Man Ho Au

According to our database1, Man Ho Au
  • authored at least 145 papers between 2004 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Towards leakage-resilient fine-grained access control in fog computing.
Future Generation Comp. Syst., 2018

Position based cryptography with location privacy: A step for Fog Computing.
Future Generation Comp. Syst., 2018

Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Generation Comp. Syst., 2018

Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptography, 2018

2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Towards secure and cost-effective fuzzy access control in mobile cloud computing.
Soft Comput., 2017

A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.
Sensors, 2017

Erratum to: Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.
Pervasive and Mobile Computing, 2017

A general framework for secure sharing of personal health records in cloud system.
J. Comput. Syst. Sci., 2017

Anonymous Post-Quantum Cryptocash.
IACR Cryptology ePrint Archive, 2017

Decentralized Blacklistable Anonymous Credentials with Reputation.
IACR Cryptology ePrint Archive, 2017

Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptology ePrint Archive, 2017

Cloud computing security and privacy: Standards and regulations.
Computer Standards & Interfaces, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
CoRR, 2017

Anonymous Announcement System (AAS) for Electric Vehicle in VANETs.
Comput. J., 2017

AutoFlowLeaker: Circumventing Web Censorship through Automation Services.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Fuzzy Public-Key Encryption Based on Biometric Data.
Proceedings of the Provable Security, 2017

Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks.
Proceedings of the Information Security - 20th International Conference, 2017

An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017

Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
IEEE Trans. Information Forensics and Security, 2016

Relations between robustness and RKA security under public-key encryption.
Theor. Comput. Sci., 2016

Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings.
IACR Cryptology ePrint Archive, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptology ePrint Archive, 2016

Cloud data integrity checking with an identity-based auditing mechanism from RSA.
Future Generation Comp. Syst., 2016

Security and privacy in big data.
Concurrency and Computation: Practice and Experience, 2016

Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016

Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016

Authentication and Transaction Verification Using QR Codes with a Mobile Device.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016

While Mobile Encounters with Clouds.
Proceedings of the Network and System Security - 10th International Conference, 2016

Anonymous Identification for Ad Hoc Group.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Leakage-Resilient Functional Encryption via Pair Encodings.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Services Computing, 2015

Time-Bound Anonymous Authentication for Roaming Networks.
IEEE Trans. Information Forensics and Security, 2015

Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Information Forensics and Security, 2015

Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Information Forensics and Security, 2015

AAC-OT: Accountable Oblivious Transfer With Access Control.
IEEE Trans. Information Forensics and Security, 2015

Optimistic fair exchange in the enhanced chosen-key model.
Theor. Comput. Sci., 2015

k-Times Attribute-Based Anonymous Access Control for Cloud Computing.
IEEE Trans. Computers, 2015

Secure sharing and searching for real-time video data in mobile cloud.
IEEE Network, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Proof of retrievability with public verifiability resilient against related-key attacks.
IET Information Security, 2015

Remote data possession checking with enhanced security for cloud storage.
Future Generation Comp. Syst., 2015

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Generation Comp. Syst., 2015

Secure Delegation of Signing Power from Factorization.
Comput. J., 2015

Revisiting Security Against the Arbitrator in Optimistic Fair Exchange.
Comput. J., 2015

PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
A New Payment System for Enhancing Location Privacy of Electric Vehicles.
IEEE Trans. Vehicular Technology, 2014

Linkable Ring Signature with Unconditional Anonymity.
IEEE Trans. Knowl. Data Eng., 2014

Collusion-Resistance in Optimistic Fair Exchange.
IEEE Trans. Information Forensics and Security, 2014

Revisiting Optimistic Fair Exchange Based on Ring Signatures.
IEEE Trans. Information Forensics and Security, 2014

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Information Forensics and Security, 2014

Attribute-based optimistic fair exchange: How to restrict brokers with policies.
Theor. Comput. Sci., 2014

Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014

Anonymous broadcast encryption with an untrusted gateway.
IJSN, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptology ePrint Archive, 2014

Cryptography in Cloud Computing.
Future Generation Comp. Syst., 2014

Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014

Improvements on an authentication scheme for vehicular sensor networks.
Expert Syst. Appl., 2014

(Strong) multidesignated verifiers signatures secure against rogue key attack.
Concurrency and Computation: Practice and Experience, 2014

Signcryption Secure Against Linear Related-Key Attacks.
Comput. J., 2014

Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Complete Robustness in Identity-Based Encryption.
Proceedings of the Provable Security - 8th International Conference, 2014

An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014

Two-Party (Blind) Ring Signatures and Their Applications.
Proceedings of the Information Security Practice and Experience, 2014

A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Proceedings of the Computer Security - ESORICS 2014, 2014

PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Information Forensics and Security, 2013

Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013

Constant-Size Dynamic $k$ -Times Anonymous Authentication.
IEEE Systems Journal, 2013

Server-aided signatures verification secure against collusion attack.
Inf. Sec. Techn. Report, 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
IACR Cryptology ePrint Archive, 2013

Efficient Linkable and/or Threshold Ring Signature Without Random Oracles.
Comput. J., 2013

Privacy-Enhanced Keyword Search in Clouds.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Public-Key Encryption Resilient to Linear Related-Key Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2013

Anonymous Signcryption against Linear Related-Key Attacks.
Proceedings of the Provable Security - 7th International Conference, 2013

Efficient Semi-static Secure Broadcast Encryption Scheme.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

Threshold-Oriented Optimistic Fair Exchange.
Proceedings of the Network and System Security - 7th International Conference, 2013

Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

Fairness in Concurrent Signatures Revisited.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Perfect Ambiguous Optimistic Fair Exchange.
IACR Cryptology ePrint Archive, 2012

Enhancing Location Privacy for Electric Vehicles (at the right time).
IACR Cryptology ePrint Archive, 2012

Efficient Escrow-Free Identity-Based Signature.
Proceedings of the Provable Security - 6th International Conference, 2012

(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack.
Proceedings of the Network and System Security - 6th International Conference, 2012

BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Forward Secure Attribute-Based Signatures.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Perfect Ambiguous Optimistic Fair Exchange.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Enhancing Location Privacy for Electric Vehicles (at the Right time).
Proceedings of the Computer Security - ESORICS 2012, 2012

PERM: practical reputation-based blacklisting without TTPS.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users.
ACM Trans. Inf. Syst. Secur., 2011

Privacy-Preserved Access Control for Cloud Computing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Threshold ring signature without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Server-aided signatures verification secure against collusion attack.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Electronic Cash with Anonymous User Suspension.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs.
ACM Trans. Inf. Syst. Secur., 2010

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010

Oblivious Transfer with Access Control : Realizing Disjunction without Duplication.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009

Online/Offline Ring Signature Scheme.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Escrowed Deniable Identification Schemes.
Proceedings of the Security Technology, 2009

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009

2008
Constant-Size Dynamic k-TAA.
IACR Cryptology ePrint Archive, 2008

Practical Anonymous Divisible E-Cash from Bounded Accumulators.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

PEREA: towards practical TTP-free revocation in anonymous authentication.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Traceable and Retrievable Identity-Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
(Convertible) Undeniable Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2007

Structural Identity-Based Encryption.
IACR Cryptology ePrint Archive, 2007

Practical Anonymous Divisible E-Cash From Bounded Accumulators.
IACR Cryptology ePrint Archive, 2007

Practical Compact E-Cash.
IACR Cryptology ePrint Archive, 2007

Certificate Based (Linkable) Ring Signature.
Proceedings of the Information Security Practice and Experience, 2007

(Convertible) Undeniable Signatures Without Random Oracles.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

Compact E-Cash from Bounded Accumulator.
Proceedings of the Topics in Cryptology, 2007

Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Practical Compact E-Cash.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptology ePrint Archive, 2006

Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptology ePrint Archive, 2006

Malicious KGC Attacks in Certificateless Cryptography.
IACR Cryptology ePrint Archive, 2006

Constant-Size Dynamic k-TAA.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

ID-Based Ring Signature Scheme Secure in the Standard Model.
Proceedings of the Advances in Information and Computer Security, 2006

Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.
Proceedings of the Progress in Cryptology, 2006

Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006

Event-Oriented k-Times Revocable-iff-Linked Group Signatures.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptology ePrint Archive, 2005

Short E-Cash.
Proceedings of the Progress in Cryptology, 2005

2004
Separable Linkable Threshold Ring Signatures.
IACR Cryptology ePrint Archive, 2004

ID-based Cryptography from Composite Degree Residuosity.
IACR Cryptology ePrint Archive, 2004

Separable Linkable Threshold Ring Signatures.
Proceedings of the Progress in Cryptology, 2004


  Loading...