What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kim-Kwang Raymond Choo
Google Scholar
ORCID:
0000-0001-9208-5336
115
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
CR-DAP: A Comprehensive and Regulatory Decentralized Anonymous Payment System.
Weiqi Dai
Yang Zhou
Xiaohai Dai
Kim-Kwang Raymond Choo
Xia Xie
Deqing Zou
Hai Jin
2024
journals/istr
AdvEWM: Generating image adversarial examples by embedding digital watermarks.
Yuexin Xiang
Tiantian Li
Wei Ren
Jie He
Tianqing Zhu
Kim-Kwang Raymond Choo
2024
journals/istr
Editorial: Special issue on software protection and attacks.
Michele Ianni
Mila Dalla Preda
Kim-Kwang Raymond Choo
Miguel Pupo Correia
2024
journals/tifs
An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
Xinyu Tang
Cheng Guo
Kim-Kwang Raymond Choo
Yi-Ning Liu
2024
journals/tifs
Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
Weixuan Tang
Zhili Zhou
Bin Li
Kim-Kwang Raymond Choo
Jiwu Huang
2024
journals/tifs
Toward Secure and Verifiable Hybrid Federated Learning.
Runmeng Du
Xuru Li
Daojing He
Kim-Kwang Raymond Choo
2024
journals/tifs
PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.
Weiqi Dai
Jinkai Liu
Yang Zhou
Kim-Kwang Raymond Choo
Xia Xie
Deqing Zou
Hai Jin
2024
journals/tifs
Optimal Selfish Mining-Based Denial-of-Service Attack.
Qiuhua Wang
Chengyu Li
Tianyu Xia
Yizhi Ren
Dong Wang
Guoyan Zhang
Kim-Kwang Raymond Choo
2024
journals/tifs
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis.
Yuexin Xiang
Yuchen Lei
Ding Bao
Tiantian Li
Qingqing Yang
Wenmao Liu
Wei Ren
Kim-Kwang Raymond Choo
2024
journals/tifs
Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network.
Yi Ding
Zi Wang
Zhen Qin
Erqiang Zhou
Guobin Zhu
Zhiguang Qin
Kim-Kwang Raymond Choo
2024
journals/tifs
Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings.
Yinbin Miao
Da Kuang
Xinghua Li
Shujiang Xu
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2024
journals/tifs
Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning.
Daojing He
Xin Lv
Xueqian Xu
Sammy Chan
Kim-Kwang Raymond Choo
2024
journals/tifs
CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs.
Yujie Song
Yue Cao
Chaklam Cheong
Debiao He
Kim-Kwang Raymond Choo
Juan Wang
2024
journals/tifs
RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks.
Wael Issa
Nour Moustafa
Benjamin P. Turnbull
Kim-Kwang Raymond Choo
2024
journals/tifs
Rebuttal to "On the Unforgeability of 'Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET"'.
Yafang Yang
Lei Zhang
Yunlei Zhao
Kim-Kwang Raymond Choo
Yan Zhang
2024
journals/tifs
Updatable Private Set Intersection With Forward Privacy.
Ruochen Wang
Jun Zhou
Zhenfu Cao
Xiaolei Dong
Kim-Kwang Raymond Choo
2023
journals/compsec
Preserving data privacy in federated learning through large gradient pruning.
Zhiqiu Zhang
Tianqing Zhu
Wei Ren
Ping Xiong
Kim-Kwang Raymond Choo
2023
journals/compsec
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Milad Taleby Ahvanooey
Mark Xuefang Zhu
Shiyan Ou
Hassan Dana Mazraeh
Wojciech Mazurczyk
Kim-Kwang Raymond Choo
Chuan Li
2023
journals/compsec
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed.
Hudan Studiawan
George Grispos
Kim-Kwang Raymond Choo
2023
journals/compsec
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT.
Othmane Friha
Mohamed Amine Ferrag
Mohamed Benbouzid
Tarek Berghout
Burak Kantarci
Kim-Kwang Raymond Choo
2023
journals/compsec
Improve individual fairness in federated learning via adversarial training.
Jie Li
Tianqing Zhu
Wei Ren
Kim-Kwang Raymond Choo
2023
journals/tifs
A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs.
Jiayan Shen
Peng Zeng
Kim-Kwang Raymond Choo
Chengju Li
2023
journals/tifs
A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries.
Zuan Wang
Liang Zhang
Xiaofeng Ding
Kim-Kwang Raymond Choo
Hai Jin
2023
journals/tifs
Generative Steganography via Auto-Generation of Semantic Object Contours.
Zhili Zhou
Xiaohua Dong
Ruohan Meng
Meimin Wang
Hongyang Yan
Keping Yu
Kim-Kwang Raymond Choo
2023
journals/tifs
Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
Zhongyun Lin
Jun Zhou
Zhenfu Cao
Xiaolei Dong
Kim-Kwang Raymond Choo
2023
journals/tifs
Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization.
Lin Chen
Danyang Yue
Xiaofeng Ding
Zuan Wang
Kim-Kwang Raymond Choo
Hai Jin
2023
journals/tifs
BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
Biwen Chen
Tao Xiang
Debiao He
Hongwei Li
Kim-Kwang Raymond Choo
2023
journals/tifs
Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.
Yinbin Miao
Yutao Yang
Xinghua Li
Zhiquan Liu
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2023
journals/tifs
Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.
Yinbin Miao
Wei Zheng
Xinghua Li
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2023
journals/tifs
PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership.
Yang Liu
Debiao He
Qi Feng
Min Luo
Kim-Kwang Raymond Choo
2023
journals/tifs
Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning.
Peiying Zhang
Ning Chen
Shibao Li
Kim-Kwang Raymond Choo
Chunxiao Jiang
Sheng Wu
2022
journals/compsec
The role of national cybersecurity strategies on the improvement of cybersecurity education.
Saleh H. Aldaajeh
Heba Saleous
Saed Alrabaee
Ezedin Barka
Frank Breitinger
Kim-Kwang Raymond Choo
2022
journals/compsec
A privacy preservation method for multiple-source unstructured data in online social networks.
Chenguang Wang
Tianqing Zhu
Ping Xiong
Wei Ren
Kim-Kwang Raymond Choo
2022
journals/compsec
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function.
Cong Pu
Kim-Kwang Raymond Choo
2022
journals/compsec
Cyber security challenges in aviation communication, navigation, and surveillance.
Gaurav Dave
Gaurav Choudhary
Vikas Sihag
Ilsun You
Kim-Kwang Raymond Choo
2022
journals/compsec
Black-box adversarial attacks on XSS attack detection model.
Qiuhua Wang
Hui Yang
Guohua Wu
Kim-Kwang Raymond Choo
Zheng Zhang
Gongxun Miao
Yizhi Ren
2022
journals/compsec
Privacy, accuracy, and model fairness trade-offs in federated learning.
Xiuting Gu
Tianqing Zhu
Jie Li
Tao Zhang
Wei Ren
Kim-Kwang Raymond Choo
2022
journals/compsec
Rethinking maximum-margin softmax for adversarial robustness.
Mohammed Hassanin
Nour Moustafa
Murat Tahtali
Kim-Kwang Raymond Choo
2022
journals/istr
CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
Milad Taleby Ahvanooey
Mark Xuefang Zhu
Wojciech Mazurczyk
Qianmu Li
Max Kilger
Kim-Kwang Raymond Choo
Mauro Conti
2022
journals/tifs
Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
Yanbing Ren
Xinghua Li
Yinbin Miao
Bin Luo
Jian Weng
Kim-Kwang Raymond Choo
Robert H. Deng
2022
journals/tifs
SDoS: Selfish Mining-Based Denial-of-Service Attack.
Qiuhua Wang
Tianyu Xia
Dong Wang
Yizhi Ren
Gongxun Miao
Kim-Kwang Raymond Choo
2022
journals/tifs
Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
Yafang Yang
Lei Zhang
Yunlei Zhao
Kim-Kwang Raymond Choo
Yan Zhang
2022
journals/tifs
On Message Authentication Channel Capacity Over a Wiretap Channel.
Dajiang Chen
Shaoquan Jiang
Ning Zhang
Lei Liu
Kim-Kwang Raymond Choo
2022
journals/tifs
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems.
Yinbin Miao
Ziteng Liu
Hongwei Li
Kim-Kwang Raymond Choo
Robert H. Deng
2022
conf/asiaccs
BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure.
Keke Gai
Kim-Kwang Raymond Choo
2021
journals/compsec
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities.
Mohammad Dabbagh
Kim-Kwang Raymond Choo
Amin Beheshti
Mohammad Tahir
Nader Sohrabi Safa
2021
journals/compsec
A design science approach to developing an integrated mobile app forensic framework.
Xiaolu Zhang
Charles Zhechao Liu
Kim-Kwang Raymond Choo
Jesus A. Alvarado
2021
journals/compsec
NLP-based digital forensic investigation platform for online communications.
Dongming Sun
Xiaolu Zhang
Kim-Kwang Raymond Choo
Liang Hu
Feng Wang
2021
journals/compsec
A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management.
Kim-Kwang Raymond Choo
Keke Gai
Luca Chiaraviglio
Qing Yang
2021
journals/compsec
Universal location referencing and homomorphic evaluation of geospatial query.
Asma Aloufi
Peizhao Hu
Hang Liu
Sherman S. M. Chow
Kim-Kwang Raymond Choo
2021
journals/compsec
A survey of machine learning techniques in adversarial image forensics.
Ehsan Nowroozi
Ali Dehghantanha
Reza M. Parizi
Kim-Kwang Raymond Choo
2021
journals/tifs
OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
Chao Lin
Debiao He
Xinyi Huang
Kim-Kwang Raymond Choo
2021
journals/tifs
CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.
Weiqi Dai
Yan Lv
Kim-Kwang Raymond Choo
Zhongze Liu
Deqing Zou
Hai Jin
2021
journals/tifs
Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data.
Xiaofeng Ding
Zuan Wang
Pan Zhou
Kim-Kwang Raymond Choo
Hai Jin
2021
conf/ccs
Internet of Things (IoT) Security and Forensics: Challenges and Opportunities.
Kim-Kwang Raymond Choo
2020
journals/compsec
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Abbas Yazdinejad
Reza M. Parizi
Ali Dehghantanha
Kim-Kwang Raymond Choo
2020
journals/compsec
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Shuyun Shi
Debiao He
Li Li
Neeraj Kumar
Muhammad Khurram Khan
Kim-Kwang Raymond Choo
2020
journals/compsec
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images.
Cheng Guo
Jing Jia
Kim-Kwang Raymond Choo
Yingmo Jie
2020
journals/compsec
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Amritraj Singh
Reza M. Parizi
Qi Zhang
Kim-Kwang Raymond Choo
Ali Dehghantanha
2020
journals/compsec
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.
Waqas Haider
Nour Moustafa
Marwa Keshk
Amanda S. Fernandez
Kim-Kwang Raymond Choo
Abdul Wahab
2020
journals/compsec
A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Ning Lu
Yongxin Zhang
Wenbo Shi
Saru Kumari
Kim-Kwang Raymond Choo
2020
journals/compsec
Query-efficient label-only attacks against black-box machine learning models.
Yizhi Ren
Qi Zhou
Zhen Wang
Ting Wu
Guohua Wu
Kim-Kwang Raymond Choo
2020
journals/compsec
dating apps.
Shawn Knox
Steven Moghadam
Kenny Patrick
Anh Phan
Kim-Kwang Raymond Choo
2020
journals/compsec
An improved two-hidden-layer extreme learning machine for malware hunting.
Amir Namavar Jahromi
Sattar Hashemi
Ali Dehghantanha
Kim-Kwang Raymond Choo
Hadis Karimipour
David Ellis Newton
Reza M. Parizi
2020
journals/istr
A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
Zhiyan Xu
Debiao He
Huaqun Wang
Pandi Vijayakumar
Kim-Kwang Raymond Choo
2020
journals/istr
CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
Cong Peng
Jianhua Chen
Lu Zhou
Kim-Kwang Raymond Choo
Debiao He
2020
journals/tifs
SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
Qi Feng
Debiao He
Zhe Liu
Huaqun Wang
Kim-Kwang Raymond Choo
2020
journals/tifs
DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
Chao Lin
Debiao He
Xinyi Huang
Muhammad Khurram Khan
Kim-Kwang Raymond Choo
2020
journals/tifs
BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
Neetesh Saxena
Mauro Conti
Kim-Kwang Raymond Choo
Narendra S. Chaudhari
2020
journals/tifs
An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
Osama Al-Kadi
Nour Moustafa
Benjamin P. Turnbull
Kim-Kwang Raymond Choo
2020
journals/tifs
Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
Xu An Wang
Kim-Kwang Raymond Choo
Jian Weng
Jianfeng Ma
2020
journals/tifs
SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
Weiqi Dai
Chunkai Dai
Kim-Kwang Raymond Choo
Changze Cui
Deqing Zou
Hai Jin
2020
journals/tifs
A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications.
Renyong Wu
Chao Yuan
Ning Zhang
Kim-Kwang Raymond Choo
2019
journals/compsec
The role of the adversary model in applied security research.
Quang Do
Ben Martini
Kim-Kwang Raymond Choo
2019
journals/compsec
: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system.
Rajat Chaudhary
Anish Jindal
Gagangeet Singh Aujla
Shubhani Aggarwal
Neeraj Kumar
Kim-Kwang Raymond Choo
2019
journals/tifs
HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets.
Fran Casino
Kim-Kwang Raymond Choo
Constantinos Patsakis
2019
journals/tifs
Secure Key Agreement and Key Protection for Mobile Device User Authentication.
Libing Wu
Jing Wang
Kim-Kwang Raymond Choo
Debiao He
2019
journals/tifs
Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
Nour Moustafa
Kim-Kwang Raymond Choo
Ibrahim Radwan
Seyit Camtepe
2019
conf/acisp
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Jaryn Shen
Timothy T. Yuen
Kim-Kwang Raymond Choo
Qingkai Zeng
2019
conf/esorics
Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Weizhi Meng
Wenjuan Li
Lijun Jiang
Kim-Kwang Raymond Choo
Chunhua Su
2018
journals/compsec
Identifying 3D printer residual data via open-source documentation.
Daniel Bradford Miller
William Bradley Glisson
Mark Yampolskiy
Kim-Kwang Raymond Choo
2018
journals/compsec
Internet- and cloud-of-things cybersecurity research challenges and advances.
Kim-Kwang Raymond Choo
Matt Bishop
William Bradley Glisson
Kara L. Nance
2018
journals/compsec
Visual Question Authentication Protocol (VQAP).
Andeep S. Toor
Harry Wechsler
Michele Nappi
Kim-Kwang Raymond Choo
2018
journals/compsec
An efficient privacy mechanism for electronic health records.
Adeel Anjum
Saif Ur Rehman Malik
Kim-Kwang Raymond Choo
Abid Khan
Asma Haroon
Sangeen Khan
Samee U. Khan
Naveed Ahmad
Basit Raza
2017
journals/compsec
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review.
Brett Eterovic-Soric
Kim-Kwang Raymond Choo
Helen Ashman
Sameera Mubarak
2017
journals/compsec
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Weizhi Meng
Wenjuan Li
Lam-for Kwok
Kim-Kwang Raymond Choo
2017
journals/compsec
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Zhe Liu
Kim-Kwang Raymond Choo
Minghao Zhao
2017
journals/compsec
Resilient interconnection in cyber-physical control systems.
Cristina Alcaraz
Javier López
Kim-Kwang Raymond Choo
2017
journals/istr
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
Libing Wu
Jing Wang
Kim-Kwang Raymond Choo
Yuangang Li
Debiao He
2017
journals/tifs
Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
Debiao He
Neeraj Kumar
Kim-Kwang Raymond Choo
Wei Wu
2017
journals/tifs
A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
Quratulain Alam
Saif Ur Rehman Malik
Adnan Akhunzada
Kim-Kwang Raymond Choo
Saher Tabbasum
Masoom Alam
2017
conf/ccs
Research Challenges and Opportunities in Big Forensic Data.
Kim-Kwang Raymond Choo
2016
journals/compsec
An adversary model to evaluate DRM protection of video contents on iOS devices.
Christian D'Orazio
Kim-Kwang Raymond Choo
2016
journals/tifs
An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
Ximeng Liu
Robert H. Deng
Kim-Kwang Raymond Choo
Jian Weng
2016
journals/tifs
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
Lichun Li
Rongxing Lu
Kim-Kwang Raymond Choo
Anwitaman Datta
Jun Shao
2016
journals/tifs
DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
Beibei Li
Rongxing Lu
Wei Wang
Kim-Kwang Raymond Choo
2016
journals/tifs
A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.
Quang Do
Ben Martini
Kim-Kwang Raymond Choo
2016
journals/tifs
Intent-Based Extensible Real-Time PHP Supervision Framework.
Victor Prokhorenko
Kim-Kwang Raymond Choo
Helen Ashman
2016
conf/acisp
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Yong Yu
Yannan Li
Man Ho Au
Willy Susilo
Kim-Kwang Raymond Choo
Xinpeng Zhang
2016
conf/acisp
Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Yanjiang Yang
Haibin Cai
Zhuo Wei
Haibing Lu
Kim-Kwang Raymond Choo
2015
journals/compsec
A survey of information security incident handling in the cloud.
Nurul Hidayah Ab Rahman
Kim-Kwang Raymond Choo
2015
journals/compsec
Exfiltrating data from Android devices.
Quang Do
Ben Martini
Kim-Kwang Raymond Choo
2015
conf/lightsec
On Lightweight Security Enforcement in Cyber-Physical Systems.
Yanjiang Yang
Jiqiang Lu
Kim-Kwang Raymond Choo
Joseph K. Liu
2015
conf/esorics
Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Yanjiang Yang
Joseph K. Liu
Kaitai Liang
Kim-Kwang Raymond Choo
Jianying Zhou
2015
conf/icics
Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Shangqi Lai
Joseph K. Liu
Kim-Kwang Raymond Choo
Kaitai Liang
2013
journals/compsec
New payment methods: A review of 2010-2012 FATF mutual evaluation reports.
Kim-Kwang Raymond Choo
2011
journals/compsec
The cyber threat landscape: Challenges and future research directions.
Kim-Kwang Raymond Choo
2010
journals/istr
High tech criminal threats to the national information infrastructure.
Kim-Kwang Raymond Choo
2007
conf/provsec
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Raphael C.-W. Phan
Kim-Kwang Raymond Choo
Swee-Huay Heng
2007
conf/wisa
Secret Signatures: How to Achieve Business Privacy Efficiently?
Byoungcheon Lee
Kim-Kwang Raymond Choo
Jeongmo Yang
Seungjae Yoo
2006
conf/acisp
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Colin Boyd
Kim-Kwang Raymond Choo
Anish Mathuria
2006
conf/acns
Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Qiang Tang
Kim-Kwang Raymond Choo
2005
conf/acisp
Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Kim-Kwang Raymond Choo
Yvonne Hitchcock
2005
conf/asiacrypt
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
Kim-Kwang Raymond Choo
Colin Boyd
Yvonne Hitchcock
2005
conf/asiacrypt
Errors in Computational Complexity Proofs for Protocols.
Kim-Kwang Raymond Choo
Colin Boyd
Yvonne Hitchcock
Coauthors
Abbas Yazdinejad
(1)
Abdul Wahab
(1)
Abid Khan
(1)
Adeel Anjum
(1)
Adnan Akhunzada
(1)
Ali Dehghantanha
(4)
Amanda S. Fernandez
(1)
Amin Beheshti
(1)
Amir Namavar Jahromi
(1)
Amritraj Singh
(1)
Andeep S. Toor
(1)
Anh Phan
(1)
Anish Jindal
(1)
Anish Mathuria
(1)
Anwitaman Datta
(1)
Asma Aloufi
(1)
Asma Haroon
(1)
Basit Raza
(1)
Beibei Li
(1)
Ben Martini
(3)
Benjamin P. Turnbull
(2)
Bin Li
(1)
Bin Luo
(1)
Biwen Chen
(1)
Brett Eterovic-Soric
(1)
Burak Kantarci
(1)
Byoungcheon Lee
(1)
Chaklam Cheong
(1)
Changze Cui
(1)
Chao Lin
(2)
Chao Yuan
(1)
Charles Zhechao Liu
(1)
Cheng Guo
(2)
Chengju Li
(1)
Chenguang Wang
(1)
Chengyu Li
(1)
Christian D'Orazio
(1)
Chuan Li
(1)
Chunhua Su
(1)
Chunkai Dai
(1)
Chunxiao Jiang
(1)
Colin Boyd
(3)
Cong Peng
(1)
Cong Pu
(1)
Constantinos Patsakis
(1)
Cristina Alcaraz
(1)
Da Kuang
(1)
Dajiang Chen
(1)
Daniel Bradford Miller
(1)
Danyang Yue
(1)
Daojing He
(2)
David Ellis Newton
(1)
Debiao He
(12)
Deqing Zou
(4)
Ding Bao
(1)
Dong Wang
(2)
Dongming Sun
(1)
Ehsan Nowroozi
(1)
Erqiang Zhou
(1)
Ezedin Barka
(1)
Feng Wang
(1)
Fran Casino
(1)
Frank Breitinger
(1)
Gagangeet Singh Aujla
(1)
Gaurav Choudhary
(1)
Gaurav Dave
(1)
George Grispos
(1)
Gongxun Miao
(2)
Guobin Zhu
(1)
Guohua Wu
(2)
Guoyan Zhang
(1)
Hadis Karimipour
(1)
Hai Jin
(7)
Haibin Cai
(1)
Haibing Lu
(1)
Hang Liu
(1)
Harry Wechsler
(1)
Hassan Dana Mazraeh
(1)
Heba Saleous
(1)
Helen Ashman
(2)
Hongwei Li
(5)
Hongyang Yan
(1)
Huaqun Wang
(2)
Hudan Studiawan
(1)
Hui Yang
(1)
Ibrahim Radwan
(1)
Ilsun You
(1)
Jaryn Shen
(1)
Javier López
(1)
Jeongmo Yang
(1)
Jesus A. Alvarado
(1)
Jian Weng
(3)
Jianfeng Ma
(1)
Jianhua Chen
(1)
Jianying Zhou
(1)
Jiayan Shen
(1)
Jie He
(1)
Jie Li
(2)
Jing Jia
(1)
Jing Wang
(2)
Jinkai Liu
(1)
Jiqiang Lu
(1)
Jiwu Huang
(1)
Joseph K. Liu
(3)
Juan Wang
(1)
Jun Shao
(1)
Jun Zhou
(2)
Kaitai Liang
(2)
Kara L. Nance
(1)
Keke Gai
(2)
Kenny Patrick
(1)
Keping Yu
(1)
Kim-Kwang Raymond Choo
(115)
Lam-for Kwok
(1)
Lei Liu
(1)
Lei Zhang
(2)
Li Li
(1)
Liang Hu
(1)
Liang Zhang
(1)
Libing Wu
(2)
Lichun Li
(1)
Lijun Jiang
(1)
Lin Chen
(1)
Lu Zhou
(1)
Luca Chiaraviglio
(1)
Man Ho Au
(1)
Mark Xuefang Zhu
(2)
Mark Yampolskiy
(1)
Marwa Keshk
(1)
Masoom Alam
(1)
Matt Bishop
(1)
Mauro Conti
(2)
Max Kilger
(1)
Meimin Wang
(1)
Michele Ianni
(1)
Michele Nappi
(1)
Miguel Pupo Correia
(1)
Mila Dalla Preda
(1)
Milad Taleby Ahvanooey
(2)
Min Luo
(1)
Minghao Zhao
(1)
Mohamed Amine Ferrag
(1)
Mohamed Benbouzid
(1)
Mohammad Dabbagh
(1)
Mohammad Tahir
(1)
Mohammed Hassanin
(1)
Muhammad Khurram Khan
(2)
Murat Tahtali
(1)
Nader Sohrabi Safa
(1)
Narendra S. Chaudhari
(1)
Naveed Ahmad
(1)
Neeraj Kumar
(3)
Neetesh Saxena
(1)
Ning Chen
(1)
Ning Lu
(1)
Ning Zhang
(2)
Nour Moustafa
(5)
Nurul Hidayah Ab Rahman
(1)
Osama Al-Kadi
(1)
Othmane Friha
(1)
Pan Zhou
(1)
Pandi Vijayakumar
(1)
Peiying Zhang
(1)
Peizhao Hu
(1)
Peng Zeng
(1)
Ping Xiong
(2)
Qi Feng
(2)
Qi Zhang
(1)
Qi Zhou
(1)
Qiang Tang
(1)
Qianmu Li
(1)
Qing Yang
(1)
Qingkai Zeng
(1)
Qingqing Yang
(1)
Qiuhua Wang
(3)
Quang Do
(3)
Quratulain Alam
(1)
Rajat Chaudhary
(1)
Raphaël C.-W. Phan
(1)
Renyong Wu
(1)
Reza M. Parizi
(4)
Robert H. Deng
(6)
Rongxing Lu
(2)
Runmeng Du
(1)
Ruochen Wang
(1)
Ruohan Meng
(1)
Saed Alrabaee
(1)
Saher Tabbasum
(1)
Saif Ur Rehman Malik
(2)
Saleh H. Aldaajeh
(1)
Samee U. Khan
(1)
Sameera Mubarak
(1)
Sammy Chan
(1)
Sangeen Khan
(1)
Saru Kumari
(1)
Sattar Hashemi
(1)
Seungjae Yoo
(1)
Seyit Camtepe
(1)
Shangqi Lai
(1)
Shaoquan Jiang
(1)
Shawn Knox
(1)
Sheng Wu
(1)
Sherman S. M. Chow
(1)
Shibao Li
(1)
Shiyan Ou
(1)
Shubhani Aggarwal
(1)
Shujiang Xu
(1)
Shuyun Shi
(1)
Steven Moghadam
(1)
Swee-Huay Heng
(1)
Tao Xiang
(1)
Tao Zhang
(1)
Tarek Berghout
(1)
Tianqing Zhu
(5)
Tiantian Li
(2)
Tianyu Xia
(2)
Timothy T. Yuen
(1)
Ting Wu
(1)
Victor Prokhorenko
(1)
Vikas Sihag
(1)
Wael Issa
(1)
Waqas Haider
(1)
Wei Ren
(6)
Wei Wang
(1)
Wei Wu
(1)
Wei Zheng
(1)
Weiqi Dai
(4)
Weixuan Tang
(1)
Weizhi Meng
(2)
Wenbo Shi
(1)
Wenjuan Li
(2)
Wenmao Liu
(1)
William Bradley Glisson
(2)
Willy Susilo
(1)
Wojciech Mazurczyk
(2)
Xia Xie
(2)
Xiaofeng Ding
(3)
Xiaohai Dai
(1)
Xiaohua Dong
(1)
Xiaolei Dong
(2)
Xiaolu Zhang
(2)
Ximeng Liu
(1)
Xin Lv
(1)
Xinghua Li
(4)
Xinpeng Zhang
(1)
Xinyi Huang
(2)
Xinyu Tang
(1)
Xiuting Gu
(1)
Xu An Wang
(1)
Xueqian Xu
(1)
Xuru Li
(1)
Yafang Yang
(2)
Yan Lv
(1)
Yan Zhang
(2)
Yanbing Ren
(1)
Yang Liu
(1)
Yang Zhou
(2)
Yanjiang Yang
(3)
Yannan Li
(1)
Yi Ding
(1)
Yi-Ning Liu
(1)
Yinbin Miao
(5)
Yingmo Jie
(1)
Yizhi Ren
(4)
Yong Yu
(1)
Yongxin Zhang
(1)
Yuangang Li
(1)
Yuchen Lei
(1)
Yue Cao
(1)
Yuexin Xiang
(2)
Yujie Song
(1)
Yunlei Zhao
(2)
Yutao Yang
(1)
Yvonne Hitchcock
(3)
Zhe Liu
(2)
Zhen Qin
(1)
Zhen Wang
(1)
Zhenfu Cao
(2)
Zheng Zhang
(1)
Zhiguang Qin
(1)
Zhili Zhou
(2)
Zhiqiu Zhang
(1)
Zhiquan Liu
(1)
Zhiyan Xu
(1)
Zhongyun Lin
(1)
Zhongze Liu
(1)
Zhuo Wei
(1)
Zi Wang
(1)
Ziteng Liu
(1)
Zuan Wang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to