au.\*:("TSZ HON YUEN")
Results 1 to 6 of 6
Selection :
Towards a cryptographic treatment of publish/subscribe systemsTSZ HON YUEN; SUSILO, Willy; YI MU et al.Journal of computer security. 2014, Vol 22, Num 1, pp 33-67, issn 0926-227X, 35 p.Article
Fast and proven secure blind identity-based signcryption from pairingsTSZ HON YUEN; WEI, Victor K.Lecture notes in computer science. 2005, pp 305-322, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper
ID-Based Ring Signature Scheme Secure in the Standard ModelMAN HO AU; LIU, Joseph K; TSZ HON YUEN et al.Lecture notes in computer science. 2006, pp 1-16, issn 0302-9743, isbn 3-540-47699-7, 1Vol, 16 p.Conference Paper
Escrowed linkability of ring signatures and its applicationsCHOW, Sherman S. M; SUSILO, Willy; TSZ HON YUEN et al.Lecture notes in computer science. 2006, pp 175-192, issn 0302-9743, isbn 978-3-540-68799-3, 1Vol, 18 p.Conference Paper
Group signature where group manager, members and open authority are identity-basedWEI, Victor K; TSZ HON YUEN; FANGGUO ZHANG et al.Lecture notes in computer science. 2005, pp 468-480, issn 0302-9743, isbn 3-540-26547-3, 13 p.Conference Paper
Constant-size ID-based linkable and revocable-iff-linked ring signatureMAN HO AU; LIU, Joseph K; SUSILO, Willy et al.Lecture notes in computer science. 2006, pp 364-378, issn 0302-9743, isbn 3-540-49767-6, 1Vol, 15 p.Conference Paper