Patrick P. Tsang

According to our database1, Patrick P. Tsang authored at least 24 papers between 2004 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users.
ACM Trans. Inf. Syst. Secur., 2011

Nymble: Blocking Misbehaving Users in Anonymizing Networks.
IEEE Trans. Dependable Secur. Comput., 2011

2010
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs.
ACM Trans. Inf. Syst. Secur., 2010

A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Proceedings of the Provable Security - 4th International Conference, 2010

High Security with Low Latency in Legacy SCADA Systems.
Proceedings of the Critical Infrastructure Protection IV, 2010

2009
DEAMON: Energy-efficient Sensor Monitoring.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Proceedings of the Topics in Cryptology, 2009

2008
YASIR: A Low-Latency, High-Integrity Security Retrofit for Legacy SCADA Systems.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Combating Spam and Denial-of-Service Attacks with Trusted Puzzle Solvers.
Proceedings of the Information Security Practice and Experience, 2008

Secure Cryptographic Precomputation with Insecure Memory.
Proceedings of the Information Security Practice and Experience, 2008

PEREA: towards practical TTP-free revocation in anonymous authentication.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

PPAA: Peer-to-Peer Anonymous Authentication.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
When Cryptographers Turn Lead into Gold.
IEEE Secur. Priv., 2007

Nymble: Anonymous IP-Address Blocking.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

Attribute-Based Publishing with Hidden Credentials and Hidden Policies.
Proceedings of the Network and Distributed System Security Symposium, 2007

Batch Pairing Delegation.
Proceedings of the Advances in Information and Computer Security, 2007

Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Short Linkable Ring Signatures Revisited.
Proceedings of the Public Key Infrastructure, 2006

2005
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity.
IACR Cryptol. ePrint Arch., 2005

Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.
Proceedings of the Information Security and Cryptology, 2005

Recoverable and Untraceable E-Cash.
Proceedings of the Public Key Infrastructure, 2005

Efficient Verifiable Ring Encryption for Ad Hoc Groups.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

2004
Separable Linkable Threshold Ring Signatures.
IACR Cryptol. ePrint Arch., 2004

Short Linkable Ring Signatures for E-Voting, E-Cash and Attestation.
IACR Cryptol. ePrint Arch., 2004


  Loading...