threshold GQ Signature Scheme.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Distributed Key Generation as a Component of an Integrated Protocol.
Proceedings of the Information and Communications Security, 4th International Conference, 2002


  Loading...