Sherman S. M. Chow
Orcid: 0000-0001-7306-453XAffiliations:
- The Chinese University of Hong Kong, Sha Tin, Hong Kong
According to our database1,
Sherman S. M. Chow
authored at least 188 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cs.hku.hk
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Commun. Cryptol., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 26th International Symposium on Research in Attacks, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting).
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Proc. Priv. Enhancing Technol., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE.
Proceedings of the Applied Cryptography and Network Security, 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Future Gener. Comput. Syst., 2021
Comput. Secur., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed).
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
2019
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Trans. Dependable Secur. Comput., 2018
Multi-authority fine-grained access control with accountability and its application in cloud.
J. Netw. Comput. Appl., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the Frontiers in Cyber Security - First International Conference, 2018
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Proc. Priv. Enhancing Technol., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
Comput. J., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Provable Security, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Advances in Information and Computer Security, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Proceedings of the Computing and Combinatorics - 22nd International Conference, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
Theor. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'.
Comput. J., 2015
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model.
Proceedings of the Provable Security, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
Proceedings of the Financial Cryptography and Data Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
IEEE J. Biomed. Health Informatics, 2014
IACR Cryptol. ePrint Arch., 2014
Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection.
CoRR, 2014
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEEE Trans. Computers, 2013
Inf. Secur. Tech. Rep., 2013
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
PhD thesis, 2010
An efficient signcryption scheme with key privacy and its extension to ring signcryption.
J. Comput. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
Brief announcement: improving social-network-based sybil-resilient node admission control.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
IET Inf. Secur., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Public Key Cryptography, 2009
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases.
Proceedings of the Network and Distributed System Security Symposium, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. Univers. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Information Security, 11th International Conference, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Information Security, 10th International Conference, 2007
Proceedings of the Public Key Infrastructure, 2007
Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification.
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Public Key Infrastructure, 2006
Proceedings of the Public Key Infrastructure, 2006
2005
J. Syst. Softw., 2005
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Impact of Recent Advances in Crytography on Online Game.
Proceedings of the 3rd International Conference on Application and Development of Computer Games (ADCOG 2004) held on 26-27 April 2004 in City University of Hong Kong, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
Proceedings of the Information Security and Cryptology, 2003