Cheng-Kang Chu

Orcid: 0000-0002-1429-7955

According to our database1, Cheng-Kang Chu authored at least 38 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation.
IEEE Trans. Reliab., 2023

SIX-Trust for 6G: Toward a Secure and Trustworthy Future Network.
IEEE Access, 2023

An Overview of Trust Standards for Communication Networks and Future Digital World.
IEEE Access, 2023

2022
SIX-Trust for 6G: Towards a Secure and Trustworthy 6G Network.
CoRR, 2022

Towards Trustworthy DeFi Oracles: Past, Present and Future.
CoRR, 2022

Toward Trustworthy DeFi Oracles: Past, Present, and Future.
IEEE Access, 2022

Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study.
CoRR, 2021

On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study.
IEEE Access, 2021

2020
Advances of Security and Privacy Techniques in Emerging Wireless Networks.
IEEE Wirel. Commun., 2020

2019
Keyed Non-parametric Hypothesis Tests.
Proceedings of the Network and System Security - 13th International Conference, 2019

2015
Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Inf. Forensics Secur., 2015

2014
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage.
IEEE Trans. Parallel Distributed Syst., 2014

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014

PreCrime to the rescue: defeating mobile malware one-step ahead.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

Building trusted path on untrusted device drivers for mobile devices.
Proceedings of the Asia-Pacific Workshop on Systems, 2014

2013
Security Concerns in Popular Cloud Storage Services.
IEEE Pervasive Comput., 2013

CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013

Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Enhanced authentication for commercial video services.
Secur. Commun. Networks, 2012

Verifier-local revocation group signatures with time-bound keys.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Dynamic Secure Cloud Storage with Provenance.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Secure mobile subscription of sensor-encrypted data.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Identity-Based Server-Aided Decryption.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Practical ID-based Encryption for Wireless Sensor Network.
IACR Cryptol. ePrint Arch., 2010

2009
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes.
J. Inf. Sci. Eng., 2009

Conditional proxy re-encryption secure against chosen-ciphertext attack.
Proceedings of the 2009 ACM Symposium on Information, 2009

Conditional Proxy Broadcast Re-Encryption.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
Efficient k-out-of-n Oblivious Transfer Schemes.
J. Univers. Comput. Sci., 2008

2007
Optimal resilient threshold GQ signatures.
Inf. Sci., 2007

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
IACR Cryptol. ePrint Arch., 2007

Identity-Based Proxy Re-encryption Without Random Oracles.
Proceedings of the Information Security, 10th International Conference, 2007

2006
Conditional Oblivious Cast.
Proceedings of the Public Key Cryptography, 2006

2005
Efficient <i>k</i>-Out-of-<i>n</i> Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Proceedings of the Public Key Cryptography, 2005

2004
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries.
IACR Cryptol. ePrint Arch., 2004

2003
A Threshold GQ Signature Scheme.
IACR Cryptol. ePrint Arch., 2003

2002
Distributed Key Generation as a Component of an Integrated Protocol.
Proceedings of the Information and Communications Security, 4th International Conference, 2002


  Loading...