S. M. Yiu

From MaRDI portal
Person:727984

Available identifiers

zbMath Open yiu.siu-mingMaRDI QIDQ727984

List of research outcomes





PublicationDate of PublicationType
Updatable, aggregatable, succinct mercurial vector commitment from lattice2024-11-12Paper
Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}2024-10-14Paper
Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications2024-07-17Paper
Forced Independent Optimized Implementation of 4-Bit S-Box2023-04-13Paper
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model2022-12-21Paper
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience2022-07-06Paper
LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks2021-12-08Paper
From quadratic functions to polynomials: generic functional encryption from standard assumptions2019-10-14Paper
Faster algorithms for computing the R* consensus tree2016-12-21Paper
Fully Secure Ciphertext-Policy Attribute Based Encryption with Security Mediator2016-12-19Paper
Faster Algorithms for Computing the R* Consensus Tree2015-09-11Paper
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android2014-07-24Paper
Non-adaptive complex group testing with multiple positive sets2014-01-16Paper
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation2013-10-23Paper
Fully Leakage-Resilient Signatures with Auxiliary Inputs2012-09-07Paper
Identity-Based Encryption Resilient to Continual Auxiliary Leakage2012-06-29Paper
Adaptive Phenotype Testing for AND/OR Items2011-12-16Paper
Non-adaptive Complex Group Testing with Multiple Positive Sets2011-07-01Paper
Oblivious Transfer with Access Control : Realizing Disjunction without Duplication2010-11-26Paper
Indexing Similar DNA Sequences2010-07-20Paper
Non-shared edges and nearest neighbor interchanges revisited2009-07-21Paper
Identity Based Ring Signature: Why, How and What Next2009-04-23Paper
Secure Role Activation and Authorization in the Enterprise Environment2009-04-23Paper
An Experimental Study of Compressed Indexing and Local Alignments of DNA2009-03-03Paper
Timed-Release Encryption Revisited2009-01-27Paper
Non-overlapping common substrings allowing mutations2008-09-08Paper
Space Efficient Indexes for String Matching with Don’t Cares2008-05-27Paper
Identity Based Threshold Ring Signature2008-03-17Paper
Delegation with supervision2007-10-10Paper
Efficient Identity Based Ring Signature2007-09-24Paper
Event-Oriented k-Times Revocable-iff-Linked Group Signatures2007-09-07Paper
A space and time efficient algorithm for constructing compressed suffix arrays2007-07-19Paper
Mathematical Foundations of Computer Science 20052006-10-20Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Information Security and Privacy2006-06-22Paper
Information Security and Privacy2006-06-22Paper
An efficient algorithm for finding dense regions for mining quantitative association rules2006-02-06Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Forward-secure multisignature and blind signature schemes2005-11-04Paper
Information and Communications Security2005-08-19Paper
SUBTREE TRANSFER DISTANCE FOR DEGREE-D PHYLOGENIES2005-02-28Paper
https://portal.mardi4nfdi.de/entity/Q48086612004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47787512002-11-19Paper
A generalized fortress problem using \(k\)-consecutive vertex guards2002-06-26Paper
Edge guards for the fortress problem2001-01-01Paper

Research outcomes over time

This page was built for person: S. M. Yiu