Follow
Duncan S. Wong
Duncan S. Wong
Associate Professor of Computer Science, City University of Hong Kong
Verified email at cityu.edu.hk
Title
Cited by
Cited by
Year
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Information Security and Privacy: 9th Australasian Conference, ACISP 2004 …, 2004
5742004
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng
Applied Cryptography and Network Security: 4th International Conference …, 2006
3922006
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3902007
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
3182013
Surveying the development of biometric user authentication on mobile phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2014
3032014
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2882007
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
2862017
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
2822010
Key replacement attack against a generic construction of certificateless signature
BC Hu, DS Wong, Z Zhang, X Deng
Australasian Conference on Information Security and Privacy, 235-246, 2006
2702006
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
2482014
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2452008
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
2442012
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
2212011
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1982014
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1922015
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
Computer Security-ESORICS 2014: 19th European Symposium on Research in …, 2014
1922014
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
189*2006
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel, L Kwok
Information Security and Cryptology: 8th International Conference, Inscrypt …, 2013
1742013
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1702010
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
1692015
The system can't perform the operation now. Try again later.
Articles 1–20