| 2009 |
| 37 | EE | Sherman S. M. Chow:
Removing Escrow from Identity-Based Encryption.
Public Key Cryptography 2009: 256-276 |
| 2008 |
| 36 | EE | Sherman S. M. Chow,
Raphael C.-W. Phan:
Proxy Re-signatures in the Standard Model.
ISC 2008: 260-276 |
| 35 | EE | Sherman S. M. Chow,
Siu-Ming Yiu:
Timed-Release Encryption Revisited.
ProvSec 2008: 38-51 |
| 34 | EE | Sherman S. M. Chow,
Volker Roth,
Eleanor G. Rieffel:
General Certificateless Encryption and Timed-Release Encryption.
SCN 2008: 126-143 |
| 33 | | Yong Ho Hwang,
Joseph K. Liu,
Sherman S. M. Chow:
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model.
J. UCS 14(3): 463-480 (2008) |
| 2007 |
| 32 | EE | Wun-She Yap,
Sherman S. M. Chow,
Swee-Huay Heng,
Bok-Min Goi:
Security Mediated Certificateless Signatures.
ACNS 2007: 459-477 |
| 31 | EE | Sherman S. M. Chow:
Running on Karma - P2P Reputation and Currency Systems.
CANS 2007: 146-158 |
| 30 | EE | Sherman S. M. Chow,
Duncan S. Wong:
Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification.
EuroPKI 2007: 203-219 |
| 29 | EE | Chung Ki Li,
Guomin Yang,
Duncan S. Wong,
Xiaotie Deng,
Sherman S. M. Chow:
An Efficient Signcryption Scheme with Key Privacy.
EuroPKI 2007: 78-93 |
| 28 | EE | Sherman S. M. Chow,
Kim-Kwang Raymond Choo:
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.
ISC 2007: 203-220 |
| 27 | EE | Sherman S. M. Chow:
Token-Controlled Public Key Encryption in the Standard Model.
ISC 2007: 315-332 |
| 26 | EE | Patrick P. Tsang,
Sherman S. M. Chow,
Sean W. Smith:
Batch Pairing Delegation.
IWSEC 2007: 74-90 |
| 2006 |
| 25 | EE | Sherman S. M. Chow,
Victor K.-W. Wei,
Joseph K. Liu,
Tsz Hon Yuen:
Ring signatures without random oracles.
ASIACCS 2006: 297-302 |
| 24 | EE | Man Ho Au,
Sherman S. M. Chow,
Willy Susilo,
Patrick P. Tsang:
Short Linkable Ring Signatures Revisited.
EuroPKI 2006: 101-115 |
| 23 | EE | Sherman S. M. Chow:
Identity-Based Strong Multi-Designated Verifiers Signatures.
EuroPKI 2006: 257-259 |
| 22 | EE | Sherman S. M. Chow,
Colin Boyd,
Juan Manuel González Nieto:
Security-Mediated Certificateless Cryptography.
Public Key Cryptography 2006: 508-524 |
| 21 | EE | Sherman S. M. Chow,
Willy Susilo,
Tsz Hon Yuen:
Escrowed Linkability of Ring Signatures and Its Applications.
VIETCRYPT 2006: 175-192 |
| 20 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow:
Practical electronic lotteries with offline TTP.
Computer Communications 29(15): 2830-2840 (2006) |
| 2005 |
| 19 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings.
ACISP 2005: 316-328 |
| 18 | EE | Richard W. C. Lui,
Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu:
Role Activation Management in Role Based Access Control.
ACISP 2005: 358-369 |
| 17 | EE | Sherman S. M. Chow,
Siu-Ming Yiu,
Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature.
ACNS 2005: 499-512 |
| 16 | EE | Sherman S. M. Chow,
Zhengjun Cao,
Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes.
CISC 2005: 290-301 |
| 15 | EE | Sherman S. M. Chow,
Richard W. C. Lui,
Lucas Chi Kwong Hui,
Siu-Ming Yiu:
Identity Based Ring Signature: Why, How and What Next.
EuroPKI 2005: 144-161 |
| 14 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow:
An e-Lottery Scheme Using Verifiable Random Function.
ICCSA (3) 2005: 651-660 |
| 13 | EE | Sherman S. M. Chow,
Willy Susilo:
Generic Construction of (Identity-Based) Perfect Concurrent Signatures.
ICICS 2005: 194-206 |
| 12 | EE | Richard W. C. Lui,
Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu:
Supporting Efficient Authorization in Delegation with Supervision.
ICPADS (2) 2005: 240-244 |
| 11 | EE | Ai Fen Sui,
Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow,
Wai Wan Tsang,
C. F. Chong,
Kevin K. H. Pun,
H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing.
ICPADS (2) 2005: 275-279 |
| 10 | EE | Man Ho Au,
Sherman S. M. Chow,
Willy Susilo:
Short E-Cash.
INDOCRYPT 2005: 332-346 |
| 9 | EE | Sherman S. M. Chow,
Richard W. C. Lui,
Lucas Chi Kwong Hui,
Siu-Ming Yiu:
Identity Based Delegation Network.
Mycrypt 2005: 99-115 |
| 8 | | Sherman S. M. Chow,
Tsz Hon Yuen,
Lucas Chi Kwong Hui,
Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem.
SEC 2005: 443-457 |
| 7 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow:
Forward-secure multisignature and blind signature schemes.
Applied Mathematics and Computation 168(2): 895-908 (2005) |
| 6 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow,
Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level.
Journal of Systems and Software 75(1-2): 227-234 (2005) |
| 2004 |
| 5 | | Sherman S. M. Chow,
H. W. Go,
Ricky W. M. Tang:
Impact of Recent Advances in Crytography on Online Game.
ADCOG 2004: 68-73 |
| 4 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu,
K. P. Chow:
Secure Hierarchical Identity Based Signature and Its Application.
ICICS 2004: 480-494 |
| 3 | EE | Sherman S. M. Chow,
Lucas Chi Kwong Hui,
Siu-Ming Yiu:
Identity Based Threshold Ring Signature.
ICISC 2004: 218-232 |
| 2 | EE | Sherman S. M. Chow:
Verifiable Pairing and Its Applications.
WISA 2004: 170-187 |
| 2003 |
| 1 | EE | Sherman S. M. Chow,
Siu-Ming Yiu,
Lucas Chi Kwong Hui,
K. P. Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
ICISC 2003: 352-369 |