Artigos com autorizações de acesso público - Man Ho AuSaiba mais
44 artigos não disponíveis publicamente
Efficient attribute-based encryption with attribute revocation for assured data deletion
L Xue, Y Yu, Y Li, MH Au, X Du, B Yang
Information Sciences 479, 640-650, 2019
Autorizações: National Natural Science Foundation of China
Blockchain based secure data sharing system for Internet of vehicles: A position paper
L Zhang, M Luo, J Li, MH Au, KKR Choo, T Chen, S Tian
Vehicular Communications 16, 85-93, 2019
Autorizações: National Natural Science Foundation of China
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
Autorizações: National Natural Science Foundation of China
Linkable ring signature with unconditional anonymity
JK Liu, MH Au, W Susilo, J Zhou
IEEE Transactions on Knowledge and Data Engineering 26 (1), 157-165, 2013
Autorizações: Australian Research Council
Position based cryptography with location privacy: A step for fog computing
R Yang, Q Xu, MH Au, Z Yu, H Wang, L Zhou
Future Generation Computer Systems 78, 799-806, 2018
Autorizações: National Natural Science Foundation of China
Improved security of a dynamic remote data possession checking protocol for cloud storage
Y Yu, J Ni, MH Au, H Liu, H Wang, C Xu
Expert systems with applications 41 (17), 7789-7796, 2014
Autorizações: National Natural Science Foundation of China
Aggregating crowd wisdom via blockchain: A private, correct, and robust realization
H Duan, Y Zheng, Y Du, A Zhou, C Wang, MH Au
2019 IEEE International Conference on Pervasive Computing and Communications …, 2019
Autorizações: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Enabling secure and efficient decentralized storage auditing with blockchain
Y Du, H Duan, A Zhou, C Wang, MH Au, Q Wang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3038-3054, 2021
Autorizações: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Towards leakage-resilient fine-grained access control in fog computing
Z Yu, MH Au, Q Xu, R Yang, J Han
Future Generation Computer Systems 78, 763-777, 2018
Autorizações: National Natural Science Foundation of China
Remote data possession checking with enhanced security for cloud storage
Y Yu, Y Zhang, J Ni, MH Au, L Chen, H Liu
Future Generation Computer Systems 52, 77-85, 2015
Autorizações: National Natural Science Foundation of China
A game-theoretic method based on Q-learning to invalidate criminal smart contracts
L Zhang, Y Wang, F Li, Y Hu, MH Au
Information Sciences 498, 144-153, 2019
Autorizações: National Natural Science Foundation of China
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
Autorizações: Australian Research Council, National Natural Science Foundation of China …
A secure decentralized trustless E-voting system based on smart contract
J Lyu, ZL Jiang, X Wang, Z Nong, MH Au, J Fang
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
Autorizações: National Natural Science Foundation of China
Fully secure ciphertext-policy attribute based encryption with security mediator
Y Chen, ZL Jiang, SM Yiu, JK Liu, MH Au, X Wang
Information and Communications Security: 16th International Conference …, 2015
Autorizações: National Natural Science Foundation of China
Fuzzy matching and direct revocation: a new CP-ABE scheme from multilinear maps
H Wang, D He, J Shen, Z Zheng, X Yang, MH Au
Soft Computing 22, 2267-2274, 2018
Autorizações: National Natural Science Foundation of China
Harvesting smartphone privacy through enhanced juice filming charging attacks
W Meng, F Fei, W Li, MH Au
Information Security: 20th International Conference, ISC 2017, Ho Chi Minh …, 2017
Autorizações: National Natural Science Foundation of China
An efficient secure channel free searchable encryption scheme with multiple keywords
T Wang, MH Au, W Wu
Network and System Security: 10th International Conference, NSS 2016, Taipei …, 2016
Autorizações: National Natural Science Foundation of China
Efficient verifiably encrypted ECDSA-like signatures and their applications
X Yang, M Liu, MH Au, X Luo, Q Ye
IEEE Transactions on Information Forensics and Security 17, 1573-1582, 2022
Autorizações: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Towards practical auditing of dynamic data in decentralized storage
H Duan, Y Du, L Zheng, C Wang, MH Au, Q Wang
IEEE Transactions on Dependable and Secure Computing 20 (1), 708-723, 2022
Autorizações: National Natural Science Foundation of China, Research Grants Council, Hong Kong
Federated learning for green shipping optimization and management
H Wang, R Yan, MH Au, S Wang, YJ Jin
Advanced Engineering Informatics 56, 101994, 2023
Autorizações: National Natural Science Foundation of China
As informações de publicação e financiamento são determinadas automaticamente por um programa de computador