dblp.uni-trier.dewww.uni-trier.de

Duncan S. Wong

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
68 Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S. Wong: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings Springer 2008
67EEJin Li, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong: Generic Security-Amplifying Methods of Ordinary Digital Signatures. ACNS 2008: 224-241
66EEMan Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang: Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110
65EEQiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Ambiguous Optimistic Fair Exchange. ASIACRYPT 2008: 74-89
64EEQiong Huang, Guomin Yang, Duncan S. Wong, Willy Susilo: Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles. CT-RSA 2008: 106-120
63EEHuaxiong Wang, Duncan S. Wong: On Secret Reconstruction in Secret Sharing Schemes. IEEE Transactions on Information Theory 54(1): 473-480 (2008)
62EEQiong Huang, Duncan S. Wong: On the relation among various security models for certificateless cryptography. IJACT 1(2): 108-119 (2008)
61EEQiong Huang, Dennis Y. W. Liu, Duncan S. Wong: An efficient one-move Nominative Signature scheme. IJACT 1(2): 133-143 (2008)
60EEYan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments. Inf. Syst. E-Business Management 6(1): 25-48 (2008)
59EEQiong Huang, Duncan S. Wong, Jin Li, Yiming Zhao: Generic Transformation from Weakly to Strongly Unforgeable Signatures. J. Comput. Sci. Technol. 23(2): 240-252 (2008)
58EEGuomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng: Two-factor mutual authentication based on smart cards and passwords. J. Comput. Syst. Sci. 74(7): 1160-1172 (2008)
57 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
56 Guomin Yang, Duncan S. Wong, Xiaotie Deng: Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension. J. UCS 14(3): 441-462 (2008)
55EEYan Wang, Duncan S. Wong, Huaxiong Wang: Employ a mobile agent for making a payment. Mobile Information Systems 4(1): 51-68 (2008)
54EEGuomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang: A new framework for the design and analysis of identity-based identification schemes. Theor. Comput. Sci. 407(1-3): 370-388 (2008)
2007
53 Ed Dawson, Duncan S. Wong: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings Springer 2007
52EEQiong Huang, Duncan S. Wong: Generic Certificateless Key Encapsulation Mechanism. ACISP 2007: 215-229
51EEXinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu: Certificateless Signature Revisited. ACISP 2007: 308-322
50EEQiong Huang, Duncan S. Wong, Yiming Zhao: Generic Transformation to Strongly Unforgeable Signatures. ACNS 2007: 1-17
49EEGuomin Yang, Jing Chen, Duncan S. Wong, Xiaotie Deng, Dongsheng Wang: A More Natural Way to Construct Identity-Based Identification Schemes. ACNS 2007: 307-322
48EEBessie C. Hu, Duncan S. Wong, Qiong Huang, Guomin Yang, Xiaotie Deng: Time Capsule Signature: Efficient and Provably Secure Constructions. EuroPKI 2007: 126-142
47EESherman S. M. Chow, Duncan S. Wong: Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. EuroPKI 2007: 203-219
46EEChung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow: An Efficient Signcryption Scheme with Key Privacy. EuroPKI 2007: 78-93
45EEYan Wang, Duncan S. Wong, Kwei-Jay Lin, Vijay Varadharajan: The Design of A Rule-based and Event-driven Trust Management Framework. ICEBE 2007: 97-104
44EEHaimin Jin, Duncan S. Wong, Yinlong Xu: An Efficient Password-Only Two-Server Authenticated Key Exchange System. ICICS 2007: 44-56
43EEDennis Y. W. Liu, Duncan S. Wong, Xinyi Huang, Guilin Wang, Qiong Huang, Yi Mu, Willy Susilo: Formal Definition and Construction of Nominative Signature. ICICS 2007: 57-68
42EEQiong Huang, Duncan S. Wong: Generic Certificateless Encryption in the Standard Model. IWSEC 2007: 278-291
41EEDennis Y. W. Liu, Shuang Chang, Duncan S. Wong, Yi Mu: Nominative Signature from Ring Signature. IWSEC 2007: 396-411
40EEGuilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao: On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. Public Key Cryptography 2007: 43-60
39 Lifeng Guo, Guilin Wang, Duncan S. Wong, Lei Hu: Further Discussions on the Security of a Nominative Signature Scheme. Security and Management 2007: 566-572
38EEBessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng: Certificateless signature: a new security model and an improved generic construction. Des. Codes Cryptography 42(2): 109-126 (2007)
37EEGuomin Yang, Duncan S. Wong, Xiaotie Deng: Anonymous and Authenticated Key Exchange for Roaming Networks. IEEE Transactions on Wireless Communications 6(9): 3461-3472 (2007)
36EEDennis Y. W. Liu, Joseph K. Liu, Yi Mu, Willy Susilo, Duncan S. Wong: Revocable Ring Signature. J. Comput. Sci. Technol. 22(6): 785-794 (2007)
35EERobert W. Zhu, Guomin Yang, Duncan S. Wong: An efficient identity-based key exchange protocol with KGS forward secrecy for low-power devices. Theor. Comput. Sci. 378(2): 198-207 (2007)
2006
34EEBessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng: Key Replacement Attack Against a Generic Construction of Certificateless Signature. ACISP 2006: 235-246
33EEZhenfeng Zhang, Duncan S. Wong, Jing Xu, Dengguo Feng: Certificateless Public-Key Signature: Security Model and Efficient Construction. ACNS 2006: 293-308
32EEXiaojian Tian, Duncan S. Wong: Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. CT-RSA 2006: 34-51
31EEGuomin Yang, Duncan S. Wong, Huaxiong Wang, Xiaotie Deng: Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper). ICICS 2006: 82-91
30EEMan Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong: ID-Based Ring Signature Scheme Secure in the Standard Model. IWSEC 2006: 1-16
29EEJoseph K. Liu, Willy Susilo, Duncan S. Wong: Ring Signature with Designated Linkability. IWSEC 2006: 104-119
28EEGuomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang: Anonymous Signature Schemes. Public Key Cryptography 2006: 347-363
27EEShoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong: Generalised Cumulative Arrays in Secret Sharing. Des. Codes Cryptography 40(2): 191-209 (2006)
26EEReihaneh Safavi-Naini, Huaxiong Wang, Duncan S. Wong: Resilient Lkh: Secure Multicast Key Distribution Schemes. Int. J. Found. Comput. Sci. 17(5): 1205-1222 (2006)
25EEJoseph K. Liu, Duncan S. Wong: Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature. Int. J. Found. Comput. Sci. 17(6): 1403-1422 (2006)
2005
24EEGuomin Yang, Duncan S. Wong, Xiaotie Deng: Deposit-Case Attack Against Secure Roaming. ACISP 2005: 417-428
23EEGuomin Yang, Duncan S. Wong, Xiaotie Deng: Efficient Anonymous Roaming and Its Security Analysis. ACNS 2005: 334-349
22EEJoseph K. Liu, Patrick P. Tsang, Duncan S. Wong: Efficient Verifiable Ring Encryption for Ad Hoc Groups. ESAS 2005: 1-13
21EEJoseph K. Liu, Patrick P. Tsang, Duncan S. Wong: Recoverable and Untraceable E-Cash. EuroPKI 2005: 206-214
20EEJoseph K. Liu, Duncan S. Wong: Linkable Ring Signatures: Security Models and New Schemes. ICCSA (2) 2005: 614-623
19EEJoseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu: Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. ICISC 2005: 389-409
18EEDuncan S. Wong, Agnes Hui Chan, Feng Zhu: Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract). ICN (2) 2005: 827-834
17EEGuomin Yang, Duncan S. Wong, Xiaotie Deng: Analysis and Improvement of a Signcryption Scheme with Key Privacy. ISC 2005: 218-232
16EEJoseph K. Liu, Duncan S. Wong: A Restricted Multi-show Credential System and Its Application on E-Voting. ISPEC 2005: 268-279
15EEDuncan S. Wong: Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks. PerCom Workshops 2005: 284-288
14 Joseph K. Liu, Sandy H. Wong, Duncan S. Wong: Transferable E-Cash Revisit. SEC 2005: 171-188
13 Jonathan Wong, Duncan S. Wong: Known Session Key Attack Against a Collection of Signcryption Schemes. Security and Management 2005: 119-126
12EERobert W. Zhu, Guomin Yang, Duncan S. Wong: An Efficient Identity-Based Key Exchange Protocol with KGS Forward Secrecy for Low-Power Devices. WINE 2005: 500-509
2004
11EEJoseph K. Liu, Victor K. Wei, Duncan S. Wong: Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). ACISP 2004: 325-335
10EEJoseph K. Liu, Duncan S. Wong: On the Security Models of (Threshold) Ring Signature Schemes. ICISC 2004: 204-217
9EEPatrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong: Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004: 384-398
8EEJoseph K. Liu, Victor K. Wei, Duncan S. Wong: Custodian-Hiding Verifiable Encryption. WISA 2004: 51-64
2003
7EEDuncan S. Wong, Karyin Fung, Joseph K. Liu, Victor K. Wei: On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST. ICICS 2003: 34-46
6EEJoseph K. Liu, Victor K. Wei, Duncan S. Wong: A Separable Threshold Ring Signature Scheme. ICISC 2003: 12-26
5EEDuncan S. Wong, Agnes Hui Chan, Feng Zhu: More Efficient Password Authenticated Key Exchange Based on RSA. INDOCRYPT 2003: 375-387
2002
4EEFeng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye: Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks. ISC 2002: 150-161
3EEDuncan S. Wong: An optimized authentication protocol for mobile network reconsidered. Mobile Computing and Communications Review 6(4): 74-76 (2002)
2001
2EEDuncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan: The Performance Measurement of Cryptographic Primitives on Palm Devices. ACSAC 2001: 92-101
1EEDuncan S. Wong, Agnes Hui Chan: Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices. ASIACRYPT 2001: 272-289

Coauthor Index

1Man Ho Au [9] [30] [66]
2Joonsang Baek [40]
3Feng Bao [40]
4Agnes Hui Chan [1] [2] [4] [5] [18]
5Tony K. Chan [9]
6Shuang Chang [41]
7Jing Chen [49] [54]
8Liqun Chen [57]
9Sherman S. M. Chow [46] [47]
10Ed Dawson [53] [57]
11Xiaotie Deng [17] [23] [24] [28] [31] [34] [37] [38] [46] [48] [49] [54] [56] [58]
12Dengguo Feng [33]
13Matthew K. Franklin [68]
14Hector Ho Fuentes [2]
15Karyin Fung [7]
16Lifeng Guo [39]
17Bessie C. Hu [34] [38] [48]
18Lei Hu [39]
19Qiong Huang [42] [43] [48] [50] [52] [59] [61] [62] [64] [65] [66]
20Xinyi Huang [43] [51]
21Lucas Chi Kwong Hui [68]
22Haimin Jin [44]
23Kwangjo Kim [67]
24Xuejia Lai [57]
25Chung Ki Li [46]
26Jin Li [59] [67]
27Kwei-Jay Lin [45] [60]
28Dennis Y. W. Liu [36] [41] [43] [61]
29Joseph K. Liu [6] [7] [8] [9] [10] [11] [14] [16] [19] [20] [21] [22] [25] [29] [30] [36] [66]
30Shoulun Long [27]
31Masahiro Mambo [57]
32Atsuko Miyaji [57]
33Yi Mu [36] [41] [43] [51] [57]
34Josef Pieprzyk [27]
35David Pointcheval [57]
36Bart Preneel [57]
37Reihaneh Safavi-Naini [26]
38Nigel P. Smart [57]
39Willy Susilo [29] [36] [43] [51] [57] [64] [65] [66]
40Xiaojian Tian [32]
41Patrick P. Tsang [9] [19] [21] [22]
42Vijay Varadharajan [45] [60]
43Dongsheng Wang [49] [54]
44Guilin Wang [39] [40] [43]
45Huaxiong Wang [26] [27] [28] [31] [55] [57] [58] [63]
46Yan Wang [45] [55] [60]
47Victor K.-W. Wei (Victor K. Wei, Victor Keh-Wei Wei) [6] [7] [8] [9] [11]
48Jonathan Wong [13]
49Sandy H. Wong [14]
50Wei Wu [51]
51Jing Xu [33]
52Yinlong Xu [44]
53Guomin Yang [12] [17] [23] [24] [28] [31] [35] [37] [46] [48] [49] [54] [56] [58] [64] [65] [66]
54Robbie Ye [4]
55Tsz Hon Yuen [30]
56Fangguo Zhang [67]
57Zhenfeng Zhang [33] [34] [38]
58Yiming Zhao [50] [59]
59Feng Zhu [4] [5] [18]
60Robert W. Zhu [12] [19] [35]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)