(Convertible) undeniable signatures without random oracles TH Yuen, MH Au, JK Liu, W Susilo Information and Communications Security: 9th International Conference, ICICS …, 2007 | 12 | 2007 |
(Linkable) Ring signature from hash-then-one-way signature X Lu, MH Au, Z Zhang 2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019 | | 2019 |
(Strong) multi-designated verifiers signatures secure against rogue key attack Y Zhang, MH Au, G Yang, W Susilo Network and System Security: 6th International Conference, NSS 2012 …, 2012 | 5 | 2012 |
(Strong) multidesignated verifiers signatures secure against rogue key attack MH Au, G Yang, W Susilo, Y Zhang Concurrency and Computation: Practice and Experience 26 (8), 1574-1592, 2014 | 5 | 2014 |
-Times Attribute-Based Anonymous Access Control for Cloud Computing TH Yuen, JK Liu, MH Au, X Huang, W Susilo, J Zhou IEEE Transactions on Computers 64 (9), 2595-2608, 2014 | 41 | 2014 |
2013 Index IEEE Systems Journal Vol. 7 S Abbas, R Abdunabi, S Abraham, M Afkousi-Paqaleh, AG Aghdam, ... IEEE Systems Journal 7 (4), 897, 2013 | | 2013 |
2013 Index IEEE Transactions on Information Forensics and Security Vol. 8 IM Abbadi, K Aberer, Z Ahmadian, GJ Ahn, L Akarun, M Aliasgari, L Altieri, ... IEEE Transactions on Information Forensics and Security 8 (12), 2195, 2013 | | 2013 |
2013 Index IEEE Transactions on Services Computing Vol. 6 W Aalst, J Aguado, JM Alcaraz Calero, J Alonso Lopez, V Andrikopoulos, ... | | |
2014 Index IEEE Transactions on Information Forensics and Security Vol. 9 I Aad, AE Abdel-Hakim, M Abdelhakim, A Abrardo, M Agrawal, S Ahmadi, ... IEEE Transactions on Information Forensics and Security 9 (12), 2367, 2014 | | 2014 |
2014 Index IEEE Transactions on Knowledge and Data Engineering Vol. 26 A Abboud, S Abraham, CC Aggarwal, A Ahmad, H Aksu, M Al Hasan, ... IEEE Transactions on Knowledge and Data Engineering 27 (1), 289, 2015 | | 2015 |
2015 Index IEEE Transactions on Computers Vol. 64 EAH Abdulrahman, ME Acacio, J Adikari, AM Ahmed, J Ahn, MI Akbas, ... IEEE Transactions on Computers 65 (1), 0, 2016 | | 2016 |
2020 Index IEEE Transactions on Information Forensics and Security Vol. 15 MAM Abdullah, SM Abdullahi, NV Abhishek, C Adak, P Addesso, ... IEEE Transactions on Information Forensics and Security 15, 2020 | | 2020 |
2021 Index IEEE Transactions on Dependable and Secure Computing Vol. 18 S Adepu, A Agarwal, G Ahn, S Akter, MA Al Faruque, M Al-Asli, ... | | |
2021 Index IEEE Transactions on Services Computing Vol. 14 A Abu Jabal, NR Adam, A Afzal, V Aggarwal, H Akhavan-Hejazi, ... | | |
A constructivist and pragmatic training framework for blockchain education for IT practitioners ACY Leung, DYW Liu, X Luo, MH Au Education and Information Technologies, 1-42, 2024 | | 2024 |
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014 | 160 | 2014 |
A distributed trust evaluation protocol with privacy protection for intercloud Y Dou, HCB Chan, MH Au IEEE Transactions on Parallel and Distributed Systems 30 (6), 1208-1221, 2018 | 18 | 2018 |
A fog‐based collaborative intrusion detection framework for smart grid W Li, MH Au, Y Wang International Journal of Network Management 31 (2), e2107, 2021 | 13 | 2021 |
A game-theoretic method based on Q-learning to invalidate criminal smart contracts L Zhang, Y Wang, F Li, Y Hu, MH Au Information Sciences 498, 144-153, 2019 | 49 | 2019 |
A general framework for secure sharing of personal health records in cloud system MH Au, TH Yuen, JK Liu, W Susilo, X Huang, Y Xiang, ZL Jiang Journal of computer and system sciences 90, 46-62, 2017 | 99 | 2017 |