What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Man Ho Au
Google Scholar
ORCID:
0000-0003-2068-9530
102
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
FDAAC-CR: Practical Delegatable Attribute-Based Anonymous Credentials With Fine-Grained Delegation Management and Chainable Revocation.
Min Xie
Peichen Ju
Yanqi Zhao
Zoe L. Jiang
Man Ho Au
Junbin Fang
Yong Yu
Xuan Wang
2025
journals/tifs
An Enhanced Linearly Homomorphic Network Coding Signature Scheme for Secure Data Delivery in IoT Networks.
Hao Huang
Xiaofen Wang
Man Ho Au
Sheng Cao
Qinglin Zhao
Jiguo Yu
2025
conf/acisp
Compressed Sigma Protocols: New Model and Aggregation Techniques.
Yuxi Xue
Tianyu Zheng
Shang Gao
Bin Xiao
Man Ho Au
2025
conf/acisp
High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping.
Zejiu Tan
Junping Wan
Zoe L. Jiang
Jingjing Fan
Man Ho Au
Siu Ming Yiu
2025
conf/sp
JesseQ: Efficient Zero-Knowledge Proofs for Circuits Over Any Field.
Mengling Liu
Yang Heng
Xingye Lu
Man Ho Au
2025
conf/icics
A BGV-Subroutined CKKS Bootstrapping Algorithm Without Sine Approximation.
Jingjing Fan
Chi Zhang
Zejiu Tan
Zoe Lin Jiang
Man Ho Au
Siu Ming Yiu
2025
conf/icics
Compact Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.
Jingjing Fan
Xingye Lu
Man Ho Au
Siu Ming Yiu
2025
conf/provsec
Plum: SNARK-Friendly Post-Quantum Signature Based on Power Residue PRFs.
Xinyu Zhang
Qishuang Fu
Ron Steinfeld
Joseph K. Liu
Tsz Hon Yuen
Man Ho Au
2024
journals/tifs
Efficient Verifiably Encrypted ECDSA Schemes From Castagnos-Laguillaumie and Joye-Libert Encryptions.
Xiao Yang
Chengru Zhang
Haiyang Xue
Man Ho Au
2024
conf/ccs
Direct Range Proofs for Paillier Cryptosystem and Their Applications.
Zhikang Xie
Mengling Liu
Haiyang Xue
Man Ho Au
Robert H. Deng
Siu-Ming Yiu
2024
conf/sp
Efficient Zero-Knowledge Arguments For Paillier Cryptosystem.
Borui Gong
Wang Fat Lau
Man Ho Au
Rupeng Yang
Haiyang Xue
Lichun Li
2024
conf/provsec
Blocklistable Anonymous Credential for Circuits with Post-quantum Security.
Zuoxia Yu
Rupeng Yang
Willy Susilo
Man Ho Au
2024
conf/esorics
Efficient Linkable Ring Signatures: New Framework and Post-quantum Instantiations.
Yuxi Xue
Xingye Lu
Man Ho Au
Chengru Zhang
2024
conf/icics
Tightly Secure Linearly Homomorphic Signature Schemes for Subspace Under DL Assumption in AGM.
Hao Huang
Xiaofen Wang
Ke Zhang
Man Ho Au
Sheng Cao
Qinglin Zhao
Xiaosong Zhang
2024
conf/dsn
BFTRAND: Low-Latency Random Number Provider for BFT Smart Contracts.
Jinghui Liao
Borui Gong
Wenhai Sun
Fengwei Zhang
Zhenyu Ning
Man Ho Au
Weisong Shi
2023
journals/tifs
ePoSt: Practical and Client-Friendly Proof of Storage-Time.
Chengru Zhang
Xinyu Li
Man Ho Au
2023
conf/ccs
Efficient Multiplicative-to-Additive Function from Joye-Libert Cryptosystem and Its Application to Threshold ECDSA.
Haiyang Xue
Man Ho Au
Mengling Liu
Kwan Yin Chan
Handong Cui
Xiang Xie
Tsz Hon Yuen
Chengru Zhang
2023
conf/acisp
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors.
Jingjing Fan
Xingye Lu
Man Ho Au
2022
journals/tifs
Efficient Verifiably Encrypted ECDSA-Like Signatures and Their Applications.
Xiao Yang
Mengling Liu
Man Ho Au
Xiapu Luo
Qingqing Ye
2022
conf/crypto
Public-Key Watermarking Schemes for Pseudorandom Functions.
Rupeng Yang
Zuoxia Yu
Man Ho Au
Willy Susilo
2022
conf/provsec
Secure-Channel Free Certificateless Searchable Public Key Authenticated Encryption with Keyword Search.
Pan Yang
Hongbo Li
Jianye Huang
Hao Zhang
Man Ho Au
Qiong Huang
2022
conf/asiaccs
AuxChannel: Enabling Efficient Bi-Directional Channel for Scriptless Blockchains.
Zhimei Sui
Joseph K. Liu
Jiangshan Yu
Man Ho Au
Jia Liu
2021
conf/ccs
Efficient Online-friendly Two-Party ECDSA Signature.
Haiyang Xue
Man Ho Au
Xiang Xie
Tsz Hon Yuen
Handong Cui
2021
conf/crypto
DualRing: Generic Construction of Ring Signatures with Efficient Instantiations.
Tsz Hon Yuen
Muhammed F. Esgin
Joseph K. Liu
Man Ho Au
Zhimin Ding
2021
conf/sp
Happer: Unpacking Android Apps via a Hardware-Assisted Approach.
Lei Xue
Hao Zhou
Xiapu Luo
Yajin Zhou
Yang Shi
Guofei Gu
Fengwei Zhang
Man Ho Au
2020
journals/tifs
Practical Escrow Protocol for Bitcoin.
Xiao Yang
Wang Fat Lau
Qingqing Ye
Man Ho Au
Joseph K. Liu
Jacob Cheng
2020
conf/crypto
Collusion Resistant Watermarkable PRFs from Standard Assumptions.
Rupeng Yang
Man Ho Au
Zuoxia Yu
Qiuliang Xu
2020
conf/fc
RingCT 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security.
Tsz Hon Yuen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Muhammed F. Esgin
Qingzhao Zhang
Dawu Gu
2020
conf/esorics
PGC: Decentralized Confidential Payment System with Auditability.
Yu Chen
Xuecheng Ma
Cong Tang
Man Ho Au
2020
conf/asiacrypt
Possibility and Impossibility Results for Receiver Selective Opening Secure PKE in the Multi-challenge Setting.
Rupeng Yang
Junzuo Lai
Zhengan Huang
Man Ho Au
Qiuliang Xu
Willy Susilo
2019
journals/compsec
Decentralized blacklistable anonymous credentials with reputation.
Rupeng Yang
Man Ho Au
Qiuliang Xu
Zuoxia Yu
2019
conf/crypto
Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications.
Rupeng Yang
Man Ho Au
Zhenfei Zhang
Qiuliang Xu
Zuoxia Yu
William Whyte
2019
conf/fc
New Empirical Traceability Analysis of CryptoNote-Style Blockchains.
Zuoxia Yu
Man Ho Au
Jiangshan Yu
Rupeng Yang
Qiuliang Xu
Wang Fat Lau
2019
conf/acns
Strong Leakage and Tamper-Resilient PKE from Refined Hash Proof System.
Shifeng Sun
Dawu Gu
Man Ho Au
Shuai Han
Yu Yu
Joseph K. Liu
2019
conf/acns
Raptor: A Practical Lattice-Based (Linkable) Ring Signature.
Xingye Lu
Man Ho Au
Zhenfei Zhang
2019
conf/acns
Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
Wenjuan Li
Yu Wang
Jin Li
Man Ho Au
2019
conf/provsec
An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks Using Online/Offline Certificateless Aggregate Signature.
Kang Li
Man Ho Au
Ivan Wang Hei Ho
Yilei Wang
2019
conf/asiacrypt
Strongly Secure Authenticated Key Exchange from Supersingular Isogenies.
Xiu Xu
Haiyang Xue
Kunpeng Wang
Man Ho Au
Song Tian
2019
conf/asiacrypt
Collusion Resistant Watermarking Schemes for Cryptographic Functionalities.
Rupeng Yang
Man Ho Au
Junzuo Lai
Qiuliang Xu
Zuoxia Yu
2019
conf/africacrypt
Ring Signatures Based on Middle-Product Learning with Errors Problems.
Dipayan Das
Man Ho Au
Zhenfei Zhang
2018
conf/ccs
Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption.
Zuoxia Yu
Man Ho Au
Rupeng Yang
Junzuo Lai
Qiuliang Xu
2018
conf/acisp
Decentralized Blacklistable Anonymous Credentials with Reputation.
Rupeng Yang
Man Ho Au
Qiuliang Xu
Zuoxia Yu
2018
conf/acisp
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
Wilson Abel Alberto Torres
Ron Steinfeld
Amin Sakzad
Joseph K. Liu
Veronika Kuchta
Nandita Bhattacharjee
Man Ho Au
Jacob Cheng
2018
conf/acisp
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction.
Xingye Lu
Zhenfei Zhang
Man Ho Au
2018
conf/acisp
Lattice-Based Universal Accumulator with Nonmembership Arguments.
Zuoxia Yu
Man Ho Au
Rupeng Yang
Junzuo Lai
Qiuliang Xu
2018
conf/acisp
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation.
Junzuo Lai
Zhengan Huang
Man Ho Au
Xianping Mao
2018
conf/fc
Anonymous Post-Quantum Cryptocash.
Huang Zhang
Fangguo Zhang
Haibo Tian
Man Ho Au
2018
conf/esorics
Towards Efficient Verifiable Conjunctive Keyword Search for Large Encrypted Database.
Jianfeng Wang
Xiaofeng Chen
Shifeng Sun
Joseph K. Liu
Man Ho Au
Zhi-Hui Zhan
2018
conf/pkc
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures.
Zhengan Huang
Junzuo Lai
Wenbin Chen
Man Ho Au
Zhen Peng
Jin Li
2017
journals/tifs
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
Yong Yu
Man Ho Au
Giuseppe Ateniese
Xinyi Huang
Willy Susilo
Yuanshun Dai
Geyong Min
2017
conf/ccs
An Efficient KP-ABE with Short Ciphertexts in Prime OrderGroups under Standard Assumption.
Jongkil Kim
Willy Susilo
Fuchun Guo
Man Ho Au
Surya Nepal
2017
conf/acisp
Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
Weizhi Meng
Lee Wang Hao
Man Ho Au
Zhe Liu
2017
conf/provsec
Fuzzy Public-Key Encryption Based on Biometric Data.
Hui Cui
Man Ho Au
Baodong Qin
Robert H. Deng
Xun Yi
2017
conf/esorics
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero.
Shifeng Sun
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
2017
conf/icics
Practical Range Proof for Cryptocurrency Monero with Provable Security.
Kang Li
Rupeng Yang
Man Ho Au
Qiuliang Xu
2016
journals/tifs
Fine-Grained Two-Factor Access Control for Web-Based Cloud Computing Services.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Rongxing Lu
Jin Li
2016
conf/ccs
Anonymous Identification for Ad Hoc Group.
Xingye Lu
Man Ho Au
2016
conf/acisp
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Wei Chen
Xiapu Luo
Chengyu Yin
Bin Xiao
Man Ho Au
Yajuan Tang
2016
conf/acisp
I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale Location Privacy Probing.
Shuang Zhao
Xiapu Luo
Bo Bai
Xiaobo Ma
Wei Zou
Xinliang Qiu
Man Ho Au
2016
conf/acisp
Leakage-Resilient Functional Encryption via Pair Encodings.
Zuoxia Yu
Man Ho Au
Qiuliang Xu
Rupeng Yang
Jinguang Han
2016
conf/acisp
Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Yong Yu
Yannan Li
Man Ho Au
Willy Susilo
Kim-Kwang Raymond Choo
Xinpeng Zhang
2016
conf/acisp
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security.
Kai He
Jian Weng
Man Ho Au
Yijun Mao
Robert H. Deng
2015
journals/tifs
Time-Bound Anonymous Authentication for Roaming Networks.
Joseph K. Liu
Cheng-Kang Chu
Sherman S. M. Chow
Xinyi Huang
Man Ho Au
Jianying Zhou
2015
journals/tifs
AAC-OT: Accountable Oblivious Transfer With Access Control.
Jinguang Han
Willy Susilo
Yi Mu
Man Ho Au
Jie Cao
2015
journals/tifs
Adaptively Secure Identity-Based Broadcast Encryption With a Constant-Sized Ciphertext.
Jongkil Kim
Willy Susilo
Man Ho Au
Jennifer Seberry
2014
journals/tifs
Collusion-Resistance in Optimistic Fair Exchange.
Yang Wang
Willy Susilo
Man Ho Au
Guilin Wang
2014
journals/tifs
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing.
Kaitai Liang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
Tran Viet Xuan Phuong
Qi Xie
2014
conf/provsec
Complete Robustness in Identity-Based Encryption.
Hui Cui
Yi Mu
Man Ho Au
2014
conf/esorics
PPDCP-ABE: Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption.
Jinguang Han
Willy Susilo
Yi Mu
Jianying Zhou
Man Ho Au
2014
conf/esorics
New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era.
Joseph K. Liu
Man Ho Au
Xinyi Huang
Willy Susilo
Jianying Zhou
Yong Yu
2014
conf/icics
A Visual One-Time Password Authentication Scheme Using Mobile Devices.
Yang-Wai Chow
Willy Susilo
Man Ho Au
Ari Moesriami Barmawi
2014
conf/icics
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator.
Yuechen Chen
Zoe Lin Jiang
Siu-Ming Yiu
Joseph K. Liu
Man Ho Au
Xuan Wang
2013
journals/istr
Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow
Man Ho Au
Willy Susilo
2013
journals/tifs
Realizing Fully Secure Unrestricted ID-Based Ring Signature in the Standard Model Based on HIBE.
Man Ho Au
Joseph K. Liu
Willy Susilo
Jianying Zhou
2013
conf/acisp
Fairness in Concurrent Signatures Revisited.
Willy Susilo
Man Ho Au
Yang Wang
Duncan S. Wong
2013
conf/acisp
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Yang Wang
Mark Manulis
Man Ho Au
Willy Susilo
2013
conf/provsec
Anonymous Signcryption against Linear Related-Key Attacks.
Hui Cui
Yi Mu
Man Ho Au
2012
conf/ccs
PERM: practical reputation-based blacklisting without TTPS.
Man Ho Au
Apu Kapadia
2012
conf/provsec
Efficient Escrow-Free Identity-Based Signature.
Yunmei Zhang
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
2012
conf/esorics
Enhancing Location Privacy for Electric Vehicles (at the Right time).
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2012
conf/ndss
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation.
Man Ho Au
Apu Kapadia
Willy Susilo
2012
conf/icics
Forward Secure Attribute-Based Signatures.
Tsz Hon Yuen
Joseph K. Liu
Xinyi Huang
Man Ho Au
Willy Susilo
Jianying Zhou
2012
conf/icics
Perfect Ambiguous Optimistic Fair Exchange.
Yang Wang
Man Ho Au
Willy Susilo
2011
conf/ccs
Server-aided signatures verification secure against collusion attack.
Sherman S. M. Chow
Man Ho Au
Willy Susilo
2011
conf/ccs
Threshold ring signature without random oracles.
Tsz Hon Yuen
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2011
conf/acisp
Electronic Cash with Anonymous User Suspension.
Man Ho Au
Willy Susilo
Yi Mu
2010
conf/ccs
Attribute-based signature and its applications.
Jin Li
Man Ho Au
Willy Susilo
Dongqing Xie
Kui Ren
2010
conf/acisp
Proof-of-Knowledge of Representation of Committed Value and Its Applications.
Man Ho Au
Willy Susilo
Yi Mu
2010
conf/provsec
A Suite of Non-pairing ID-Based Threshold Ring Signature Schemes with Different Levels of Anonymity (Extended Abstract).
Patrick P. Tsang
Man Ho Au
Joseph K. Liu
Willy Susilo
Duncan S. Wong
2010
conf/esorics
Short Generic Transformation to Strongly Unforgeable Signature in the Standard Model.
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2009
conf/provsec
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?
Man Ho Au
Willy Susilo
Yi Mu
2009
conf/icics
Online/Offline Ring Signature Scheme.
Joseph K. Liu
Man Ho Au
Willy Susilo
Jianying Zhou
2009
conf/ctrsa
Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.
Man Ho Au
Patrick P. Tsang
Willy Susilo
Yi Mu
2008
conf/ccs
PEREA: towards practical TTP-free revocation in anonymous authentication.
Patrick P. Tsang
Man Ho Au
Apu Kapadia
Sean W. Smith
2008
conf/fc
Practical Anonymous Divisible E-Cash from Bounded Accumulators.
Man Ho Au
Willy Susilo
Yi Mu
2008
conf/acns
Traceable and Retrievable Identity-Based Encryption.
Man Ho Au
Qiong Huang
Joseph K. Liu
Willy Susilo
Duncan S. Wong
Guomin Yang
2007
conf/ccs
Blacklistable anonymous credentials: blocking misbehaving users without ttps.
Patrick P. Tsang
Man Ho Au
Apu Kapadia
Sean W. Smith
2007
conf/acisp
Practical Compact E-Cash.
Man Ho Au
Willy Susilo
Yi Mu
2007
conf/icics
(Convertible) Undeniable Signatures Without Random Oracles.
Tsz Hon Yuen
Man Ho Au
Joseph K. Liu
Willy Susilo
2007
conf/ctrsa
Compact E-Cash from Bounded Accumulator.
Man Ho Au
Qianhong Wu
Willy Susilo
Yi Mu
2006
conf/acisp
-Times Revocable-iff-Linked Group Signatures.
Man Ho Au
Willy Susilo
Siu-Ming Yiu
2006
conf/iwsec
ID-Based Ring Signature Scheme Secure in the Standard Model.
Man Ho Au
Joseph K. Liu
Tsz Hon Yuen
Duncan S. Wong
Coauthors
Amin Sakzad
(1)
Apu Kapadia
(4)
Ari Moesriami Barmawi
(1)
Baodong Qin
(1)
Bin Xiao
(2)
Bo Bai
(1)
Borui Gong
(2)
Cheng-Kang Chu
(1)
Chengru Zhang
(4)
Chengyu Yin
(1)
Chi Zhang
(1)
Cong Tang
(1)
Dawu Gu
(2)
Dipayan Das
(1)
Dongqing Xie
(1)
Duncan S. Wong
(5)
Fangguo Zhang
(1)
Fengwei Zhang
(2)
Fuchun Guo
(1)
Geyong Min
(1)
Giuseppe Ateniese
(1)
Guilin Wang
(1)
Guofei Gu
(1)
Guomin Yang
(2)
Haibo Tian
(1)
Haiyang Xue
(6)
Handong Cui
(2)
Hao Huang
(2)
Hao Zhang
(1)
Hao Zhou
(1)
Hongbo Li
(1)
Huang Zhang
(1)
Hui Cui
(3)
Ivan Wang Hei Ho
(1)
Jacob Cheng
(2)
Jennifer Seberry
(1)
Jia Liu
(1)
Jian Weng
(1)
Jianfeng Wang
(1)
Jiangshan Yu
(2)
Jianye Huang
(1)
Jianying Zhou
(9)
Jie Cao
(1)
Jiguo Yu
(1)
Jin Li
(4)
Jinghui Liao
(1)
Jingjing Fan
(4)
Jinguang Han
(3)
Jongkil Kim
(2)
Joseph K. Liu
(25)
Junbin Fang
(1)
Junping Wan
(1)
Junzuo Lai
(6)
Kai He
(1)
Kaitai Liang
(1)
Kang Li
(2)
Ke Zhang
(1)
Kim-Kwang Raymond Choo
(1)
Kui Ren
(1)
Kunpeng Wang
(1)
Kwan Yin Chan
(1)
Lee Wang Hao
(1)
Lei Xue
(1)
Lichun Li
(1)
Man Ho Au
(102)
Mark Manulis
(1)
Mengling Liu
(4)
Min Xie
(1)
Muhammed F. Esgin
(2)
Nandita Bhattacharjee
(1)
Pan Yang
(1)
Patrick P. Tsang
(4)
Peichen Ju
(1)
Qi Xie
(1)
Qianhong Wu
(1)
Qinglin Zhao
(2)
Qingqing Ye
(2)
Qingzhao Zhang
(1)
Qiong Huang
(2)
Qishuang Fu
(1)
Qiuliang Xu
(11)
Robert H. Deng
(3)
Ron Steinfeld
(2)
Rongxing Lu
(1)
Rupeng Yang
(14)
Sean W. Smith
(2)
Shang Gao
(1)
Sheng Cao
(2)
Sherman S. M. Chow
(3)
Shifeng Sun
(4)
Shuai Han
(1)
Shuang Zhao
(1)
Siu Ming Yiu
(3)
Siu-Ming Yiu
(3)
Song Tian
(1)
Surya Nepal
(1)
Tianyu Zheng
(1)
Tran Viet Xuan Phuong
(1)
Tsz Hon Yuen
(10)
Veronika Kuchta
(1)
Wang Fat Lau
(3)
Wei Chen
(1)
Wei Zou
(1)
Weisong Shi
(1)
Weizhi Meng
(1)
Wenbin Chen
(1)
Wenhai Sun
(1)
Wenjuan Li
(1)
William Whyte
(1)
Willy Susilo
(38)
Wilson Abel Alberto Torres
(1)
Xiang Xie
(2)
Xianping Mao
(1)
Xiao Yang
(3)
Xiaobo Ma
(1)
Xiaofen Wang
(2)
Xiaofeng Chen
(1)
Xiaosong Zhang
(1)
Xiapu Luo
(4)
Xingye Lu
(7)
Xinliang Qiu
(1)
Xinpeng Zhang
(1)
Xinyi Huang
(6)
Xinyu Li
(1)
Xinyu Zhang
(1)
Xiu Xu
(1)
Xuan Wang
(2)
Xuecheng Ma
(1)
Xun Yi
(1)
Yajin Zhou
(1)
Yajuan Tang
(1)
Yang Heng
(1)
Yang Shi
(1)
Yang Wang
(4)
Yang-Wai Chow
(1)
Yannan Li
(1)
Yanqi Zhao
(1)
Yi Mu
(11)
Yijun Mao
(1)
Yilei Wang
(1)
Yong Yu
(4)
Yu Chen
(1)
Yu Wang
(1)
Yu Yu
(1)
Yuanshun Dai
(1)
Yuechen Chen
(1)
Yunmei Zhang
(1)
Yuxi Xue
(2)
Zejiu Tan
(2)
Zhe Liu
(1)
Zhen Peng
(1)
Zhenfei Zhang
(4)
Zhengan Huang
(3)
Zhenyu Ning
(1)
Zhi-Hui Zhan
(1)
Zhikang Xie
(1)
Zhimei Sui
(1)
Zhimin Ding
(1)
Zoe L. Jiang
(2)
Zoe Lin Jiang
(2)
Zuoxia Yu
(11)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to