PKE-AET: public key encryption with authorized equality test K Huang, R Tso, YC Chen, SMM Rahman, A Almogren, A Alamri The Computer Journal 58 (10), 2686-2697, 2015 | 104 | 2015 |
Certificateless aggregate signature with efficient verification YC Chen, R Tso, M Mambo, K Huang, G Horng Security and Communication Networks 8 (13), 2232-2243, 2015 | 50 | 2015 |
A Commutative Encryption Scheme Based on ElGamal Encryption K Huang, R Tso Information Security and Intelligence Control (ISIC), 2012 International …, 2012 | 39 | 2012 |
Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption K Huang, R Tso, YC Chen Journal of Computer and System Sciences 89, 400-409, 2017 | 25 | 2017 |
A new public key encryption with equality test K Huang, R Tso, YC Chen, W Li, HM Sun Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 23 | 2014 |
Semantic secure public key encryption with filtered equality test PKE-FET K Huang, YC Chen, R Tso 2015 12th International Joint Conference on e-Business and …, 2015 | 21 | 2015 |
Password-authenticated searchable encryption L Chen, K Huang, M Manulis, V Sekar International Journal of Information Security 20 (5), 675-693, 2021 | 15 | 2021 |
Generic construction of dual-server public key encryption with keyword search on cloud computing R Tso, K Huang, YC Chen, SMM Rahman, TY Wu IEEE Access 8, 152551-152564, 2020 | 13 | 2020 |
Provable secure dual-server public key encryption with keyword search K Huang, R Tso 2017 IEEE 2nd International Verification and Security Workshop (IVSW), 39-44, 2017 | 10 | 2017 |
Password authenticated keyword search K Huang, M Manulis, L Chen 2017 IEEE Symposium on Privacy-Aware Computing (PAC), 129-140, 2017 | 6 | 2017 |
One-time-commutative public key encryption K Huang, R Tso, YC Chen 2017 Computing Conference, 814-818, 2017 | 4 | 2017 |
On the Security of a Privacy Preserved Two-party Equality Testing Protocol R Tso, YC Chen, K Huang Journal of Communications and Information Sciences 3 (3), 1, 2013 | | 2013 |
New Convertible Ring Signatures Based on RSA K Huang, R Tso Information: an international Interdisciplinary journal 16 (9), 7163-7173, 2013 | | 2013 |
Security Analysis Concerning the Random Numbers of Threshold Ring Signatures K Huang, R Tso 2012 Ninth International Conference on Information Technology-New …, 2012 | | 2012 |