2008 |
68 | | Matthew K. Franklin,
Lucas Chi Kwong Hui,
Duncan S. Wong:
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings
Springer 2008 |
67 | EE | Jin Li,
Kwangjo Kim,
Fangguo Zhang,
Duncan S. Wong:
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
ACNS 2008: 224-241 |
66 | EE | Man Ho Au,
Qiong Huang,
Joseph K. Liu,
Willy Susilo,
Duncan S. Wong,
Guomin Yang:
Traceable and Retrievable Identity-Based Encryption.
ACNS 2008: 94-110 |
65 | EE | Qiong Huang,
Guomin Yang,
Duncan S. Wong,
Willy Susilo:
Ambiguous Optimistic Fair Exchange.
ASIACRYPT 2008: 74-89 |
64 | EE | Qiong Huang,
Guomin Yang,
Duncan S. Wong,
Willy Susilo:
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
CT-RSA 2008: 106-120 |
63 | EE | Huaxiong Wang,
Duncan S. Wong:
On Secret Reconstruction in Secret Sharing Schemes.
IEEE Transactions on Information Theory 54(1): 473-480 (2008) |
62 | EE | Qiong Huang,
Duncan S. Wong:
On the relation among various security models for certificateless cryptography.
IJACT 1(2): 108-119 (2008) |
61 | EE | Qiong Huang,
Dennis Y. W. Liu,
Duncan S. Wong:
An efficient one-move Nominative Signature scheme.
IJACT 1(2): 133-143 (2008) |
60 | EE | Yan Wang,
Duncan S. Wong,
Kwei-Jay Lin,
Vijay Varadharajan:
Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments.
Inf. Syst. E-Business Management 6(1): 25-48 (2008) |
59 | EE | Qiong Huang,
Duncan S. Wong,
Jin Li,
Yiming Zhao:
Generic Transformation from Weakly to Strongly Unforgeable Signatures.
J. Comput. Sci. Technol. 23(2): 240-252 (2008) |
58 | EE | Guomin Yang,
Duncan S. Wong,
Huaxiong Wang,
Xiaotie Deng:
Two-factor mutual authentication based on smart cards and passwords.
J. Comput. Syst. Sci. 74(7): 1160-1172 (2008) |
57 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
56 | | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng:
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension.
J. UCS 14(3): 441-462 (2008) |
55 | EE | Yan Wang,
Duncan S. Wong,
Huaxiong Wang:
Employ a mobile agent for making a payment.
Mobile Information Systems 4(1): 51-68 (2008) |
54 | EE | Guomin Yang,
Jing Chen,
Duncan S. Wong,
Xiaotie Deng,
Dongsheng Wang:
A new framework for the design and analysis of identity-based identification schemes.
Theor. Comput. Sci. 407(1-3): 370-388 (2008) |
2007 |
53 | | Ed Dawson,
Duncan S. Wong:
Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings
Springer 2007 |
52 | EE | Qiong Huang,
Duncan S. Wong:
Generic Certificateless Key Encapsulation Mechanism.
ACISP 2007: 215-229 |
51 | EE | Xinyi Huang,
Yi Mu,
Willy Susilo,
Duncan S. Wong,
Wei Wu:
Certificateless Signature Revisited.
ACISP 2007: 308-322 |
50 | EE | Qiong Huang,
Duncan S. Wong,
Yiming Zhao:
Generic Transformation to Strongly Unforgeable Signatures.
ACNS 2007: 1-17 |
49 | EE | Guomin Yang,
Jing Chen,
Duncan S. Wong,
Xiaotie Deng,
Dongsheng Wang:
A More Natural Way to Construct Identity-Based Identification Schemes.
ACNS 2007: 307-322 |
48 | EE | Bessie C. Hu,
Duncan S. Wong,
Qiong Huang,
Guomin Yang,
Xiaotie Deng:
Time Capsule Signature: Efficient and Provably Secure Constructions.
EuroPKI 2007: 126-142 |
47 | EE | Sherman S. M. Chow,
Duncan S. Wong:
Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification.
EuroPKI 2007: 203-219 |
46 | EE | Chung Ki Li,
Guomin Yang,
Duncan S. Wong,
Xiaotie Deng,
Sherman S. M. Chow:
An Efficient Signcryption Scheme with Key Privacy.
EuroPKI 2007: 78-93 |
45 | EE | Yan Wang,
Duncan S. Wong,
Kwei-Jay Lin,
Vijay Varadharajan:
The Design of A Rule-based and Event-driven Trust Management Framework.
ICEBE 2007: 97-104 |
44 | EE | Haimin Jin,
Duncan S. Wong,
Yinlong Xu:
An Efficient Password-Only Two-Server Authenticated Key Exchange System.
ICICS 2007: 44-56 |
43 | EE | Dennis Y. W. Liu,
Duncan S. Wong,
Xinyi Huang,
Guilin Wang,
Qiong Huang,
Yi Mu,
Willy Susilo:
Formal Definition and Construction of Nominative Signature.
ICICS 2007: 57-68 |
42 | EE | Qiong Huang,
Duncan S. Wong:
Generic Certificateless Encryption in the Standard Model.
IWSEC 2007: 278-291 |
41 | EE | Dennis Y. W. Liu,
Shuang Chang,
Duncan S. Wong,
Yi Mu:
Nominative Signature from Ring Signature.
IWSEC 2007: 396-411 |
40 | EE | Guilin Wang,
Joonsang Baek,
Duncan S. Wong,
Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Public Key Cryptography 2007: 43-60 |
39 | | Lifeng Guo,
Guilin Wang,
Duncan S. Wong,
Lei Hu:
Further Discussions on the Security of a Nominative Signature Scheme.
Security and Management 2007: 566-572 |
38 | EE | Bessie C. Hu,
Duncan S. Wong,
Zhenfeng Zhang,
Xiaotie Deng:
Certificateless signature: a new security model and an improved generic construction.
Des. Codes Cryptography 42(2): 109-126 (2007) |
37 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng:
Anonymous and Authenticated Key Exchange for Roaming Networks.
IEEE Transactions on Wireless Communications 6(9): 3461-3472 (2007) |
36 | EE | Dennis Y. W. Liu,
Joseph K. Liu,
Yi Mu,
Willy Susilo,
Duncan S. Wong:
Revocable Ring Signature.
J. Comput. Sci. Technol. 22(6): 785-794 (2007) |
35 | EE | Robert W. Zhu,
Guomin Yang,
Duncan S. Wong:
An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices.
Theor. Comput. Sci. 378(2): 198-207 (2007) |
2006 |
34 | EE | Bessie C. Hu,
Duncan S. Wong,
Zhenfeng Zhang,
Xiaotie Deng:
Key Replacement Attack Against a Generic Construction of Certificateless Signature.
ACISP 2006: 235-246 |
33 | EE | Zhenfeng Zhang,
Duncan S. Wong,
Jing Xu,
Dengguo Feng:
Certificateless Public-Key Signature: Security Model and Efficient Construction.
ACNS 2006: 293-308 |
32 | EE | Xiaojian Tian,
Duncan S. Wong:
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.
CT-RSA 2006: 34-51 |
31 | EE | Guomin Yang,
Duncan S. Wong,
Huaxiong Wang,
Xiaotie Deng:
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
ICICS 2006: 82-91 |
30 | EE | Man Ho Au,
Joseph K. Liu,
Tsz Hon Yuen,
Duncan S. Wong:
ID-Based Ring Signature Scheme Secure in the Standard Model.
IWSEC 2006: 1-16 |
29 | EE | Joseph K. Liu,
Willy Susilo,
Duncan S. Wong:
Ring Signature with Designated Linkability.
IWSEC 2006: 104-119 |
28 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng,
Huaxiong Wang:
Anonymous Signature Schemes.
Public Key Cryptography 2006: 347-363 |
27 | EE | Shoulun Long,
Josef Pieprzyk,
Huaxiong Wang,
Duncan S. Wong:
Generalised Cumulative Arrays in Secret Sharing.
Des. Codes Cryptography 40(2): 191-209 (2006) |
26 | EE | Reihaneh Safavi-Naini,
Huaxiong Wang,
Duncan S. Wong:
Resilient Lkh: Secure Multicast Key Distribution Schemes.
Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006) |
25 | EE | Joseph K. Liu,
Duncan S. Wong:
Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature.
Int. J. Found. Comput. Sci. 17(6): 1403-1422 (2006) |
2005 |
24 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng:
Deposit-Case Attack Against Secure Roaming.
ACISP 2005: 417-428 |
23 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng:
Efficient Anonymous Roaming and Its Security Analysis.
ACNS 2005: 334-349 |
22 | EE | Joseph K. Liu,
Patrick P. Tsang,
Duncan S. Wong:
Efficient Verifiable Ring Encryption for Ad Hoc Groups.
ESAS 2005: 1-13 |
21 | EE | Joseph K. Liu,
Patrick P. Tsang,
Duncan S. Wong:
Recoverable and Untraceable E-Cash.
EuroPKI 2005: 206-214 |
20 | EE | Joseph K. Liu,
Duncan S. Wong:
Linkable Ring Signatures: Security Models and New Schemes.
ICCSA (2) 2005: 614-623 |
19 | EE | Joseph K. Liu,
Patrick P. Tsang,
Duncan S. Wong,
Robert W. Zhu:
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.
ICISC 2005: 389-409 |
18 | EE | Duncan S. Wong,
Agnes Hui Chan,
Feng Zhu:
Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract).
ICN (2) 2005: 827-834 |
17 | EE | Guomin Yang,
Duncan S. Wong,
Xiaotie Deng:
Analysis and Improvement of a Signcryption Scheme with Key Privacy.
ISC 2005: 218-232 |
16 | EE | Joseph K. Liu,
Duncan S. Wong:
A Restricted Multi-show Credential System and Its Application on E-Voting.
ISPEC 2005: 268-279 |
15 | EE | Duncan S. Wong:
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks.
PerCom Workshops 2005: 284-288 |
14 | | Joseph K. Liu,
Sandy H. Wong,
Duncan S. Wong:
Transferable E-Cash Revisit.
SEC 2005: 171-188 |
13 | | Jonathan Wong,
Duncan S. Wong:
Known Session Key Attack Against a Collection of Signcryption Schemes.
Security and Management 2005: 119-126 |
12 | EE | Robert W. Zhu,
Guomin Yang,
Duncan S. Wong:
An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices.
WINE 2005: 500-509 |
2004 |
11 | EE | Joseph K. Liu,
Victor K. Wei,
Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract).
ACISP 2004: 325-335 |
10 | EE | Joseph K. Liu,
Duncan S. Wong:
On the Security Models of (Threshold) Ring Signature Schemes.
ICISC 2004: 204-217 |
9 | EE | Patrick P. Tsang,
Victor K. Wei,
Tony K. Chan,
Man Ho Au,
Joseph K. Liu,
Duncan S. Wong:
Separable Linkable Threshold Ring Signatures.
INDOCRYPT 2004: 384-398 |
8 | EE | Joseph K. Liu,
Victor K. Wei,
Duncan S. Wong:
Custodian-Hiding Verifiable Encryption.
WISA 2004: 51-64 |
2003 |
7 | EE | Duncan S. Wong,
Karyin Fung,
Joseph K. Liu,
Victor K. Wei:
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
ICICS 2003: 34-46 |
6 | EE | Joseph K. Liu,
Victor K. Wei,
Duncan S. Wong:
A Separable Threshold Ring Signature Scheme.
ICISC 2003: 12-26 |
5 | EE | Duncan S. Wong,
Agnes Hui Chan,
Feng Zhu:
More Efficient Password Authenticated Key Exchange Based on RSA.
INDOCRYPT 2003: 375-387 |
2002 |
4 | EE | Feng Zhu,
Duncan S. Wong,
Agnes Hui Chan,
Robbie Ye:
Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
ISC 2002: 150-161 |
3 | EE | Duncan S. Wong:
An optimized authentication protocol for mobile network reconsidered.
Mobile Computing and Communications Review 6(4): 74-76 (2002) |
2001 |
2 | EE | Duncan S. Wong,
Hector Ho Fuentes,
Agnes Hui Chan:
The Performance Measurement of Cryptographic Primitives on Palm Devices.
ACSAC 2001: 92-101 |
1 | EE | Duncan S. Wong,
Agnes Hui Chan:
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.
ASIACRYPT 2001: 272-289 |