Raylin Tso
Orcid: 0000-0003-1485-0164
According to our database1,
Raylin Tso
authored at least 131 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives.
Des. Codes Cryptogr., June, 2024
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates.
IET Inf. Secur., 2024
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems.
Comput. Stand. Interfaces, 2024
ID-Based Traitor Tracing with Relaxed Black-Box Setting for Group-Based Applications.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
Cryptanalysis of PiLike: An Impersonation Attack on the Lightweight Identity-Based Authenticated Key Exchange Protocol Using Bi-ISIS.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
Inf. Process. Lett., August, 2023
Comments on "Dynamic Consensus Committee-Based for Secure Data Sharing With Authorized Multi-Receiver Searchable Encryption".
CoRR, 2023
2022
Identity-Certifying Authority-Aided Identity-Based Searchable Encryption Framework in Cloud Systems.
IEEE Syst. J., 2022
Privacy-preserving bidirectional keyword search over encrypted data for cloud-assisted IIoT.
J. Syst. Archit., 2022
J. Inf. Secur. Appl., 2022
IET Inf. Secur., 2022
Public-Key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-Resistant Instantiation.
Comput. J., 2022
Proceedings of the Advances in Information and Computer Security, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
2021
Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks.
J. Supercomput., 2021
Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function.
Secur. Commun. Networks, 2021
Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Notes on a lattice-based proxy-oriented identity-based encryption with keyword search.
IACR Cryptol. ePrint Arch., 2021
Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud System.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
Quantum Inf. Process., 2020
J. Intell. Fuzzy Syst., 2020
Intelligence-led response: turning theory into law enforcement practice in cyber security incidents.
Int. J. Electron. Bus., 2020
IACR Cryptol. ePrint Arch., 2020
Quantum-resistant Public-key Authenticated Encryption with Keyword Search for Industrial Internet of Things.
IACR Cryptol. ePrint Arch., 2020
Cryptanalysis of "FS-PEKS: Lattice-based Forward Secure Public-key Encryption with Keyword Search for Cloud-assisted Industrial Internet of Things".
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Generic Construction of Dual-Server Public Key Encryption With Keyword Search on Cloud Computing.
IEEE Access, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, 2020
2019
IET Inf. Secur., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019
Proceedings of the 21st International Conference on Advanced Communication Technology, 2019
SCDP: Smart Contract-based Decentralized Privacy System for Securing Data Ownership Management.
Proceedings of the IEEE 8th Global Conference on Consumer Electronics, 2019
An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications.
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
2018
J. Supercomput., 2018
Symmetry, 2018
Establishing rational networking using the DL04 quantum secure direct communication protocol.
Quantum Inf. Process., 2018
Quantum Inf. Process., 2018
Quantum Inf. Process., 2018
Quantum Inf. Comput., 2018
IACR Cryptol. ePrint Arch., 2018
Privacy-Preserving Outsourced Similarity Test for Access Over Encrypted Data in the Cloud.
IEEE Access, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
2017
Privacy-Preserving Data Communication Through Secure Multi-Party Computation in Healthcare Sensor Cloud.
J. Signal Process. Syst., 2017
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption.
J. Comput. Syst. Sci., 2017
Proceedings of the IEEE 2nd International Verification and Security Workshop, 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Proceedings of the Advances in Intelligent Information Hiding and Multimedia Signal Processing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Reputation-Based Trust Evaluation Mechanism for Decentralized Environments and Its Applications Based on Smart Contracts.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
Proceedings of the 31st International Conference on Advanced Information Networking and Applications Workshops, 2017
2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the 18th Asia-Pacific Network Operations and Management Symposium, 2016
2015
Secur. Commun. Networks, 2015
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks.
J. Univers. Comput. Sci., 2015
Strongly Secure Certificateless Signature: Cryptanalysis and Improvement of two Schemes.
J. Inf. Sci. Eng., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the Genetic and Evolutionary Computing, 2015
Security Analysis of an Anonymous Authentication Scheme Based on Smart Cards and Biometrics for Multi-server Environments.
Proceedings of the Genetic and Evolutionary Computing, 2015
2014
Future Gener. Comput. Syst., 2014
A New Ultra-Lightweight RFID Authentication Protocol Based on Physical Unclonable Functions.
Proceedings of the Radio Frequency Identification System Security, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014
Efficient public key encryption with user-friendly keywords search for searchable cloud storage.
Proceedings of the Intelligent Systems and Applications, 2014
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014
Proceedings of the Genetic and Evolutionary Computing, 2014
An Incremental Algorithm for Maintaining the Built FUSP Trees Based on the Pre-large Concepts.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014
2013
Security analysis and improvements of a communication-efficient three-party password authenticated key exchange protocol.
J. Supercomput., 2013
J. Inf. Hiding Multim. Signal Process., 2013
Certificateless Signatures: Structural Extensions of Security Models and New Provably Secure Schemes.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Secur. Commun. Networks, 2012
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adverssaries.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
Identity-based Password-Authenticated Key Exchange for Client/Server Model.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012
2011
J. Supercomput., 2011
Three-party Password-authenticated Key Exchange without Random Oracles.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Fifth International Conference on Genetic and Evolutionary Computing, 2011
2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010
2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
2008
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of the Cryptography and Coding, 2007
ECDSA-Verifiable Signcryption Scheme with Signature Verification on the Signcrypted Message.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, 2007
2006
A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment.
Inf. Media Technol., 2006
How to Verify the Threshold <i>t</i> of Shamir's (<i>t</i>, <i>n</i>)-Threshold Scheme.
Inf. Media Technol., 2006
IACR Cryptol. ePrint Arch., 2006
2005
Proceedings of the Modeling Decisions for Artificial Intelligence, 2005
Practical Strong Designated Verifier Signature Schemes Based on Double Discrete Logarithms.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
An id-based non-interactive tripartite key agreement protocol with K-resilience.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005
2003
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.
Proceedings of the Information Security and Cryptology, 2003