Shi-Feng Sun
Shi-Feng Sun
Email verificata su monash.edu
Titolo
Citata da
Citata da
Anno
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
European Symposium on Research in Computer Security, 456-474, 2017
1572017
Practical backward-secure searchable encryption from symmetric puncturable encryption
SF Sun, X Yuan, JK Liu, R Steinfeld, A Sakzad, V Vo, S Nepal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
802018
An efficient non-interactive multi-client searchable encryption with support for boolean queries
SF Sun, JK Liu, A Sakzad, R Steinfeld, TH Yuen
European symposium on research in computer security, 154-172, 2016
792016
Result pattern hiding searchable encryption for conjunctive queries
S Lai, S Patranabis, A Sakzad, JK Liu, D Mukhopadhyay, R Steinfeld, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
602018
Dynamic searchable symmetric encryption schemes supporting range queries with forward (and backward) security
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European Symposium on Research in Computer Security, 228-246, 2018
352018
RingCT 3.0 for blockchain confidential transaction: Shorter size and stronger security
TH Yuen, S Sun, JK Liu, MH Au, MF Esgin, Q Zhang, D Gu
International Conference on Financial Cryptography and Data Security, 464-483, 2020
292020
SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
C Lyu, D Gu, X Zhang, S Sun, Y Zhang, A Pande
Computer Communications 59, 37-51, 2015
262015
Dynamic searchable symmetric encryption with forward and stronger backward privacy
C Zuo, SF Sun, JK Liu, J Shao, J Pieprzyk
European Symposium on Research in Computer Security, 283-303, 2019
212019
Efficient, fast and scalable authentication for vanets
C Lyu, D Gu, X Zhang, S Sun, Y Tang
2013 IEEE Wireless Communications and Networking Conference (WCNC), 1768-1773, 2013
212013
Efficient leakage-resilient identity-based encryption with CCA security
SF Sun, D Gu, S Liu
International Conference on Pairing-Based Cryptography, 149-167, 2013
182013
Towards multi-user searchable encryption supporting Boolean query and fast decryption
Y Wang, J Wang, SF Sun, J Liu, W Susilo, J Baek, I You, X Chen
JUCS-Journal of Universal Computer Science 25, 222, 2019
172019
Towards efficient verifiable conjunctive keyword search for large encrypted database
J Wang, X Chen, SF Sun, JK Liu, MH Au, ZH Zhan
European Symposium on Research in Computer Security, 83-100, 2018
162018
Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security
V Kuchta, A Sakzad, D Stehlé, R Steinfeld, SF Sun
Annual International Conference on the Theory and Applications of …, 2020
142020
Anonymizing bitcoin transaction
DA Wijaya, JK Liu, R Steinfeld, SF Sun, X Huang
International Conference on Information Security Practice and Experience …, 2016
142016
Economic/Academic Importance of Brassica rapa
R Sun
The Brassica rapa Genome, 1-15, 2015
14*2015
Efficient chosen ciphertext secure identity‐based encryption against key leakage attacks
SF Sun, D Gu, S Liu
Security and Communication Networks 9 (11), 1417-1434, 2016
122016
Achieving searchable encryption scheme with search pattern hidden
Y Wang, SF Sun, J Wang, JK Liu, X Chen
IEEE Transactions on Services Computing, 2020
82020
Privacy-preserving data sharing scheme over cloud for social applications
C Lyu, SF Sun, Y Zhang, A Pande, H Lu, D Gu
Journal of Network and Computer Applications 74, 44-55, 2016
82016
Fully secure wicked identity-based encryption against key leakage attacks
SF Sun, D Gu, Z Huang
The Computer Journal 58 (10), 2520-2536, 2015
82015
Toward forward secure SSE supporting conjunctive keyword search
Y Wang, J Wang, S Sun, M Miao, X Chen
IEEE Access 7, 142762-142772, 2019
72019
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20