关注
Cheng-Kang Chu
Cheng-Kang Chu
Huawei International
在 huawei.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Key-aggregate cryptosystem for scalable data sharing in cloud storage
CK Chu, SSM Chow, WG Tzeng, J Zhou, RH Deng
IEEE transactions on parallel and distributed systems 25 (2), 468-477, 2013
4382013
Identity-based proxy re-encryption without random oracles
CK Chu, WG Tzeng
ISC 7, 189-202, 2007
2982007
Conditional proxy re-encryption secure against chosen-ciphertext attack
J Weng, RH Deng, X Ding, CK Chu, J Lai
Proceedings of the 4th international symposium on information, computer, and …, 2009
2442009
Conditional proxy broadcast re-encryption
CK Chu, J Weng, SSM Chow, J Zhou, RH Deng
Information Security and Privacy: 14th Australasian Conference, ACISP 2009 …, 2009
1632009
Dynamic secure cloud storage with provenance
SSM Chow, CK Chu, X Huang, J Zhou, RH Deng
Cryptography and Security: From Theory to Applications: Essays Dedicated to …, 2012
1532012
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries
CK Chu, WG Tzeng
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
1382005
Security concerns in popular cloud storage services
CK Chu, WT Zhu, J Han, JK Liu, J Xu, J Zhou
IEEE Pervasive Computing 12 (4), 50-57, 2013
1232013
Practical ID-based encryption for wireless sensor network
CK Chu, JK Liu, J Zhou, F Bao, RH Deng
Proceedings of the 5th ACM symposium on information, computer and …, 2010
622010
Time-bound anonymous authentication for roaming networks
JK Liu, CK Chu, SSM Chow, X Huang, MH Au, J Zhou
IEEE Transactions on Information Forensics and Security 10 (1), 178-189, 2014
612014
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
K Liang, CK Chu, X Tan, DS Wong, C Tang, J Zhou
Theoretical Computer Science 539, 87-105, 2014
422014
CloudHKA: A cryptographic approach for hierarchical access control in cloud computing
YR Chen, CK Chu, WG Tzeng, J Zhou
Applied Cryptography and Network Security: 11th International Conference …, 2013
422013
Privacy-preserving smart metering with regional statistics and personal enquiry services
CK Chu, JK Liu, JW Wong, Y Zhao, J Zhou
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
362013
Efficient k-out-of-n Oblivious Transfer Schemes.
CK Chu, WG Tzeng
J. Univers. Comput. Sci. 14 (3), 397-415, 2008
362008
Verifier-local revocation group signatures with time-bound keys
CK Chu, JK Liu, X Huang, J Zhou
Proceedings of the 7th ACM symposium on information, computer and …, 2012
322012
A threshold GQ signature scheme
LS Liu, CK Chu, WG Tzeng
ACNS, 137-150, 2003
192003
Optimal resilient threshold GQ signatures
CK Chu, WG Tzeng
Information sciences 177 (8), 1834-1851, 2007
142007
Identity-based server-aided decryption
JK Liu, CK Chu, J Zhou
Information Security and Privacy: 16th Australasian Conference, ACISP 2011 …, 2011
112011
A note on multiple error detection in ASCII numeric data communication
CK Chu
Journal of the ACM (JACM) 28 (2), 265-269, 1981
111981
Secure mobile subscription of sensor-encrypted data
CK Chu, WT Zhu, SSM Chow, J Zhou, RH Deng
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
92011
Identity-committable signatures and their extension to group-oriented ring signatures
CK Chu, WG Tzeng
Information Security and Privacy: 12th Australasian Conference, ACISP 2007 …, 2007
92007
系统目前无法执行此操作,请稍后再试。
文章 1–20