New Insight to Preserve Online Survey Accuracy and Privacy in Big Data Era
暂无分享,去创建一个
Joseph K. Liu | Yong Yu | Jianying Zhou | Willy Susilo | Man Ho Au | Xinyi Huang | Joseph K. Liu | W. Susilo | Xinyi Huang | Jianying Zhou | M. Au | Yong Yu
[1] Josh Benaloh,et al. Receipt-free secret-ballot elections (extended abstract) , 1994, STOC '94.
[2] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[3] Atsushi Fujioka,et al. A Practical Secret Voting Scheme for Large Scale Elections , 1992, AUSCRYPT.
[4] Xavier Boyen,et al. Mesh Signatures , 2007, EUROCRYPT.
[5] Joseph K. Liu,et al. A Restricted Multi-show Credential System and Its Application on E-Voting , 2005, ISPEC.
[6] Bart Preneel. Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings , 2009, AFRICACRYPT.
[7] Elisabeth Oswald,et al. A Comprehensive Evaluation of Mutual Information Analysis Using a Fair Evaluation Framework , 2011, CRYPTO.
[8] Tatsuaki Okamoto,et al. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.
[9] Jens Groth,et al. A Verifiable Secret Shuffle of Homomorphic Encryptions , 2003, Journal of Cryptology.
[10] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[11] Tatsuaki Okamoto,et al. Receipt-Free Electronic Voting Schemes for Large Scale Elections , 1997, Security Protocols Workshop.
[12] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[13] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[14] Joseph K. Liu,et al. Enhanced Security Models and a Generic Construction Approach for Linkable Ring Signature , 2006, Int. J. Found. Comput. Sci..
[15] Annabelle Lee,et al. Guidelines for Smart Grid Cyber Security , 2010 .
[16] Siaw-Lynn Ng,et al. Threshold Anonymous Announcement in VANETs , 2011, IEEE Journal on Selected Areas in Communications.
[17] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[18] Bart Preneel,et al. Advances in cryptology - EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 : proceedings , 2000 .
[19] Rosario Gennaro,et al. Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings , 2011, Public Key Cryptography.
[20] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[21] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[22] Tsz Hon Yuen,et al. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction , 2013, Theor. Comput. Sci..
[23] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[24] Jens Groth,et al. Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups , 2011, CRYPTO.
[25] Tsz Hon Yuen,et al. Certificate Based (Linkable) Ring Signature , 2007, ISPEC.
[26] Manoj Prabhakaran,et al. Attribute-Based Signatures , 2011, CT-RSA.
[27] Information Security and Privacy , 1996, Lecture Notes in Computer Science.
[28] Joseph K. Liu,et al. Linkable Ring Signature with Unconditional Anonymity , 2014, IEEE Transactions on Knowledge and Data Engineering.
[29] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[30] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[31] Reihaneh Safavi-Naini,et al. Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems , 2009, AFRICACRYPT.
[32] Joseph K. Liu,et al. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability , 2008, NDSS.
[33] Dongqing Xie,et al. Attribute-based signature and its applications , 2010, ASIACCS '10.
[34] Yvo Desmedt. Public Key Cryptography — PKC 2003 , 2002, Lecture Notes in Computer Science.
[35] Aggelos Kiayias,et al. Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings , 2011, CT-RSA.
[36] Jennifer Seberry,et al. Advances in Cryptology — AUSCRYPT '92 , 1992, Lecture Notes in Computer Science.
[37] Mihir Bellare. Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.
[38] Moni Naor. Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings , 2007, EUROCRYPT.
[39] Michael Wiener,et al. Advances in Cryptology — CRYPTO’ 99 , 1999 .
[40] Tatsuaki Okamoto,et al. Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model , 2014, IEEE Transactions on Cloud Computing.
[41] Tsz Hon Yuen,et al. Efficient Linkable and/or Threshold Ring Signature Without Random Oracles , 2013, Comput. J..