Man Ho Au
Orcid: 0000-0003-2068-9530
According to our database1,
Man Ho Au
authored at least 248 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
A constructivist and pragmatic training framework for blockchain education for IT practitioners.
Educ. Inf. Technol., August, 2024
Comput. Stand. Interfaces, January, 2024
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones.
Comput. Networks, January, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement.
CoRR, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
2023
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM.
IEEE Trans. Intell. Transp. Syst., December, 2023
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities.
Inf. Sci., November, 2023
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems.
Future Gener. Comput. Syst., August, 2023
IEEE Trans. Mob. Comput., June, 2023
Adv. Eng. Informatics, April, 2023
Peer Peer Netw. Appl., March, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security.
Inf., 2023
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
IACR Cryptol. ePrint Arch., 2023
Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE INFOCOM 2023, 2023
Blockchain-based Trustless Fair Payment Protocol for Verifiable Confidential Outsourcing Computation.
Proceedings of the IEEE International Conference on Blockchain, 2023
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search.
Proceedings of the Provable and Practical Security, 2022
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the Database Systems for Advanced Applications, 2022
2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Serv. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Int. J. Netw. Manag., 2021
Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks.
Proceedings of the SOSP '21: ACM SIGOPS 28th Symposium on Operating Systems Principles, 2021
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Blockchain-Based Supply Chain System for Traceability, Regulation and Anti-Counterfeiting.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation.
Theor. Comput. Sci., 2020
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments.
J. Netw. Comput. Appl., 2020
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions.
IEICE Trans. Inf. Syst., 2020
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks.
Comput. Electr. Eng., 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019
IEEE Trans. Parallel Distributed Syst., 2019
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices.
IEEE Trans. Computers, 2019
Inf. Sci., 2019
Efficient attribute-based encryption with attribute revocation for assured data deletion.
Inf. Sci., 2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
Meta-Key: A Secure Data-Sharing Protocol Under Blockchain-Based Decentralized Storage Architecture.
IEEE Netw. Lett., 2019
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies.
Future Gener. Comput. Syst., 2019
Simulation-based selective opening security for receivers under chosen-ciphertext attacks.
Des. Codes Cryptogr., 2019
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup.
CoRR, 2019
Comput. Secur., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines.
Proceedings of the IEEE International Conference on Engineering, Technology and Education, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature.
Proceedings of the Provable Security, 2019
Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications, 2019
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Progress in Cryptology - AFRICACRYPT 2019, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
Soft Comput., 2018
Secur. Commun. Networks, 2018
IACR Cryptol. ePrint Arch., 2018
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability.
IACR Cryptol. ePrint Arch., 2018
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures.
IACR Cryptol. ePrint Arch., 2018
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat.
Future Gener. Comput. Syst., 2018
Functional encryption for computational hiding in prime order groups via pair encodings.
Des. Codes Cryptogr., 2018
Comput. J., 2018
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach.
Proceedings of the 2018 International Conference on Management of Data, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Proceedings of the Computer Security, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2017
Soft Comput., 2017
A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.
Sensors, 2017
Pers. Ubiquitous Comput., 2017
Pers. Ubiquitous Comput., 2017
Pervasive Mob. Comput., 2017
J. Comput. Syst. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR.
IACR Cryptol. ePrint Arch., 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
IACR Cryptol. ePrint Arch., 2017
Comput. Stand. Interfaces, 2017
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the Provable Security, 2017
Proceedings of the Information Security - 20th International Conference, 2017
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks.
Proceedings of the Information Security Practice and Experience, 2017
Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Proceedings of the Computer Security - ESORICS 2017, 2017
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Mobile Security and Privacy, 2017
Proceedings of the Mobile Security and Privacy, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Theor. Comput. Sci., 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups.
IACR Cryptol. ePrint Arch., 2016
Future Gener. Comput. Syst., 2016
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles.
Comput. J., 2016
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction.
Comput. J., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords.
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Serv. Comput., 2015
IEEE Trans. Inf. Forensics Secur., 2015
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
IEEE Trans. Inf. Forensics Secur., 2015
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption.
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Inf. Forensics Secur., 2015
IEEE Trans. Computers, 2015
IEEE Netw., 2015
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015
Proof of retrievability with public verifiability resilient against related-key attacks.
IET Inf. Secur., 2015
Future Gener. Comput. Syst., 2015
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing.
Future Gener. Comput. Syst., 2015
Comput. J., 2015
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
2014
IEEE Trans. Veh. Technol., 2014
IEEE Trans. Knowl. Data Eng., 2014
IEEE Trans. Inf. Forensics Secur., 2014
IEEE Trans. Inf. Forensics Secur., 2014
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
IEEE Trans. Inf. Forensics Secur., 2014
Theor. Comput. Sci., 2014
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents.
Inf. Process. Lett., 2014
Int. J. Secur. Networks, 2014
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014
Improved security of a dynamic remote data possession checking protocol for cloud storage.
Expert Syst. Appl., 2014
Expert Syst. Appl., 2014
Concurr. Comput. Pract. Exp., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing.
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2014, 2014
2013
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
IEEE Trans. Inf. Forensics Secur., 2013
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction.
Theor. Comput. Sci., 2013
Inf. Secur. Tech. Rep., 2013
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
IACR Cryptol. ePrint Arch., 2013
Comput. J., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Proceedings of the Computer Security, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Security Technology, 2009
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009
2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
IACR Cryptol. ePrint Arch., 2006
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptol. ePrint Arch., 2005
2004
IACR Cryptol. ePrint Arch., 2004