Zobrazeno 1 - 10
of 56
pro vyhledávání: '"Man Ho Allen Au"'
Publikováno v:
Information, Vol 14, Iss 3, p 160 (2023)
A ring signature (RS) scheme enables a group member to sign messages on behalf of its group without revealing the definite signer identify, but this also leads to the abuse of anonymity by malicious signers, which can be prevented by traceable ring s
Externí odkaz:
https://doaj.org/article/5541cb318bfd4cc9b75a3193727a4608
Publikováno v:
Information, Vol 14, Iss 3, p 142 (2023)
Transforming data into ciphertexts and storing them in the cloud database is a secure way to simplify data management. Public key encryption with keyword search (PEKS) is an important cryptographic primitive as it provides the ability to search for t
Externí odkaz:
https://doaj.org/article/91e68b0ba53d4c3981917c72a489a875
Publikováno v:
Future Generation Computer Systems. 145:511-520
Publikováno v:
Peer-to-Peer Networking and Applications. 16:1270-1285
Publikováno v:
Computer Standards & Interfaces. 87:103759
Autor:
Haixin Duan, Mourad Debbabi, Xavier de Carné de Carnavalet, Xiapu Luo, Xiaojiang Du, Man Ho Allen Au
This two-volume LNICST 567-568 set constitutes the post-conference proceedings of the 19th International Conference on Security and Privacy in Communication Networks, SecureComm 2023, held in October 2023 in Hong Kong, China. The 52 papers were caref
Publikováno v:
Future Generation Computer Systems. 79:337-349
Bring your own devices have become a new symbol of industrial and education institutional culture to date. A single individual can gain access to personal data anytime at anywhere of his/her workplace due to the advanced WiFi/5G network and cloud tec
Autor:
Man Ho Allen Au, Zoe Lin Jiang, Yang Xiang, Tsz Hon Yuen, Joseph K. Liu, Xinyi Huang, Willy Susilo
Publikováno v:
Journal of Computer and System Sciences. 90:46-62
Personal Health Record (PHR) has been developed as a promising solution that allows patient–doctors interactions in a very effective way. Cloud technology has been seen as the prominent candidate to store the sensitive medical record in PHR, but to
Publikováno v:
Pervasive and Mobile Computing. 41:270-285
The mobile botnet is a collection of compromised mobile devices that can remotely receive commands from the botmaster. Exploiting unique features of mobile networks and smartphones, mobile botnets pose a severe threat to mobile users, because smartph
Publikováno v:
CSF
We develop new foundations on transaction untraceability for CryptoNote-style blockchain systems. In particular, we observe new attacks; develop theoretical foundations to model transaction untraceability; provide the least upper bound of transaction