Man Ho Au
Man Ho Au
Other namesMan Ho Allen Au, Allen MH Au
Verified email at - Homepage
Cited by
Cited by
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
Attribute-based signature and its applications
J Li, MH Au, W Susilo, D Xie, K Ren
Proceedings of the 5th ACM symposium on information, computer and …, 2010
Constant-Size Dynamic k-TAA
MH Au, W Susilo, Y Mu
Security and Cryptography for Networks: 5th International Conference, SCN …, 2006
Ringct 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero
SF Sun, MH Au, JK Liu, TH Yuen
Computer Security–ESORICS 2017: 22nd European Symposium on Research in …, 2017
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model
JK Liu, MH Au, W Susilo
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Malicious KGC attacks in certificateless cryptography
MH Au, Y Mu, J Chen, DS Wong, JK Liu, G Yang
Proceedings of the 2nd ACM symposium on Information, computer and …, 2007
Blacklistable anonymous credentials: blocking misbehaving users without TTPs
PP Tsang, MH Au, A Kapadia, SW Smith
Proceedings of the 14th ACM conference on Computer and communications …, 2007
Improving privacy and security in decentralized ciphertext-policy attribute-based encryption
J Han, W Susilo, Y Mu, J Zhou, MHA Au
IEEE transactions on information forensics and security 10 (3), 665-678, 2014
A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, Y Yu, A Yang
Future Generation Computer Systems 52, 95-108, 2015
Platform-independent secure blockchain-based voting system
B Yu, JK Liu, A Sakzad, S Nepal, R Steinfeld, P Rimba, MH Au
Information Security: 21st International Conference, ISC 2018, Guildford, UK …, 2018
A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing
K Liang, MH Au, JK Liu, W Susilo, DS Wong, G Yang, TVX Phuong, Q Xie
IEEE Transactions on Information Forensics and Security 9 (10), 1667-1680, 2014
Efficient attribute-based encryption with attribute revocation for assured data deletion
L Xue, Y Yu, Y Li, MH Au, X Du, B Yang
Information Sciences 479, 640-650, 2019
An adaptive gas cost mechanism for ethereum to defend against under-priced dos attacks
T Chen, X Li, Y Wang, J Chen, Z Li, X Luo, MH Au, X Zhang
Information Security Practice and Experience: 13th International Conference …, 2017
Blockchain based secure data sharing system for Internet of vehicles: A position paper
L Zhang, M Luo, J Li, MH Au, KKR Choo, T Chen, S Tian
Vehicular Communications 16, 85-93, 2019
Cloud data integrity checking with an identity-based auditing mechanism from RSA
Y Yu, L Xue, MH Au, W Susilo, J Ni, Y Zhang, AV Vasilakos, J Shen
Future Generation Computer Systems 62, 85-91, 2016
Fine-grained two-factor access control for web-based cloud computing services
JK Liu, MH Au, X Huang, R Lu, J Li
IEEE Transactions on Information Forensics and Security 11 (3), 484-497, 2015
Short linkable ring signatures revisited
MH Au, SSM Chow, W Susilo, PP Tsang
Public Key Infrastructure: Third European PKI Workshop: Theory and Practice …, 2006
Separable linkable threshold ring signatures
PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong
Progress in Cryptology-INDOCRYPT 2004: 5th International Conference on …, 2005
A survey on access control in fog computing
P Zhang, JK Liu, FR Yu, M Sookhak, MH Au, X Luo
IEEE Communications Magazine 56 (2), 144-149, 2018
Improvements on an authentication scheme for vehicular sensor networks
JK Liu, TH Yuen, MH Au, W Susilo
Expert Systems with Applications 41 (5), 2559-2564, 2014
The system can't perform the operation now. Try again later.
Articles 1–20