关注
Man Ho Au
Man Ho Au
其他姓名Man Ho Allen Au, Allen MH Au
在 comp.polyu.edu.hk 的电子邮件经过验证 - 首页
标题
引用次数
年份
(Convertible) undeniable signatures without random oracles
TH Yuen, MH Au, JK Liu, W Susilo
Information and Communications Security: 9th International Conference, ICICS …, 2007
122007
(Linkable) Ring signature from hash-then-one-way signature
X Lu, MH Au, Z Zhang
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
2019
(Strong) multi-designated verifiers signatures secure against rogue key attack
Y Zhang, MH Au, G Yang, W Susilo
Network and System Security: 6th International Conference, NSS 2012 …, 2012
52012
(Strong) multidesignated verifiers signatures secure against rogue key attack
MH Au, G Yang, W Susilo, Y Zhang
Concurrency and Computation: Practice and Experience 26 (8), 1574-1592, 2014
52014
-Times Attribute-Based Anonymous Access Control for Cloud Computing
TH Yuen, JK Liu, MH Au, X Huang, W Susilo, J Zhou
IEEE Transactions on Computers 64 (9), 2595-2608, 2014
412014
2013 Index IEEE Systems Journal Vol. 7
S Abbas, R Abdunabi, S Abraham, M Afkousi-Paqaleh, AG Aghdam, ...
IEEE Systems Journal 7 (4), 897, 2013
2013
2013 Index IEEE Transactions on Information Forensics and Security Vol. 8
IM Abbadi, K Aberer, Z Ahmadian, GJ Ahn, L Akarun, M Aliasgari, L Altieri, ...
IEEE Transactions on Information Forensics and Security 8 (12), 2195, 2013
2013
2013 Index IEEE Transactions on Services Computing Vol. 6
W Aalst, J Aguado, JM Alcaraz Calero, J Alonso Lopez, V Andrikopoulos, ...
2014 Index IEEE Transactions on Information Forensics and Security Vol. 9
I Aad, AE Abdel-Hakim, M Abdelhakim, A Abrardo, M Agrawal, S Ahmadi, ...
IEEE Transactions on Information Forensics and Security 9 (12), 2367, 2014
2014
2014 Index IEEE Transactions on Knowledge and Data Engineering Vol. 26
A Abboud, S Abraham, CC Aggarwal, A Ahmad, H Aksu, M Al Hasan, ...
IEEE Transactions on Knowledge and Data Engineering 27 (1), 289, 2015
2015
2015 Index IEEE Transactions on Computers Vol. 64
EAH Abdulrahman, ME Acacio, J Adikari, AM Ahmed, J Ahn, MI Akbas, ...
IEEE Transactions on Computers 65 (1), 0, 2016
2016
2020 Index IEEE Transactions on Information Forensics and Security Vol. 15
MAM Abdullah, SM Abdullahi, NV Abhishek, C Adak, P Addesso, ...
IEEE Transactions on Information Forensics and Security 15, 2020
2020
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18
S Adepu, A Agarwal, G Ahn, S Akter, MA Al Faruque, M Al-Asli, ...
2021 Index IEEE Transactions on Services Computing Vol. 14
A Abu Jabal, NR Adam, A Afzal, V Aggarwal, H Akhavan-Hejazi, ...
A constructivist and pragmatic training framework for blockchain education for IT practitioners
ACY Leung, DYW Liu, X Luo, MH Au
Education and Information Technologies, 1-42, 2024
2024
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
1602014
A distributed trust evaluation protocol with privacy protection for intercloud
Y Dou, HCB Chan, MH Au
IEEE Transactions on Parallel and Distributed Systems 30 (6), 1208-1221, 2018
182018
A fog‐based collaborative intrusion detection framework for smart grid
W Li, MH Au, Y Wang
International Journal of Network Management 31 (2), e2107, 2021
132021
A game-theoretic method based on Q-learning to invalidate criminal smart contracts
L Zhang, Y Wang, F Li, Y Hu, MH Au
Information Sciences 498, 144-153, 2019
492019
A general framework for secure sharing of personal health records in cloud system
MH Au, TH Yuen, JK Liu, W Susilo, X Huang, Y Xiang, ZL Jiang
Journal of computer and system sciences 90, 46-62, 2017
992017
系统目前无法执行此操作,请稍后再试。
文章 1–20