default search action
Man Ho Au
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j99]Ze Zhang, Chingfang Hsu, Man Ho Au, Lein Harn, Jianqun Cui, Zhe Xia, Zhuo Zhao:
PRLAP-IoD: A PUF-based Robust and Lightweight Authentication Protocol for Internet of Drones. Comput. Networks 238: 110118 (2024) - [j98]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
An Identity-Based Encryption with Equality Test scheme for healthcare social apps. Comput. Stand. Interfaces 87: 103759 (2024) - [j97]Alven C. Y. Leung, Dennis Y. W. Liu, Xiapu Luo, Man Ho Au:
A constructivist and pragmatic training framework for blockchain education for IT practitioners. Educ. Inf. Technol. 29(12): 15813-15854 (2024) - [j96]Yang Shi, Tianyuan Luo, Jingwen Liang, Man Ho Au, Xiapu Luo:
Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains. IEEE Trans. Dependable Secur. Comput. 21(4): 2982-2996 (2024) - [j95]Xiao Yang, Chengru Zhang, Haiyang Xue, Man Ho Au:
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions. IEEE Trans. Inf. Forensics Secur. 19: 4161-4173 (2024) - [j94]Zoe L. Jiang, Min Xie, Hanlin Chen, Yijian Pan, Jiazhuo Lyu, Man Ho Au, Junbin Fang, Yang Liu, Xuan Wang:
RPSC: Regulatable Privacy-Preserving Smart Contracts on Account-Based Blockchain. IEEE Trans. Netw. Sci. Eng. 11(5): 4822-4835 (2024) - [c130]Salil Kanhere, Laura Ricci, Man Ho Au:
Message from the Program Chairs: Blockchain 2024. Blockchain 2024: xx-xxi - [c129]Jinghui Liao, Borui Gong, Wenhai Sun, Fengwei Zhang, Zhenyu Ning, Man Ho Au, Weisong Shi:
BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts. DSN 2024: 389-402 - [c128]Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang:
Efficient Linkable Ring Signatures: New Framework and Post-quantum Instantiations. ESORICS (4) 2024: 435-456 - [c127]Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem. SP 2024: 1813-1831 - [i50]Chi Zhang, Man Ho Au, Siu Ming Yiu:
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement. CoRR abs/2402.11224 (2024) - [i49]Yuxi Xue, Xingye Lu, Man Ho Au, Chengru Zhang:
Efficient Linkable Ring Signatures: New Framework and Post-Quantum Instantiations. IACR Cryptol. ePrint Arch. 2024: 553 (2024) - [i48]Borui Gong, Wang Fat Lau, Man Ho Au, Rupeng Yang, Haiyang Xue, Lichun Li:
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem. IACR Cryptol. ePrint Arch. 2024: 1303 (2024) - [i47]Zhikang Xie, Mengling Liu, Haiyang Xue, Man Ho Au, Robert H. Deng, Siu-Ming Yiu:
Direct Range Proofs for Paillier Cryptosystem and Their Applications. IACR Cryptol. ePrint Arch. 2024: 1355 (2024) - [i46]Xingye Lu, Jingjing Fan, Man Ho Au:
Relaxed Lattice-Based Programmable Hash Functions: New Efficient Adaptively Secure IBEs. IACR Cryptol. ePrint Arch. 2024: 1535 (2024) - 2023
- [j93]Haoqing Wang, Ran Yan, Man Ho Au, Shuaian Wang, Yong Jimmy Jin:
Federated learning for green shipping optimization and management. Adv. Eng. Informatics 56: 101994 (2023) - [j92]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Allen Au, Qiong Huang:
Secure channel free public key authenticated encryption with multi-keyword search on healthcare systems. Future Gener. Comput. Syst. 145: 511-520 (2023) - [j91]Jingwei Lu, Hongbo Li, Jianye Huang, Sha Ma, Man Ho Allen Au, Qiong Huang:
Certificateless Public Key Authenticated Encryption with Keyword Search Achieving Stronger Security. Inf. 14(3): 142 (2023) - [j90]Junbin Liang, Jianye Huang, Qiong Huang, Liantao Lan, Man Ho Allen Au:
A Lattice-Based Certificateless Traceable Ring Signature Scheme. Inf. 14(3): 160 (2023) - [j89]Ching-Fang Hsu, Zhe Xia, Lein Harn, Man Ho Au, Jianqun Cui, Zhuo Zhao:
Ideal dynamic threshold Multi-secret data sharing in smart environments for sustainable cities. Inf. Sci. 647: 119488 (2023) - [j88]Junbin Liang, Qiong Huang, Jianye Huang, Liantao Lan, Man Ho Allen Au:
An identity-based traceable ring signatures based on lattice. Peer Peer Netw. Appl. 16(2): 1270-1285 (2023) - [j87]Huayi Duan, Yuefeng Du, Leqian Zheng, Cong Wang, Man Ho Au, Qian Wang:
Towards Practical Auditing of Dynamic Data in Decentralized Storage. IEEE Trans. Dependable Secur. Comput. 20(1): 708-723 (2023) - [j86]Chengru Zhang, Xinyu Li, Man Ho Au:
ePoSt: Practical and Client-Friendly Proof of Storage-Time. IEEE Trans. Inf. Forensics Secur. 18: 1052-1063 (2023) - [j85]Li Tang, Qingqing Ye, Haibo Hu, Man Ho Au:
Secure Traffic Monitoring With Spatio-Temporal Metadata Protection Using Oblivious RAM. IEEE Trans. Intell. Transp. Syst. 24(12): 14903-14913 (2023) - [j84]Jianbing Ni, Man Ho Au, Wei Wu, Xiapu Luo, Xiaodong Lin, Xuemin Sherman Shen:
Dual-Anonymous Off-Line Electronic Cash for Mobile Payment. IEEE Trans. Mob. Comput. 22(6): 3303-3317 (2023) - [c126]Jingjing Fan, Xingye Lu, Man Ho Au:
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors. ACISP 2023: 320-340 - [c125]Hiu Long Lee, Man Ho Allen Au, Shifeng Sun:
Blockchain-based Trustless Fair Payment Protocol for Verifiable Confidential Outsourcing Computation. Blockchain 2023: 221-228 - [c124]Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. CCS 2023: 2974-2988 - [c123]Qingqing Ye, Haibo Hu, Kai Huang, Man Ho Au, Qiao Xue:
Stateful Switch: Optimized Time Series Release with Local Differential Privacy. INFOCOM 2023: 1-10 - [c122]Fengling Pang, Chingfang Hsu, Man Ho Au, Lein Harn, Ze Zhang, Li Long:
Efficient and Secure Authentication Key Establishment Protocol Using Chaotic Map and PUF in Smart Environments. TrustCom 2023: 849-856 - [e10]Mingwu Zhang, Man Ho Au, Yudi Zhang:
Provable and Practical Security - 17th International Conference, ProvSec 2023, Wuhan, China, October 20-22, 2023, Proceedings. Lecture Notes in Computer Science 14217, Springer 2023, ISBN 978-3-031-45512-4 [contents] - [i45]Haiyang Xue, Man Ho Au, Mengling Liu, Kwan Yin Chan, Handong Cui, Xiang Xie, Tsz Hon Yuen, Chengru Zhang:
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA. IACR Cryptol. ePrint Arch. 2023: 1312 (2023) - 2022
- [j83]Shabnam Kasra Kermanshahi, Shifeng Sun, Joseph K. Liu, Ron Steinfeld, Surya Nepal, Wang Fat Lau, Man Ho Allen Au:
Geometric Range Search on Encrypted Data With Forward/Backward Security. IEEE Trans. Dependable Secur. Comput. 19(1): 698-716 (2022) - [j82]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain. IEEE Trans. Dependable Secur. Comput. 19(5): 3038-3054 (2022) - [j81]Xiao Yang, Mengling Liu, Man Ho Au, Xiapu Luo, Qingqing Ye:
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications. IEEE Trans. Inf. Forensics Secur. 17: 1573-1582 (2022) - [j80]Qingqing Ye, Haibo Hu, Man Ho Au, Xiaofeng Meng, Xiaokui Xiao:
LF-GDPR: A Framework for Estimating Graph Metrics With Local Differential Privacy. IEEE Trans. Knowl. Data Eng. 34(10): 4905-4920 (2022) - [c121]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. AsiaCCS 2022: 138-152 - [c120]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. CRYPTO (2) 2022: 637-667 - [c119]Lixin Liu, Xinyu Li, Man Ho Au, Zhuoya Fan, Xiaofeng Meng:
Metadata Privacy Preservation for Blockchain-Based Healthcare Systems. DASFAA (1) 2022: 404-412 - [c118]Mengling Liu, Man Ho Au:
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks. NSS 2022: 547-560 - [c117]Pan Yang, Hongbo Li, Jianye Huang, Hao Zhang, Man Ho Au, Qiong Huang:
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search. ProvSec 2022: 20-35 - [i44]Qingqing Ye, Haibo Hu, Kai Huang, Man Ho Au, Qiao Xue:
Stateful Switch: Optimized Time Series Release with Local Differential Privacy. CoRR abs/2212.08792 (2022) - [i43]Zhimei Sui, Joseph K. Liu, Jiangshan Yu, Man Ho Au, Jia Liu:
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains. IACR Cryptol. ePrint Arch. 2022: 117 (2022) - [i42]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. IACR Cryptol. ePrint Arch. 2022: 318 (2022) - [i41]Rupeng Yang, Zuoxia Yu, Man Ho Au, Willy Susilo:
Public-Key Watermarking Schemes for Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2022: 768 (2022) - 2021
- [j79]Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inf. Sec. 20(2): 127-139 (2021) - [j78]Wenjuan Li, Man Ho Au, Yu Wang:
A fog-based collaborative intrusion detection framework for smart grid. Int. J. Netw. Manag. 31(2) (2021) - [j77]Yannan Li, Guomin Yang, Willy Susilo, Yong Yu, Man Ho Au, Dongxi Liu:
Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability. IEEE Trans. Dependable Secur. Comput. 18(2): 679-691 (2021) - [j76]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Xinyi Huang, Joseph K. Liu:
Efficient and Adaptive Procurement Protocol with Purchasing Privacy. IEEE Trans. Serv. Comput. 14(3): 683-694 (2021) - [j75]Peng Jiang, Fuchun Guo, Willy Susilo, Man Ho Au, Jianchang Lai, Wenmin Li:
PPFilter: Provider Privacy-Aware Encrypted Filtering System. IEEE Trans. Serv. Comput. 14(5): 1519-1530 (2021) - [c116]Wang Fat Lau, Dennis Y. W. Liu, Man Ho Au:
Blockchain-Based Supply Chain System for Traceability, Regulation and Anti-Counterfeiting. Blockchain 2021: 82-89 - [c115]Haiyang Xue, Man Ho Au, Xiang Xie, Tsz Hon Yuen, Handong Cui:
Efficient Online-friendly Two-Party ECDSA Signature. CCS 2021: 558-573 - [c114]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. CRYPTO (1) 2021: 251-281 - [c113]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li, Kim-Kwang Raymond Choo:
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach. ISPEC 2021: 327-344 - [c112]Ji Qi, Xusheng Chen, Yunpeng Jiang, Jianyu Jiang, Tianxiang Shen, Shixiong Zhao, Sen Wang, Gong Zhang, Li Chen, Man Ho Au, Heming Cui:
Bidl: A High-throughput, Low-latency Permissioned Blockchain Framework for Datacenter Networks. SOSP 2021: 18-34 - [c111]Lei Xue, Hao Zhou, Xiapu Luo, Yajin Zhou, Yang Shi, Guofei Gu, Fengwei Zhang, Man Ho Au:
Happer: Unpacking Android Apps via a Hardware-Assisted Approach. SP 2021: 1641-1658 - [e9]Jiannong Cao, Man Ho Au, Zhiqiang Lin, Moti Yung:
ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, Virtual Event, Hong Kong, June 7-11, 2021. ACM 2021, ISBN 978-1-4503-8287-8 [contents] - [e8]Jiannong Cao, Man Ho Au, Mauro Conti, Nils Ole Tippenhauer, Alessandro Brighente:
Proceedings of the 7th ACM on Cyber-Physical System Security Workshop, CPSS@AsiaCCS 2021, Virtual Event / Hong Kong, 7 June 2021. ACM 2021, ISBN 978-1-4503-8402-5 [contents] - [i40]Tsz Hon Yuen, Muhammed F. Esgin, Joseph K. Liu, Man Ho Au, Zhimin Ding:
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations. IACR Cryptol. ePrint Arch. 2021: 1213 (2021) - 2020
- [j74]Kang Li, Wang Fat Lau, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
Efficient Message Authentication with Revocation Transparency Using Blockchain for Vehicular Networks. Comput. Electr. Eng. 86: 106721 (2020) - [j73]Man Ho Au, Jinguang Han, Qianhong Wu, Colin Boyd:
Special Issue on Cryptographic Currency and Blockchain Technology. Future Gener. Comput. Syst. 107: 758-759 (2020) - [j72]Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener. Comput. Syst. 108: 1258-1266 (2020) - [j71]Wenjuan Li, Weizhi Meng, Zhiqiang Liu, Man Ho Au:
Towards Blockchain-Based Software-Defined Networking: Security Challenges and Solutions. IEICE Trans. Inf. Syst. 103-D(2): 196-203 (2020) - [j70]Wenjuan Li, Weizhi Meng, Man Ho Au:
Enhancing collaborative intrusion detection via disagreement-based semi-supervised learning in IoT environments. J. Netw. Comput. Appl. 161: 102631 (2020) - [j69]Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation. Theor. Comput. Sci. 847: 1-16 (2020) - [j68]Xiao Yang, Wang Fat Lau, Qingqing Ye, Man Ho Au, Joseph K. Liu, Jacob Cheng:
Practical Escrow Protocol for Bitcoin. IEEE Trans. Inf. Forensics Secur. 15: 3023-3034 (2020) - [c110]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting. ASIACRYPT (1) 2020: 191-220 - [c109]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. CRYPTO (1) 2020: 590-620 - [c108]Yu Chen, Xuecheng Ma, Cong Tang, Man Ho Au:
PGC: Decentralized Confidential Payment System with Auditability. ESORICS (1) 2020: 591-610 - [c107]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. Financial Cryptography 2020: 464-483 - [c106]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. ICDCS 2020: 201-211 - [c105]Yue Fu, Man Ho Au, Rong Du, Haibo Hu, Dagang Li:
Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers. ICDCS 2020: 1209-1210 - [c104]Qingqing Ye, Haibo Hu, Man Ho Au, Xiaofeng Meng, Xiaokui Xiao:
Towards Locally Differentially Private Generic Graph Metric Estimation. ICDE 2020: 1922-1925 - [e7]Jianying Zhou, Mauro Conti, Chuadhry Mujeeb Ahmed, Man Ho Au, Lejla Batina, Zhou Li, Jingqiang Lin, Eleonora Losiouk, Bo Luo, Suryadipta Majumdar, Weizhi Meng, Martín Ochoa, Stjepan Picek, Georgios Portokalidis, Cong Wang, Kehuan Zhang:
Applied Cryptography and Network Security Workshops - ACNS 2020 Satellite Workshops, AIBlock, AIHWS, AIoTS, Cloud S&P, SCI, SecMT, and SiMLA, Rome, Italy, October 19-22, 2020, Proceedings. Lecture Notes in Computer Science 12418, Springer 2020, ISBN 978-3-030-61637-3 [contents] - [i39]Yuefeng Du, Huayi Duan, Anxin Zhou, Cong Wang, Man Ho Au, Qian Wang:
Towards Privacy-assured and Lightweight On-chain Auditing of Decentralized Storage. CoRR abs/2005.05531 (2020) - [i38]Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, Li Li:
Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. IACR Cryptol. ePrint Arch. 2020: 528 (2020) - [i37]Rupeng Yang, Man Ho Au, Zuoxia Yu, Qiuliang Xu:
Collusion Resistant Watermarkable PRFs from Standard Assumptions. IACR Cryptol. ePrint Arch. 2020: 695 (2020) - [i36]Rupeng Yang, Junzuo Lai, Zhengan Huang, Man Ho Au, Qiuliang Xu, Willy Susilo:
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-Challenge Setting. IACR Cryptol. ePrint Arch. 2020: 1080 (2020) - [i35]Haiyang Xue, Man Ho Au, Rupeng Yang, Bei Liang, Haodong Jiang:
Compact Authenticated Key Exchange in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2020: 1282 (2020)
2010 – 2019
- 2019
- [j67]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. Comput. Secur. 85: 353-371 (2019) - [j66]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. Des. Codes Cryptogr. 87(6): 1345-1371 (2019) - [j65]Lingyue Zhang, Huilin Li, Yannan Li, Yong Yu, Man Ho Au, Baocang Wang:
An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Gener. Comput. Syst. 101: 29-38 (2019) - [j64]Dagang Li, Rong Du, Yue Fu, Man Ho Au:
Meta-Key: A Secure Data-Sharing Protocol Under Blockchain-Based Decentralized Storage Architecture. IEEE Netw. Lett. 1(1): 30-33 (2019) - [j63]Peng Jiang, Jianchang Lai, Fuchun Guo, Willy Susilo, Man Ho Au, Guomin Yang, Yi Mu, Rongmao Chen:
Identity-based revocation system: Enhanced security model and scalable bounded IBRS construction with short parameters. Inf. Sci. 472: 35-52 (2019) - [j62]Liang Xue, Yong Yu, Yannan Li, Man Ho Au, Xiaojiang Du, Bo Yang:
Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479: 640-650 (2019) - [j61]Lifeng Zhang, Yilei Wang, Fengyin Li, Yuemei Hu, Man Ho Au:
A game-theoretic method based on Q-learning to invalidate criminal smart contracts. Inf. Sci. 498: 144-153 (2019) - [j60]Yang Shi, Wujing Wei, Hongfei Fan, Man Ho Au, Xiapu Luo:
A Light-Weight White-Box Encryption Scheme for Securing Distributed Embedded Devices. IEEE Trans. Computers 68(10): 1411-1427 (2019) - [j59]Yi Dou, Henry C. B. Chan, Man Ho Au:
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud. IEEE Trans. Parallel Distributed Syst. 30(6): 1208-1221 (2019) - [j58]Lei Zhang, Mingxing Luo, Jiangtao Li, Man Ho Au, Kim-Kwang Raymond Choo, Tong Chen, Shengwei Tian:
Blockchain based secure data sharing system for Internet of vehicles: A position paper. Veh. Commun. 16: 85-93 (2019) - [c103]Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. ACNS 2019: 110-130 - [c102]Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Towards Blockchained Challenge-Based Collaborative Intrusion Detection. ACNS Workshops 2019: 122-139 - [c101]Shifeng Sun, Dawu Gu, Man Ho Au, Shuai Han, Yu Yu, Joseph K. Liu:
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System. ACNS 2019: 486-506 - [c100]Dipayan Das, Man Ho Au, Zhenfei Zhang:
Ring Signatures Based on Middle-Product Learning with Errors Problems. AFRICACRYPT 2019: 139-156 - [c99]Xiu Xu, Haiyang Xue, Kunpeng Wang, Man Ho Au, Song Tian:
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies. ASIACRYPT (1) 2019: 278-308 - [c98]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. ASIACRYPT (1) 2019: 371-398 - [c97]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. CRYPTO (1) 2019: 147-175 - [c96]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-Thinking Untraceability in the CryptoNote-Style Blockchain. CSF 2019: 94-107 - [c95]Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, Wang Fat Lau:
New Empirical Traceability Analysis of CryptoNote-Style Blockchains. Financial Cryptography 2019: 133-149 - [c94]Kang Li, Wang Fat Lau, Man Ho Au:
A Secure and Efficient Privacy-Preserving Authentication Scheme for Vehicular Networks with Batch Verification Using Cuckoo Filter. NSS 2019: 615-631 - [c93]Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxin Zhou, Cong Wang, Man Ho Au:
Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization. PerCom 2019: 1-10 - [c92]Kang Li, Man Ho Au, Ivan Wang Hei Ho, Yilei Wang:
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature. ProvSec 2019: 59-76 - [c91]Borui Gong, Xingye Lu, Wang Fat Lau, Man Ho Au:
Blockchain-Based Threshold Electronic Voting System. SocialSec 2019: 238-250 - [c90]Dennis Y. W. Liu, Alven C. Y. Leung, Man Ho Au, Xiapu Luo, Pit Ho Patrio Chiu, Siu Wo Tarloff Im, Winnie W. M. Lam:
Virtual Laboratory: Facilitating Teaching and Learning in Cybersecurity for Students with Diverse Disciplines. TALE 2019: 1-6 - [c89]Jiazhuo Lyu, Zoe Lin Jiang, Xuan Wang, Zhenhao Nong, Man Ho Au, Junbin Fang:
A Secure Decentralized Trustless E-Voting System Based on Smart Contract. TrustCom/BigDataSE 2019: 570-577 - [c88]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. TrustCom/BigDataSE 2019: 578-585 - [c87]Borui Gong, Man Ho Au, Haiyang Xue:
Constructing Strong Designated Verifier Signatures from Key Encapsulation Mechanisms. TrustCom/BigDataSE 2019: 586-593 - [p4]Zuoxia Yu, Man Ho Au, Rupeng Yang:
Accountable Anonymous Credentials. Advances in Cyber Security 2019: 49-68 - [i34]Yue Fu, Rong Du, Haibo Hu, Man Ho Au, Dagang Li:
Matrix Bloom Filter: An Efficient Probabilistic Data Structure for 2-tuple Batch Lookup. CoRR abs/1912.07153 (2019) - [i33]Jiangshan Yu, Man Ho Allen Au, Paulo Jorge Esteves Veríssimo:
Re-thinking untraceability in the CryptoNote-style blockchain. IACR Cryptol. ePrint Arch. 2019: 186 (2019) - [i32]Tsz Hon Yuen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Muhammed F. Esgin, Qingzhao Zhang, Dawu Gu:
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security. IACR Cryptol. ePrint Arch. 2019: 508 (2019) - [i31]Xingye Lu, Man Ho Au, Zhenfei Zhang:
(Linkable) Ring Signature from Hash-Then-One-Way Signature. IACR Cryptol. ePrint Arch. 2019: 567 (2019) - [i30]Rupeng Yang, Man Ho Au, Zhenfei Zhang, Qiuliang Xu, Zuoxia Yu, William Whyte:
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications. IACR Cryptol. ePrint Arch. 2019: 747 (2019) - 2018
- [j57]Yi Dou, Henry C. B. Chan, Man Ho Au:
Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage. Comput. J. 61(12): 1806-1824 (2018) - [j56]Peng Zhang, Joseph K. Liu, F. Richard Yu, Mehdi Sookhak, Man Ho Au, Xiapu Luo:
A Survey on Access Control in Fog Computing. IEEE Commun. Mag. 56(2): 144-149 (2018) - [j55]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional encryption for computational hiding in prime order groups via pair encodings. Des. Codes Cryptogr. 86(1): 97-120 (2018) - [j54]Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Towards leakage-resilient fine-grained access control in fog computing. Future Gener. Comput. Syst. 78: 763-777 (2018) - [j53]Rupeng Yang, Qiuliang Xu, Man Ho Au, Zuoxia Yu, Hao Wang, Lu Zhou:
Position based cryptography with location privacy: A step for Fog Computing. Future Gener. Comput. Syst. 78: 799-806 (2018) - [j52]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu, Jianting Ning:
Privacy-preserving personal data operation on mobile cloud - Chances and challenges over advanced persistent threat. Future Gener. Comput. Syst. 79: 337-349 (2018) - [j51]Shuang Zhao, Xiapu Luo, Xiaobo Ma, Bo Bai, Yankang Zhao, Wei Zou, Zeming Yang, Man Ho Au, Xinliang Qiu:
Exploiting Proximity-Based Mobile Apps for Large-Scale Location Privacy Probing. Secur. Commun. Networks 2018: 3182402:1-3182402:22 (2018) - [j50]Hao Wang, Debiao He, Jian Shen, Zhihua Zheng, Xiaoyan Yang, Man Ho Au:
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps. Soft Comput. 22(7): 2267-2274 (2018) - [c86]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. ACISP 2018: 502-519 - [c85]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ACISP 2018: 558-576 - [c84]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. ACISP 2018: 720-738 - [c83]Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. ACISP 2018: 805-812 - [c82]Xingye Lu, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. ACISP 2018: 813-820 - [c81]Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption. AsiaCCS 2018: 659-672 - [c80]Jianfeng Wang, Xiaofeng Chen, Shifeng Sun, Joseph K. Liu, Man Ho Au, Zhi-Hui Zhan:
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database. ESORICS (2) 2018: 83-100 - [c79]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. Financial Cryptography 2018: 461-479 - [c78]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, Man Ho Au:
Platform-Independent Secure Blockchain-Based Voting System. ISC 2018: 369-386 - [c77]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Public Key Cryptography (1) 2018: 253-279 - [c76]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Unforgeable Watermarking Schemes with Public Extraction. SCN 2018: 63-80 - [c75]Cheng Xu, Jianliang Xu, Haibo Hu, Man Ho Au:
When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach. SIGMOD Conference 2018: 147-162 - [e6]Man Ho Au, Siu-Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak:
Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings. Lecture Notes in Computer Science 11058, Springer 2018, ISBN 978-3-030-02743-8 [contents] - [i29]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. IACR Cryptol. ePrint Arch. 2018: 25 (2018) - [i28]Kamil Kluczniak, Man Ho Au:
Fine-Tuning Decentralized Anonymous Payment Systems based on Arguments for Arithmetic Circuit Satisfiability. IACR Cryptol. ePrint Arch. 2018: 176 (2018) - [i27]Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). IACR Cryptol. ePrint Arch. 2018: 379 (2018) - [i26]Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Paul Rimba, Ron Steinfeld, Man Ho Au:
Platform-independent Secure Blockchain-Based Voting System. IACR Cryptol. ePrint Arch. 2018: 657 (2018) - [i25]Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-Based Selective Opening Security for Receivers under Chosen-Ciphertext Attacks. IACR Cryptol. ePrint Arch. 2018: 755 (2018) - [i24]Xingye Lu, Man Ho Au, Zhenfei Zhang:
Raptor: A Practical Lattice-Based (Linkable) Ring Signature. IACR Cryptol. ePrint Arch. 2018: 857 (2018) - 2017
- [j49]Man Ho Au, Joseph K. Liu, Zhenfei Zhang, Willy Susilo, Jin Li:
Anonymous Announcement System (AAS) for Electric Vehicle in VANETs. Comput. J. 60(4): 588-599 (2017) - [j48]Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo:
Cloud computing security and privacy: Standards and regulations. Comput. Stand. Interfaces 54: 1-2 (2017) - [j47]Man Ho Au, Tsz Hon Yuen, Joseph K. Liu, Willy Susilo, Xinyi Huang, Yang Xiang, Zoe Lin Jiang:
A general framework for secure sharing of personal health records in cloud system. J. Comput. Syst. Sci. 90: 46-62 (2017) - [j46]Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies. Pervasive Mob. Comput. 41: 270-285 (2017) - [j45]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 775 (2017) - [j44]Joseph K. Liu, Kim-Kwang Raymond Choo, Xinyi Huang, Man Ho Au:
Erratum to: Special issue on security and privacy for smart cities. Pers. Ubiquitous Comput. 21(5): 777 (2017) - [j43]Xu Jing, Hanwen Hu, Huijun Yang, Man Ho Au, Shuqin Li, Naixue Xiong, Muhammad Imran, Athanasios V. Vasilakos:
A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks. Sensors 17(3): 642 (2017) - [j42]Wei Wu, Shun Hu, Xu Yang, Joseph K. Liu, Man Ho Au:
Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput. 21(10): 2643-2649 (2017) - [j41]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [c74]Weizhi Meng, Lee Wang Hao, Man Ho Au, Zhe Liu:
Exploring Effect of Location Number on Map-Based Graphical Password Authentication. ACISP (2) 2017: 301-313 - [c73]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au, Surya Nepal:
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption. AsiaCCS 2017: 823-834 - [c72]Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. CSS 2017: 163-175 - [c71]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. ESORICS (2) 2017: 456-474 - [c70]Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au:
Evaluating Challenge-Based Trust Mechanism in Medical Smartphone Networks: An Empirical Study. GLOBECOM 2017: 1-6 - [c69]Kang Li, Rupeng Yang, Man Ho Au, Qiuliang Xu:
Practical Range Proof for Cryptocurrency Monero with Provable Security. ICICS 2017: 255-262 - [c68]Weizhi Meng, Man Ho Au:
Towards Statistical Trust Computation for Medical Smartphone Networks Based on Behavioral Profiling. IFIPTM 2017: 152-159 - [c67]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. ISPEC 2017: 3-24 - [c66]Weizhi Meng, Fei Fei, Wenjuan Li, Man Ho Au:
Harvesting Smartphone Privacy Through Enhanced Juice Filming Charging Attacks. ISC 2017: 291-308 - [c65]Hui Cui, Man Ho Au, Baodong Qin, Robert H. Deng, Xun Yi:
Fuzzy Public-Key Encryption Based on Biometric Data. ProvSec 2017: 400-409 - [c64]Gongxian Zeng, Siu-Ming Yiu, Jun Zhang, Hiroki Kuzuno, Man Ho Au:
A Nonoutsourceable Puzzle Under GHOST Rule. PST 2017: 35-43 - [c63]Shengtuo Hu, Xiaobo Ma, Muhui Jiang, Xiapu Luo, Man Ho Au:
AutoFlowLeaker: Circumventing Web Censorship through Automation Services. SRDS 2017: 214-223 - [p3]Man Ho Au, Kim-Kwang Raymond Choo:
Mobile Security and Privacy. Mobile Security and Privacy 2017: 1-4 - [p2]Xingye Lu, Man Ho Au:
An Introduction to Various Privacy Models. Mobile Security and Privacy 2017: 235-245 - [p1]Dennis Y. W. Liu, Guozhi Xue, Yi Xie, Xiapu Luo, Man Ho Au:
Performance of Digital Signature Schemes on Mobile Devices. Mobile Security and Privacy 2017: 247-256 - [e5]Man Ho Allen Au, Kim-Kwang Raymond Choo:
Mobile Security and Privacy - Advances, Challenges and Future Research Directions. Elsevier 2017, ISBN 978-0-12-804629-6 [contents] - [e4]Man Ho Allen Au, Arcangelo Castiglione, Kim-Kwang Raymond Choo, Francesco Palmieri, Kuan-Ching Li:
Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017, Cetara, Italy, May 11-14, 2017, Proceedings. Lecture Notes in Computer Science 10232, 2017, ISBN 978-3-319-57185-0 [contents] - [e3]Tatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li:
Provable Security - 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10592, Springer 2017, ISBN 978-3-319-68636-3 [contents] - [i23]Ting Chen, Xiaoqi Li, Ying Wang, Jiachi Chen, Zihao Li, Xiapu Luo, Man Ho Au, Xiaosong Zhang:
An Adaptive Gas Cost Mechanism for Ethereum to Defend Against Under-Priced DoS Attacks. CoRR abs/1712.06438 (2017) - [i22]Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. IACR Cryptol. ePrint Arch. 2017: 389 (2017) - [i21]Huang Zhang, Fangguo Zhang, Haibo Tian, Man Ho Au:
Anonymous Post-Quantum Cryptocash. IACR Cryptol. ePrint Arch. 2017: 716 (2017) - [i20]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Lattice-Based Techniques for Accountable Anonymity: Composition of Abstract Stern's Protocols and Weak PRF with Efficient Protocols from LWR. IACR Cryptol. ePrint Arch. 2017: 781 (2017) - [i19]Shifeng Sun, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Dawu Gu:
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero. IACR Cryptol. ePrint Arch. 2017: 921 (2017) - [i18]Rupeng Yang, Man Ho Au, Junzuo Lai, Qiuliang Xu, Zuoxia Yu:
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities. IACR Cryptol. ePrint Arch. 2017: 1201 (2017) - 2016
- [j40]Joonsang Baek, Duncan S. Wong, Jin Li, Man Ho Au:
Efficient Generic Construction of CCA-Secure Identity-Based Encryption from Randomness Extraction. Comput. J. 59(4): 508-521 (2016) - [j39]Joseph K. Liu, Willy Susilo, Tsz Hon Yuen, Man Ho Au, Jun-bin Fang, Zoe Lin Jiang, Jianying Zhou:
Efficient Privacy-Preserving Charging Station Reservation System for Electric Vehicles. Comput. J. 59(7): 1040-1053 (2016) - [j38]Yang Xiang, Man Ho Au, Miroslaw Kutylowsky:
Security and privacy in big data. Concurr. Comput. Pract. Exp. 28(10): 2856-2857 (2016) - [j37]Yong Yu, Liang Xue, Man Ho Au, Willy Susilo, Jianbing Ni, Yafang Zhang, Athanasios V. Vasilakos, Jian Shen:
Cloud data integrity checking with an identity-based auditing mechanism from RSA. Future Gener. Comput. Syst. 62: 85-91 (2016) - [j36]Hui Cui, Yi Mu, Man Ho Au:
Relations between robustness and RKA security under public-key encryption. Theor. Comput. Sci. 628: 78-91 (2016) - [j35]Joseph K. Liu, Man Ho Au, Xinyi Huang, Rongxing Lu, Jin Li:
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services. IEEE Trans. Inf. Forensics Secur. 11(3): 484-497 (2016) - [c62]Shuang Zhao, Xiapu Luo, Bo Bai, Xiaobo Ma, Wei Zou, Xinliang Qiu, Man Ho Au:
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing. ACISP (1) 2016: 3-19 - [c61]Wei Chen, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au, Yajuan Tang:
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services. ACISP (1) 2016: 20-39 - [c60]Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng:
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. ACISP (2) 2016: 207-222 - [c59]Yong Yu, Yannan Li, Man Ho Au, Willy Susilo, Kim-Kwang Raymond Choo, Xinpeng Zhang:
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy. ACISP (1) 2016: 389-405 - [c58]Zuoxia Yu, Man Ho Au, Qiuliang Xu, Rupeng Yang, Jinguang Han:
Leakage-Resilient Functional Encryption via Pair Encodings. ACISP (1) 2016: 443-460 - [c57]Xingye Lu, Man Ho Au:
Anonymous Identification for Ad Hoc Group. AsiaCCS 2016: 583-591 - [c56]Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu:
While Mobile Encounters with Clouds. NSS 2016: 3-18 - [c55]Tingting Wang, Man Ho Au, Wei Wu:
An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. NSS 2016: 251-265 - [c54]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encryption in Prime Order Groups. SCN 2016: 3-22 - [c53]Yang-Wai Chow, Willy Susilo, Guomin Yang, Man Ho Au, Cong Wang:
Authentication and Transaction Verification Using QR Codes with a Mobile Device. SpaCCS 2016: 437-451 - [i17]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
A Tag Based Encoding: An Efficient Encoding for Predicate Encoding in Prime Order Groups. IACR Cryptol. ePrint Arch. 2016: 655 (2016) - [i16]Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional Encryption for Computational Hiding in Prime Order Groups via Pair Encodings. IACR Cryptol. ePrint Arch. 2016: 949 (2016) - 2015
- [j34]Yong Yu, Man Ho Au, Yi Mu, Willy Susilo, Huai Wu:
Secure Delegation of Signing Power from Factorization. Comput. J. 58(4): 867-877 (2015) - [j33]Yang Wang, Willy Susilo, Man Ho Au:
Revisiting Security Against the Arbitrator in Optimistic Fair Exchange. Comput. J. 58(10): 2665-2676 (2015) - [j32]Yong Yu, Yafang Zhang, Jianbing Ni, Man Ho Au, Lanxiang Chen, Hongyu Liu:
Remote data possession checking with enhanced security for cloud storage. Future Gener. Comput. Syst. 52: 77-85 (2015) - [j31]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu, Anjia Yang:
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing. Future Gener. Comput. Syst. 52: 95-108 (2015) - [j30]Hui Cui, Yi Mu, Man Ho Au:
Proof of retrievability with public verifiability resilient against related-key attacks. IET Inf. Secur. 9(1): 43-49 (2015) - [j29]Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j28]Joseph K. Liu, Man Ho Au, Willy Susilo, Kaitai Liang, Rongxing Lu, Bala Srinivasan:
Secure sharing and searching for real-time video data in mobile cloud. IEEE Netw. 29(2): 46-50 (2015) - [j27]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou:
k-Times Attribute-Based Anonymous Access Control for Cloud Computing. IEEE Trans. Computers 64(9): 2595-2608 (2015) - [j26]Yang Wang, Man Ho Au, Willy Susilo:
Optimistic fair exchange in the enhanced chosen-key model. Theor. Comput. Sci. 562: 57-74 (2015) - [j25]Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 178-189 (2015) - [j24]Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Allen Au:
Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption. IEEE Trans. Inf. Forensics Secur. 10(3): 665-678 (2015) - [j23]Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry:
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext. IEEE Trans. Inf. Forensics Secur. 10(3): 679-693 (2015) - [j22]Jinguang Han, Willy Susilo, Yi Mu, Man Ho Au, Jie Cao:
AAC-OT: Accountable Oblivious Transfer With Access Control. IEEE Trans. Inf. Forensics Secur. 10(12): 2502-2514 (2015) - [j21]Yong Yu, Jianbing Ni, Man Ho Au, Yi Mu, Boyang Wang, Hui Li:
Comments on a Public Auditing Mechanism for Shared Cloud Data Service. IEEE Trans. Serv. Comput. 8(6): 998-999 (2015) - [c52]Xu Yang, Joseph K. Liu, Wei Wu, Man Ho Au, Willy Susilo:
PEVTS: Privacy-Preserving Electric Vehicles Test-Bedding Scheme. ICPADS 2015: 282-289 - [e2]Man Ho Au, Atsuko Miyaji:
Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings. Lecture Notes in Computer Science 9451, Springer 2015, ISBN 978-3-319-26058-7 [contents] - 2014
- [j20]Hui Cui, Yi Mu, Man Ho Au:
Signcryption Secure Against Linear Related-Key Attacks. Comput. J. 57(10): 1472-1483 (2014) - [j19]Man Ho Au, Guomin Yang, Willy Susilo, Yunmei Zhang:
(Strong) multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8): 1574-1592 (2014) - [j18]Joseph K. Liu, Tsz Hon Yuen, Man Ho Au, Willy Susilo:
Improvements on an authentication scheme for vehicular sensor networks. Expert Syst. Appl. 41(5): 2559-2564 (2014) - [j17]Yong Yu, Jianbing Ni, Man Ho Au, Hongyu Liu, Hua Wang, Chunxiang Xu:
Improved security of a dynamic remote data possession checking protocol for cloud storage. Expert Syst. Appl. 41(17): 7789-7796 (2014) - [j16]Robert H. Deng, Yang Xiang, Man Ho Au:
Cryptography in Cloud Computing. Future Gener. Comput. Syst. 30: 90 (2014) - [j15]Hui Cui, Yi Mu, Man Ho Au:
Anonymous broadcast encryption with an untrusted gateway. Int. J. Secur. Networks 9(1): 20-29 (2014) - [j14]Yong Yu, Yi Mu, Willy Susilo, Man Ho Au:
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. Inf. Process. Lett. 114(1-2): 5-8 (2014) - [j13]Yang Wang, Man Ho Au, Willy Susilo:
Attribute-based optimistic fair exchange: How to restrict brokers with policies. Theor. Comput. Sci. 527: 83-96 (2014) - [j12]Yang Wang, Willy Susilo, Man Ho Au, Guilin Wang:
Collusion-Resistance in Optimistic Fair Exchange. IEEE Trans. Inf. Forensics Secur. 9(8): 1227-1239 (2014) - [j11]Kaitai Liang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang, Tran Viet Xuan Phuong, Qi Xie:
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. IEEE Trans. Inf. Forensics Secur. 9(10): 1667-1680 (2014) - [j10]Yang Wang, Man Ho Allen Au, Willy Susilo:
Revisiting Optimistic Fair Exchange Based on Ring Signatures. IEEE Trans. Inf. Forensics Secur. 9(11): 1883-1892 (2014) - [j9]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Linkable Ring Signature with Unconditional Anonymity. IEEE Trans. Knowl. Data Eng. 26(1): 157-165 (2014) - [j8]Man Ho Au, Joseph K. Liu, Jun-bin Fang, Zoe Lin Jiang, Willy Susilo, Jianying Zhou:
A New Payment System for Enhancing Location Privacy of Electric Vehicles. IEEE Trans. Veh. Technol. 63(1): 3-18 (2014) - [c51]Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au:
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption. ESORICS (2) 2014: 73-90 - [c50]Joseph K. Liu, Man Ho Au, Xinyi Huang, Willy Susilo, Jianying Zhou, Yong Yu:
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era. ESORICS (2) 2014: 182-199 - [c49]Yang-Wai Chow, Willy Susilo, Man Ho Au, Ari Moesriami Barmawi:
A Visual One-Time Password Authentication Scheme Using Mobile Devices. ICICS 2014: 243-257 - [c48]Yuechen Chen, Zoe Lin Jiang, Siu-Ming Yiu, Joseph K. Liu, Man Ho Au, Xuan Wang:
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator. ICICS 2014: 274-289 - [c47]Man Ho Au, Willy Susilo:
Two-Party (Blind) Ring Signatures and Their Applications. ISPEC 2014: 403-417 - [c46]Kaitai Liang, Man Ho Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu:
An Adaptively CCA-Secure Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Cloud Data Sharing. ISPEC 2014: 448-461 - [c45]Hui Cui, Yi Mu, Man Ho Au:
Complete Robustness in Identity-Based Encryption. ProvSec 2014: 342-349 - [c44]Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient against Linear Related-Key Attacks Revisited. TrustCom 2014: 268-275 - [e1]Man Ho Au, Barbara Carminati, C.-C. Jay Kuo:
Network and System Security - 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings. Lecture Notes in Computer Science 8792, Springer 2014, ISBN 978-3-319-11697-6 [contents] - [i15]Jinguang Han, Willy Susilo, Yi Mu, Jianying Zhou, Man Ho Au:
PPDCP-ABE: Privacy-Preserving Decentralized Cipher-Policy Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 470 (2014) - 2013
- [j7]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Efficient Linkable and/or Threshold Ring Signature Without Random Oracles. Comput. J. 56(4): 407-421 (2013) - [j6]Sherman S. M. Chow, Man Ho Au, Willy Susilo:
Server-aided signatures verification secure against collusion attack. Inf. Secur. Tech. Rep. 17(3): 46-57 (2013) - [j5]Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow:
Constant-Size Dynamic $k$ -Times Anonymous Authentication. IEEE Syst. J. 7(2): 249-261 (2013) - [j4]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469: 1-14 (2013) - [j3]Man Ho Au, Joseph K. Liu, Willy Susilo, Jianying Zhou:
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE. IEEE Trans. Inf. Forensics Secur. 8(12): 1909-1922 (2013) - [c43]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". ACISP 2013: 187-202 - [c42]Willy Susilo, Man Ho Au, Yang Wang, Duncan S. Wong:
Fairness in Concurrent Signatures Revisited. ACISP 2013: 318-329 - [c41]Yang Wang, Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Willy Susilo:
Threshold-Oriented Optimistic Fair Exchange. NSS 2013: 424-438 - [c40]Jongkil Kim, Willy Susilo, Man Ho Au, Jennifer Seberry:
Efficient Semi-static Secure Broadcast Encryption Scheme. Pairing 2013: 62-76 - [c39]Hui Cui, Yi Mu, Man Ho Au:
Anonymous Signcryption against Linear Related-Key Attacks. ProvSec 2013: 165-183 - [c38]Hui Cui, Yi Mu, Man Ho Au:
Public-Key Encryption Resilient to Linear Related-Key Attacks. SecureComm 2013: 182-196 - [c37]Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au:
Privacy-Enhanced Keyword Search in Clouds. TrustCom/ISPA/IUCC 2013: 447-451 - [c36]Hui Cui, Yi Mu, Man Ho Au:
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps. TrustCom/ISPA/IUCC 2013: 704-711 - [i14]Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". IACR Cryptol. ePrint Arch. 2013: 230 (2013) - 2012
- [c35]Man Ho Au, Apu Kapadia:
PERM: practical reputation-based blacklisting without TTPS. CCS 2012: 929-940 - [c34]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Enhancing Location Privacy for Electric Vehicles (at the Right time). ESORICS 2012: 397-414 - [c33]Yang Wang, Man Ho Au, Willy Susilo:
Perfect Ambiguous Optimistic Fair Exchange. ICICS 2012: 142-153 - [c32]Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo, Jianying Zhou:
Forward Secure Attribute-Based Signatures. ICICS 2012: 167-177 - [c31]Man Ho Au, Apu Kapadia, Willy Susilo:
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. NDSS 2012 - [c30]Yunmei Zhang, Man Ho Au, Guomin Yang, Willy Susilo:
(Strong) Multi-Designated Verifiers Signatures Secure against Rogue Key Attack. NSS 2012: 334-347 - [c29]Yunmei Zhang, Joseph K. Liu, Xinyi Huang, Man Ho Au, Willy Susilo:
Efficient Escrow-Free Identity-Based Signature. ProvSec 2012: 161-174 - [i13]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Enhancing Location Privacy for Electric Vehicles (at the right time). IACR Cryptol. ePrint Arch. 2012: 342 (2012) - [i12]Yang Wang, Man Ho Au, Willy Susilo:
Perfect Ambiguous Optimistic Fair Exchange. IACR Cryptol. ePrint Arch. 2012: 462 (2012) - 2011
- [j2]Man Ho Au, Patrick P. Tsang, Apu Kapadia:
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Trans. Inf. Syst. Secur. 14(4): 29:1-29:34 (2011) - [c28]Man Ho Au, Willy Susilo, Yi Mu:
Electronic Cash with Anonymous User Suspension. ACISP 2011: 172-188 - [c27]Tsz Hon Yuen, Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Threshold ring signature without random oracles. AsiaCCS 2011: 261-267 - [c26]Sherman S. M. Chow, Man Ho Au, Willy Susilo:
Server-aided signatures verification secure against collusion attack. AsiaCCS 2011: 401-405 - [c25]Miao Zhou, Yi Mu, Willy Susilo, Man Ho Au, Jun Yan:
Privacy-Preserved Access Control for Cloud Computing. TrustCom 2011: 83-90 - 2010
- [j1]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs. ACM Trans. Inf. Syst. Secur. 13(4): 39:1-39:33 (2010) - [c24]Man Ho Au, Willy Susilo, Yi Mu:
Proof-of-Knowledge of Representation of Committed Value and Its Applications. ACISP 2010: 352-369 - [c23]Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren:
Attribute-based signature and its applications. AsiaCCS 2010: 60-69 - [c22]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model. ESORICS 2010: 168-181 - [c21]Ye Zhang, Man Ho Au, Duncan S. Wong, Qiong Huang, Nikos Mamoulis, David W. Cheung, Siu-Ming Yiu:
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication. Pairing 2010: 96-115 - [c20]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract). ProvSec 2010: 166-183
2000 – 2009
- 2009
- [c19]Man Ho Au, Patrick P. Tsang, Willy Susilo, Yi Mu:
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems. CT-RSA 2009: 295-308 - [c18]Pairat Thorncharoensri, Qiong Huang, Willy Susilo, Man Ho Au, Yi Mu, Duncan S. Wong:
Escrowed Deniable Identification Schemes. FGIT-SecTech 2009: 234-241 - [c17]Joseph K. Liu, Man Ho Au, Willy Susilo, Jianying Zhou:
Online/Offline Ring Signature Scheme. ICICS 2009: 80-90 - [c16]Man Ho Au, Willy Susilo, Yi Mu:
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ProvSec 2009: 129-139 - 2008
- [c15]Man Ho Au, Qiong Huang, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang:
Traceable and Retrievable Identity-Based Encryption. ACNS 2008: 94-110 - [c14]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
PEREA: towards practical TTP-free revocation in anonymous authentication. CCS 2008: 333-344 - [c13]Man Ho Au, Willy Susilo, Yi Mu:
Practical Anonymous Divisible E-Cash from Bounded Accumulators. Financial Cryptography 2008: 287-301 - [i11]Man Ho Au, Willy Susilo, Yi Mu:
Constant-Size Dynamic k-TAA. IACR Cryptol. ePrint Arch. 2008: 136 (2008) - 2007
- [c12]Man Ho Au, Willy Susilo, Yi Mu:
Practical Compact E-Cash. ACISP 2007: 431-445 - [c11]Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith:
Blacklistable anonymous credentials: blocking misbehaving users without ttps. CCS 2007: 72-81 - [c10]Man Ho Au, Qianhong Wu, Willy Susilo, Yi Mu:
Compact E-Cash from Bounded Accumulator. CT-RSA 2007: 178-195 - [c9]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures Without Random Oracles. ICICS 2007: 83-97 - [c8]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Certificate Based (Linkable) Ring Signature. ISPEC 2007: 79-92 - [i10]Man Ho Au, Willy Susilo, Yi Mu:
Practical Compact E-Cash. IACR Cryptol. ePrint Arch. 2007: 148 (2007) - [i9]Tsz Hon Yuen, Man Ho Au, Joseph K. Liu, Willy Susilo:
(Convertible) Undeniable Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2007: 386 (2007) - [i8]Man Ho Au, Siu-Ming Yiu:
Structural Identity-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 422 (2007) - [i7]Man Ho Au, Willy Susilo, Yi Mu:
Practical Anonymous Divisible E-Cash From Bounded Accumulators. IACR Cryptol. ePrint Arch. 2007: 459 (2007) - 2006
- [c7]Man Ho Au, Willy Susilo, Siu-Ming Yiu:
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. ACISP 2006: 223-234 - [c6]Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang:
Short Linkable Ring Signatures Revisited. EuroPKI 2006: 101-115 - [c5]Man Ho Au, Joseph K. Liu, Willy Susilo, Tsz Hon Yuen:
Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature. INDOCRYPT 2006: 364-378 - [c4]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
ID-Based Ring Signature Scheme Secure in the Standard Model. IWSEC 2006: 1-16 - [c3]Man Ho Au, Willy Susilo, Yi Mu:
Constant-Size Dynamic k-TAA. SCN 2006: 111-125 - [i6]Man Ho Au, Jing Chen, Joseph K. Liu, Yi Mu, Duncan S. Wong, Guomin Yang:
Malicious KGC Attacks in Certificateless Cryptography. IACR Cryptol. ePrint Arch. 2006: 255 (2006) - [i5]Man Ho Au, Joseph K. Liu, Tsz Hon Yuen, Duncan S. Wong:
Practical Hierarchical Identity Based Encryption and Signature schemes Without Random Oracles. IACR Cryptol. ePrint Arch. 2006: 368 (2006) - [i4]Joseph K. Liu, Man Ho Au, Willy Susilo:
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model. IACR Cryptol. ePrint Arch. 2006: 373 (2006) - 2005
- [c2]Man Ho Au, Sherman S. M. Chow, Willy Susilo:
Short E-Cash. INDOCRYPT 2005: 332-346 - [i3]Patrick P. Tsang, Man Ho Au, Joseph K. Liu, Willy Susilo, Duncan S. Wong:
A Suite of Non-Pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity. IACR Cryptol. ePrint Arch. 2005: 326 (2005) - 2004
- [c1]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. INDOCRYPT 2004: 384-398 - [i2]Man Ho Au, Victor K. Wei:
ID-based Cryptography from Composite Degree Residuosity. IACR Cryptol. ePrint Arch. 2004: 164 (2004) - [i1]Patrick P. Tsang, Victor K. Wei, Tony K. Chan, Man Ho Au, Joseph K. Liu, Duncan S. Wong:
Separable Linkable Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2004: 267 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint