Cheng-Kang Chu
Orcid: 0000-0002-1429-7955
According to our database1,
Cheng-Kang Chu
authored at least 39 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
Abnormal Traffic Detection: Traffic Feature Extraction and DAE-GAN With Efficient Data Augmentation.
IEEE Trans. Reliab., 2023
IEEE Access, 2023
2022
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach.
Proceedings of the Network and System Security - 16th International Conference, 2022
2021
On the Trust and Trust Modelling for the Future Fully-Connected Digital World: A Comprehensive Study.
CoRR, 2021
On the Trust and Trust Modeling for the Future Fully-Connected Digital World: A Comprehensive Study.
IEEE Access, 2021
2020
IEEE Wirel. Commun., 2020
2019
Proceedings of the Network and System Security - 13th International Conference, 2019
2015
IEEE Trans. Inf. Forensics Secur., 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts.
Theor. Comput. Sci., 2014
Proceedings of the Asia-Pacific Workshop on Systems, 2014
Proceedings of the Asia-Pacific Workshop on Systems, 2014
2013
CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing.
IACR Cryptol. ePrint Arch., 2013
Privacy-preserving smart metering with regional statistics and personal enquiry services.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
2011
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption Schemes.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IACR Cryptol. ePrint Arch., 2010
2009
J. Inf. Sci. Eng., 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
2007
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security, 10th International Conference, 2007
2006
2005
Efficient <i>k</i>-Out-of-<i>n</i> Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.
Proceedings of the Public Key Cryptography, 2005
2004
Efficient k-out-of-n Oblivious Transfer Schemes with Adaptive and Non-Adaptive Queries.
IACR Cryptol. ePrint Arch., 2004
2003
2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002