What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Duncan S. Wong
Google Scholar
69
publications in security and cryptology related venues
Year
Venue
Title
2020
journals/compsec
Am I eclipsed? A smart detector of eclipse attacks for Ethereum.
Guangquan Xu
Bingjiang Guo
Chunhua Su
Xi Zheng
Kaitai Liang
Duncan S. Wong
Hao Wang
2019
conf/eurosp
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Zhen Liu
Guomin Yang
Duncan S. Wong
Khoa Nguyen
Huaxiong Wang
2019
conf/esorics
A Lattice-Based Linkable Ring Signature Supporting Stealth Addresses.
Zhen Liu
Khoa Nguyen
Guomin Yang
Huaxiong Wang
Duncan S. Wong
2017
journals/tifs
Provably Secure Dynamic ID-Based Anonymous Two-Factor Authenticated Key Exchange Protocol With Extended Security Model.
Qi Xie
Duncan S. Wong
Guilin Wang
Xiao Tan
Kefei Chen
Liming Fang
2016
conf/ccs
Dealerless Corporate Key Generation for Identity-Based Encryption Schemes.
Zhen Liu
Duncan S. Wong
Jack Poon
2016
conf/acns
TMGuard: A Touch Movement-Based Security Mechanism for Screen Unlock Patterns on Smartphones.
Weizhi Meng
Wenjuan Li
Duncan S. Wong
Jianying Zhou
2016
conf/esorics
Lightweight Delegatable Proofs of Storage.
Jia Xu
Anjia Yang
Jianying Zhou
Duncan S. Wong
2015
journals/tifs
Traceable CP-ABE: How to Trace Decryption Devices Found in the Wild.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
2015
journals/tifs
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations.
Xiaofeng Chen
Xinyi Huang
Jin Li
Jianfeng Ma
Wenjing Lou
Duncan S. Wong
2015
conf/acns
Practical Ciphertext-Policy Attribute-Based Encryption: Traitor Tracing, Revocation, and Large Universe.
Zhen Liu
Duncan S. Wong
2015
conf/wisa
How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol.
Yunhui Zhuang
Gerhard P. Hancke
Duncan S. Wong
2015
conf/icics
Traceable CP-ABE on Prime Order Groups: Fully Secure and Fully Collusion-Resistant Blackbox Traceable.
Zhen Liu
Duncan S. Wong
2014
journals/tifs
CP-ABE With Constant-Size Keys for Lightweight Devices.
Fuchun Guo
Yi Mu
Willy Susilo
Duncan S. Wong
Vijay Varadharajan
2014
journals/tifs
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
Kaitai Liang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
Tran Viet Xuan Phuong
Qi Xie
2014
conf/esorics
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage.
Yujue Wang
Qianhong Wu
Duncan S. Wong
Bo Qin
Sherman S. M. Chow
Zhen Liu
Xiao Tan
2014
conf/esorics
An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing.
Kaitai Liang
Joseph K. Liu
Duncan S. Wong
Willy Susilo
2014
conf/ctrsa
Practical Distributed Signatures in the Standard Model.
Yujue Wang
Duncan S. Wong
Qianhong Wu
Sherman S. M. Chow
Bo Qin
Jianwei Liu
2014
conf/ctrsa
P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.
Qiong Huang
Duncan S. Wong
Willy Susilo
2013
journals/tifs
White-Box Traceable Ciphertext-Policy Attribute-Based Encryption Supporting Any Monotone Access Structures.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
2013
conf/ccs
Anonymous attribute-based encryption supporting efficient decryption test.
Yinghui Zhang
Xiaofeng Chen
Jin Li
Duncan S. Wong
Hui Li
2013
conf/ccs
Blackbox traceable CP-ABE: how to catch people leaking their keys by selling decryption devices on ebay.
Zhen Liu
Zhenfu Cao
Duncan S. Wong
2013
conf/acisp
Fairness in Concurrent Signatures Revisited.
Willy Susilo
Man Ho Au
Yang Wang
Duncan S. Wong
2013
conf/icisc
Ambiguous One-Move Nominative Signature Without Random Oracles.
Dennis Y. W. Liu
Duncan S. Wong
Qiong Huang
2012
conf/acisp
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes.
Xiao Tan
Duncan S. Wong
2012
conf/icisc
A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles.
Kaitai Liang
Zhen Liu
Xiao Tan
Duncan S. Wong
Chunming Tang
2012
conf/provsec
One-Move Convertible Nominative Signature in the Standard Model.
Dennis Y. W. Liu
Duncan S. Wong
2012
conf/pkc
The Construction of Ambiguous Optimistic Fair Exchange from Designated Confirmer Signature without Random Oracles.
Qiong Huang
Duncan S. Wong
Willy Susilo
2012
conf/icics
An Efficient Single-Slow-Phase Mutually Authenticated RFID Distance Bounding Protocol with Tag Privacy.
Anjia Yang
Yunhui Zhuang
Duncan S. Wong
2012
conf/icics
Acceleration of Composite Order Bilinear Pairing on Graphics Hardware.
Ye Zhang
Chun Jason Xue
Duncan S. Wong
Nikos Mamoulis
Siu-Ming Yiu
2012
conf/icics
Enhancing the Perceived Visual Quality of a Size Invariant Visual Cryptography Scheme.
Yang-Wai Chow
Willy Susilo
Duncan S. Wong
2011
journals/tifs
Efficient Designated Confirmer Signature and DCS-Based Ambiguous Optimistic Fair Exchange.
Qiong Huang
Duncan S. Wong
Willy Susilo
2011
conf/ccs
Multi-authority ciphertext-policy attribute-based encryption with accountability.
Jin Li
Qiong Huang
Xiaofeng Chen
Sherman S. M. Chow
Duncan S. Wong
Dongqing Xie
2011
conf/fc
Authenticated Key Exchange under Bad Randomness.
Guomin Yang
Shanshan Duan
Duncan S. Wong
Chik How Tan
Huaxiong Wang
2011
conf/provsec
Concurrent Signatures with Fully Negotiable Binding Control.
Tsz Hon Yuen
Duncan S. Wong
Willy Susilo
Qiong Huang
2011
conf/esorics
Fully Secure Multi-authority Ciphertext-Policy Attribute-Based Encryption without Random Oracles.
Zhen Liu
Zhenfu Cao
Qiong Huang
Duncan S. Wong
Tsz Hon Yuen
2010
conf/provsec
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Patrick P. Tsang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2010
conf/ctrsa
Probabilistic Public Key Encryption with Equality Test.
Guomin Yang
Chik How Tan
Qiong Huang
Duncan S. Wong
2008
conf/acns
Generic Security-Amplifying Methods of Ordinary Digital Signatures.
Jin Li
Kwangjo Kim
Fangguo Zhang
Duncan S. Wong
2008
conf/acns
Traceable and Retrievable Identity-Based Encryption.
Man Ho Au
Qiong Huang
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
2008
conf/ndss
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.
Sherman S. M. Chow
Joseph K. Liu
Duncan S. Wong
2008
conf/ctrsa
Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles.
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
2008
conf/asiacrypt
Ambiguous Optimistic Fair Exchange.
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
2007
conf/acisp
Generic Certificateless Key Encapsulation Mechanism.
Qiong Huang
Duncan S. Wong
2007
conf/acisp
Certificateless Signature Revisited.
Xinyi Huang
Yi Mu
Willy Susilo
Duncan S. Wong
Wei Wu
2007
conf/acns
Generic Transformation to Strongly Unforgeable Signatures.
Qiong Huang
Duncan S. Wong
Yiming Zhao
2007
conf/acns
A More Natural Way to Construct Identity-Based Identification Schemes.
Guomin Yang
Jing Chen
Duncan S. Wong
Xiaotie Deng
Dongsheng Wang
2007
conf/pkc
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.
Guilin Wang
Joonsang Baek
Duncan S. Wong
Feng Bao
2007
conf/icics
Formal Definition and Construction of Nominative Signature.
Dennis Y. W. Liu
Duncan S. Wong
Xinyi Huang
Guilin Wang
Qiong Huang
Yi Mu
Willy Susilo
2007
conf/icics
An Efficient Password-Only Two-Server Authenticated Key Exchange System.
Haimin Jin
Duncan S. Wong
Yinlong Xu
2007
conf/iwsec
Generic Certificateless Encryption in the Standard Model.
Qiong Huang
Duncan S. Wong
2007
conf/iwsec
Nominative Signature from Ring Signature.
Dennis Y. W. Liu
Shuang Chang
Duncan S. Wong
Yi Mu
2006
conf/acisp
Key Replacement Attack Against a Generic Construction of Certificateless Signature.
Bessie C. Hu
Duncan S. Wong
Zhenfeng Zhang
Xiaotie Deng
2006
conf/acns
Certificateless Public-Key Signature: Security Model and Efficient Construction.
Zhenfeng Zhang
Duncan S. Wong
Jing Xu
Dengguo Feng
2006
conf/pkc
Anonymous Signature Schemes.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
Huaxiong Wang
2006
conf/icics
Formal Analysis and Systematic Construction of Two-Factor Authentication Scheme (Short Paper).
Guomin Yang
Duncan S. Wong
Huaxiong Wang
Xiaotie Deng
2006
conf/ctrsa
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.
Xiaojian Tian
Duncan S. Wong
2006
conf/iwsec
Ring Signature with Designated Linkability.
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2006
conf/iwsec
ID-Based Ring Signature Scheme Secure in the Standard Model.
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
Duncan S. Wong
2005
conf/sec
Transferable E-Cash Revisit.
Joseph K. Liu
Sandy H. Wong
Duncan S. Wong
2005
conf/acisp
Deposit-Case Attack Against Secure Roaming.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
2005
conf/acns
Efficient Anonymous Roaming and Its Security Analysis.
Guomin Yang
Duncan S. Wong
Xiaotie Deng
2005
conf/icisc
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms.
Joseph K. Liu
Patrick P. Tsang
Duncan S. Wong
Robert W. Zhu
2004
conf/acisp
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract).
Joseph K. Liu
Victor K. Wei
Duncan S. Wong
2004
conf/icisc
On the Security Models of (Threshold) Ring Signature Schemes.
Joseph K. Liu
Duncan S. Wong
2004
conf/wisa
Custodian-Hiding Verifiable Encryption.
Joseph K. Liu
Victor K. Wei
Duncan S. Wong
2003
conf/icisc
A Separable Threshold Ring Signature Scheme.
Joseph K. Liu
Victor K. Wei
Duncan S. Wong
2003
conf/icics
On the RS-Code Construction of Ring Signature Schemes and a Threshold Setting of RST.
Duncan S. Wong
Karyin Fung
Joseph K. Liu
Victor K. Wei
2001
conf/asiacrypt
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.
Duncan S. Wong
Agnes Hui Chan
2001
conf/acsac
The Performance Measurement of Cryptographic Primitives on Palm Devices.
Duncan S. Wong
Hector Ho Fuentes
Agnes Hui Chan
Coauthors
Agnes Hui Chan
(2)
Anjia Yang
(2)
Bessie C. Hu
(1)
Bingjiang Guo
(1)
Bo Qin
(2)
Chik How Tan
(2)
Chun Jason Xue
(1)
Chunhua Su
(1)
Chunming Tang
(1)
Dengguo Feng
(1)
Dennis Y. W. Liu
(4)
Dongqing Xie
(1)
Dongsheng Wang
(1)
Duncan S. Wong
(69)
Fangguo Zhang
(1)
Feng Bao
(1)
Fuchun Guo
(1)
Gerhard P. Hancke
(1)
Guangquan Xu
(1)
Guilin Wang
(3)
Guomin Yang
(13)
Haimin Jin
(1)
Hao Wang
(1)
Hector Ho Fuentes
(1)
Huaxiong Wang
(5)
Hui Li
(1)
Jack Poon
(1)
Jia Xu
(1)
Jianfeng Ma
(1)
Jianwei Liu
(1)
Jianying Zhou
(2)
Jin Li
(4)
Jing Chen
(1)
Jing Xu
(1)
Joonsang Baek
(1)
Joseph K. Liu
(14)
Kaitai Liang
(4)
Karyin Fung
(1)
Kefei Chen
(1)
Khoa Nguyen
(2)
Kwangjo Kim
(1)
Liming Fang
(1)
Man Ho Au
(5)
Nikos Mamoulis
(1)
Patrick P. Tsang
(2)
Qi Xie
(2)
Qianhong Wu
(2)
Qiong Huang
(15)
Robert W. Zhu
(1)
Sandy H. Wong
(1)
Shanshan Duan
(1)
Sherman S. M. Chow
(4)
Shuang Chang
(1)
Siu-Ming Yiu
(1)
Tran Viet Xuan Phuong
(1)
Tsz Hon Yuen
(3)
Victor K. Wei
(4)
Vijay Varadharajan
(1)
Wei Wu
(1)
Weizhi Meng
(1)
Wenjing Lou
(1)
Wenjuan Li
(1)
Willy Susilo
(16)
Xi Zheng
(1)
Xiao Tan
(4)
Xiaofeng Chen
(3)
Xiaojian Tian
(1)
Xiaotie Deng
(6)
Xinyi Huang
(3)
Yang Wang
(1)
Yang-Wai Chow
(1)
Ye Zhang
(1)
Yi Mu
(4)
Yiming Zhao
(1)
Yinghui Zhang
(1)
Yinlong Xu
(1)
Yujue Wang
(2)
Yunhui Zhuang
(2)
Zhen Liu
(11)
Zhenfeng Zhang
(2)
Zhenfu Cao
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to