Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016 | 436 | 2016 |
Attribute-based signature and its applications J Li, MH Au, W Susilo, D Xie, K Ren Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 361 | 2010 |
Constant-Size Dynamic k-TAA MH Au, W Susilo, Y Mu Security and Cryptography for Networks: 5th International Conference, SCN …, 2006 | 303 | 2006 |
Malicious KGC attacks in certificateless cryptography MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 285 | 2007 |
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero SF Sun, MH Au, JK Liu, TH Yuen Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017 | 282 | 2017 |
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model JK Liu, MH Au, W Susilo Proceedings of the 2nd ACM symposium on Information, computer and …, 2007 | 282 | 2007 |
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption J Han, W Susilo, Y Mu, J Zhou, MHA Au IEEE transactions on information forensics and security 10 (3), 665-678, 2014 | 202 | 2014 |
Blacklistable anonymous credentials: blocking misbehaving users without TTPs PP Tsang, MH Au, A Kapadia, SW Smith Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 201 | 2007 |
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang Future Generation Computer Systems 52, 95-108, 2015 | 166 | 2015 |
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014 | 153 | 2014 |
Fine-grained two-factor access control for web-based cloud computing services JK Liu, MH Au, X Huang, R Lu, J Li IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015 | 139 | 2015 |
Separable linkable threshold ring signatures PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005 | 138 | 2005 |
Platform-independent secure blockchain-based voting system B Yu, JK Liu, A Sakzad, S Nepal, R Steinfeld, P Rimba, MH Au Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018 | 134 | 2018 |
Cloud data integrity checking with an identity-based auditing mechanism from RSA Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen Future Generation Computer Systems 62, 85-91, 2016 | 133 | 2016 |
Efficient attribute-based encryption with attribute revocation for assured data deletion L Xue, Y Yu, Y Li, MH Au, X Du, B Yang Information Sciences 479, 640-650, 2019 | 130 | 2019 |
ID-based ring signature scheme secure in the standard model MH Au, JK Liu, TH Yuen, DS Wong Advances in Information and Computer Security: First International Workshop …, 2006 | 129 | 2006 |
Short linkable ring signatures revisited MH Au, SSM Chow, W Susilo, PP Tsang Public Key Infrastructure: Third European PKI Workshop: Theory and Practice …, 2006 | 126 | 2006 |
Improvements on an authentication scheme for vehicular sensor networks JK Liu, TH Yuen, MH Au, W Susilo Expert Systems with Applications 41 (5), 2559-2564, 2014 | 125 | 2014 |
A survey on access control in fog computing P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo IEEE Communications Magazine 56 (2), 144-149, 2018 | 120 | 2018 |
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang Information Security Practice and Experience: 13th International Conference …, 2017 | 120 | 2017 |