S. M. Yiu

From MaRDI portal
(Redirected from Person:727984)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Updatable, aggregatable, succinct mercurial vector commitment from lattice2024-11-12Paper
Related-tweak impossible differential cryptanalysis of reduced-round \texttt{TweAES}2024-10-14Paper
Post-quantum public-key authenticated searchable encryption with forward security: general construction, and applications2024-07-17Paper
Forced Independent Optimized Implementation of 4-Bit S-Box2023-04-13Paper
Leakage-Resilient Inner-Product Functional Encryption in the Bounded-Retrieval Model
1511.68114
2022-12-21Paper
Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience2022-07-06Paper
LPPRS: new location privacy preserving schemes based on ring signature over mobile social networks2021-12-08Paper
From quadratic functions to polynomials: generic functional encryption from standard assumptions2019-10-14Paper
Faster algorithms for computing the R* consensus tree
Algorithmica
2016-12-21Paper
Fully secure ciphertext-policy attribute based encryption with security mediator
Information and Communications Security
2016-12-19Paper
Faster algorithms for computing the R* consensus tree
Algorithms and Computation
2015-09-11Paper
Cochecker: detecting capability and sensitive data leaks from component chains in Android
Information Security and Privacy
2014-07-24Paper
Non-adaptive complex group testing with multiple positive sets
Theoretical Computer Science
2014-01-16Paper
PE(AR)\(^2\): Privacy-enhanced anonymous authentication with reputation and revocation
Computer Security – ESORICS 2012
2013-10-23Paper
Fully leakage-resilient signatures with auxiliary inputs
Information Security and Privacy
2012-09-07Paper
Identity-based encryption resilient to continual auxiliary leakage
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Adaptive phenotype testing for AND/OR items
Algorithms and Computation
2011-12-16Paper
Non-adaptive complex group testing with multiple positive sets
Lecture Notes in Computer Science
2011-07-01Paper
Oblivious transfer with access control: realizing disjunction without duplication
Lecture Notes in Computer Science
2010-11-26Paper
Indexing similar DNA sequences
Algorithmic Aspects in Information and Management
2010-07-20Paper
Non-shared edges and nearest neighbor interchanges revisited
Information Processing Letters
2009-07-21Paper
Identity Based Ring Signature: Why, How and What Next
Public Key Infrastructure
2009-04-23Paper
Secure Role Activation and Authorization in the Enterprise Environment
Public Key Infrastructure
2009-04-23Paper
An Experimental Study of Compressed Indexing and Local Alignments of DNA
Combinatorial Optimization and Applications
2009-03-03Paper
Timed-Release Encryption Revisited
Provable Security
2009-01-27Paper
Non-overlapping common substrings allowing mutations
Mathematics in Computer Science
2008-09-08Paper
Space Efficient Indexes for String Matching with Don’t Cares
Algorithms and Computation
2008-05-27Paper
Identity Based Threshold Ring Signature
Lecture Notes in Computer Science
2008-03-17Paper
Delegation with supervision
Information Sciences
2007-10-10Paper
Efficient Identity Based Ring Signature
Applied Cryptography and Network Security
2007-09-24Paper
Event-Oriented k-Times Revocable-iff-Linked Group Signatures
Information Security and Privacy
2007-09-07Paper
A space and time efficient algorithm for constructing compressed suffix arrays
Algorithmica
2007-07-19Paper
Mathematical Foundations of Computer Science 2005
Lecture Notes in Computer Science
2006-10-20Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
An efficient algorithm for finding dense regions for mining quantitative association rules
Computers & Mathematics with Applications
2006-02-06Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Forward-secure multisignature and blind signature schemes
Applied Mathematics and Computation
2005-11-04Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
SUBTREE TRANSFER DISTANCE FOR DEGREE-D PHYLOGENIES
International Journal of Foundations of Computer Science
2005-02-28Paper
scientific article; zbMATH DE number 2089995 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 1832314 (Why is no real title available?)2002-11-19Paper
A generalized fortress problem using \(k\)-consecutive vertex guards
Journal of Geometry
2002-06-26Paper
Edge guards for the fortress problem
Journal of Geometry
2001-01-01Paper


Research outcomes over time


This page was built for person: S. M. Yiu