Duncan S. Wong
Duncan S. Wong
Associate Professor of Computer Science, City University of Hong Kong
Verified email at cityu.edu.hk
Title
Cited by
Cited by
Year
A new implementation of the element free Galerkin method
YY Lu, T Belytschko, L Gu
Computer methods in applied mechanics and engineering 113 (3-4), 397-414, 1994
9481994
Linkable spontaneous anonymous group signature for ad hoc groups
JK Liu, VK Wei, DS Wong
Australasian Conference on Information Security and Privacy, 325-335, 2004
3712004
Certificateless public-key signature: security model and efficient construction
Z Zhang, DS Wong, J Xu, D Feng
International Conference on Applied Cryptography and Network Security, 293-308, 2006
3542006
Certificateless signature revisited
X Huang, Y Mu, W Susilo, DS Wong, W Wu
Australasian Conference on Information Security and Privacy, 308-322, 2007
3222007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
2522007
A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
K Liang, L Fang, W Susilo, DS Wong
2013 5th International Conference on Intelligent Networking and …, 2013
2432013
Key replacement attack against a generic construction of certificateless signature
BC Hu, DS Wong, Z Zhang, X Deng
Australasian Conference on Information Security and Privacy, 235-246, 2006
2382006
Two-factor mutual authentication based on smart cards and passwords
G Yang, DS Wong, H Wang, X Deng
Journal of computer and system sciences 74 (7), 1160-1172, 2008
2172008
Surveying the development of biometric user authentication on mobile phones
W Meng, DS Wong, S Furnell, J Zhou
IEEE Communications Surveys & Tutorials 17 (3), 1268-1293, 2014
1932014
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Y Zhang, X Chen, J Li, DS Wong, H Li, I You
Information Sciences 379, 42-61, 2017
1852017
New algorithms for secure outsourcing of large-scale systems of linear equations
X Chen, X Huang, J Li, J Ma, W Lou, DS Wong
IEEE transactions on information forensics and security 10 (1), 69-78, 2014
1702014
Probabilistic public key encryption with equality test
G Yang, CH Tan, Q Huang, DS Wong
Cryptographers’ Track at the RSA Conference, 119-131, 2010
1642010
Multi-authority ciphertext-policy attribute-based encryption with accountability
J Li, Q Huang, X Chen, SSM Chow, DS Wong, D Xie
Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011
1632011
L-EncDB: A lightweight framework for privacy-preserving data queries in cloud computing
J Li, Z Liu, X Chen, F Xhafa, X Tan, DS Wong
Knowledge-Based Systems 79, 18-26, 2015
1572015
White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures
Z Liu, Z Cao, DS Wong
IEEE Transactions on Information Forensics and Security 8 (1), 76-88, 2012
1462012
Universal authentication protocols for anonymous wireless communications
G Yang, Q Huang, DS Wong, X Deng
IEEE Transactions on Wireless Communications 9 (1), 168-174, 2010
1402010
Certificateless signature: a new security model and an improved generic construction
BC Hu, DS Wong, Z Zhang, X Deng
Designs, Codes and Cryptography 42 (2), 109-126, 2007
1382007
Touch gestures based biometric authentication scheme for touchscreen mobile phones
Y Meng, DS Wong, R Schlegel
International conference on information security and cryptology, 331-350, 2012
1352012
An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
K Liang, JK Liu, DS Wong, W Susilo
European symposium on research in computer security, 257-272, 2014
1312014
CP-ABE with constant-size keys for lightweight devices
F Guo, Y Mu, W Susilo, DS Wong, V Varadharajan
IEEE transactions on information forensics and security 9 (5), 763-771, 2014
1302014
The system can't perform the operation now. Try again later.
Articles 1–20