Rongmao Chen
Orcid: 0000-0002-5113-387X
According to our database1,
Rongmao Chen
authored at least 69 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
Inf. Sci., March, 2024
REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT.
IEEE Trans. Dependable Secur. Comput., 2024
IACR Cryptol. ePrint Arch., 2024
Subverting Cryptographic Protocols from A Fine-Grained Perspective - A Case Study on 2-Party ECDSA.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Towards Strong Privacy Protection for Association Rule Mining and Query in the Cloud.
IEEE Trans. Cloud Comput., 2023
Sender-Anamorphic Encryption Reformulated: Achieving Robust and Generic Constructions.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
2022
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Pers. Ubiquitous Comput., 2022
Proceedings of the Cyberspace Safety and Security - 14th International Symposium, 2022
2021
APGS: An Efficient Source-Accountable and Metadata-Private Protocol in the Network Layer.
IEEE Trans. Inf. Forensics Secur., 2021
IACR Cryptol. ePrint Arch., 2021
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Comput. Secur., 2021
2020
Towards Practical Privacy-Preserving Decision Tree Training and Evaluation in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
Int. J. Found. Comput. Sci., 2020
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters.
Inf. Sci., 2019
Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data.
IEEE Internet Things J., 2019
Des. Codes Cryptogr., 2019
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
2018
Efficient <i>k</i>-out-of-<i>n</i> oblivious transfer scheme with the ideal communication cost.
Theor. Comput. Sci., 2018
Privacy-Preserving Biometric-Based Remote User Authentication with Leakage Resilience.
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 IEEE International Conference on Sensing, 2018
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Wirel. Pers. Commun., 2017
Fully privacy-preserving and revocable ID-based broadcast encryption for data access control in smart city.
Pers. Ubiquitous Comput., 2017
Optimal Security Reductions for Unique Signatures: Bypassing Impossibilities with A Counterexample.
IACR Cryptol. ePrint Arch., 2017
Des. Codes Cryptogr., 2017
Privacy-preserving data search and sharing protocol for social networks through wireless applications.
Concurr. Comput. Pract. Exp., 2017
Comput. J., 2017
Dynamic Provable Data Possession Protocols with Public Verifiability and Data Privacy.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
One-Round Privacy-Preserving Meeting Location Determination for Smartphone Applications.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
J. Comput. Sci. Technol., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Provable Security, 2016
Recipient Revocable Identity-Based Broadcast Encryption: How to Revoke Some Recipients in IBBE without Knowledge of the Plaintext.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015