default search action
Sherman S. M. Chow
Person information
- affiliation: The Chinese University of Hong Kong, Sha Tin, Hong Kong
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu:
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Commun. Cryptol. 1(3): 48 (2024) - [c140]Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow:
Distributionally Robust Degree Optimization for BATS Codes. ISIT 2024: 1315-1320 - [c139]Jiafan Wang, Sherman S. M. Chow:
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control. NDSS 2024 - [c138]Harry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow:
Secure Multiparty Computation of Threshold Signatures Made More Efficient. NDSS 2024 - [c137]Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong:
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing. USENIX Security Symposium 2024 - [i40]Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow:
Distributionally Robust Degree Optimization for BATS Codes. CoRR abs/2405.08194 (2024) - 2023
- [j39]Minxin Du, Peipei Jiang, Qian Wang, Sherman S. M. Chow, Lingchen Zhao:
Shielding Graph for eXact Analytics With SGX. IEEE Trans. Dependable Secur. Comput. 20(6): 5102-5112 (2023) - [c136]Huangting Wu, Sherman S. M. Chow:
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions. ACNS 2023: 366-395 - [c135]Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen:
Scored Anonymous Credentials. ACNS 2023: 484-515 - [c134]Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin:
Secure Softmax/Sigmoid for Machine-learning Computation. ACSAC 2023: 463-476 - [c133]Yu Zheng, Wei Song, Minxin Du, Sherman S. M. Chow, Qian Lou, Yongjun Zhao, Xiuhua Wang:
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning. ADMA (2) 2023: 393-407 - [c132]Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. CCS 2023: 2665-2679 - [c131]Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-Based Anonymous Systems. CSF 2023: 568-583 - [c130]Jack P. K. Ma, Sherman S. M. Chow:
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting). EuroS&P 2023: 896-912 - [c129]Shuyang Tang, Sherman S. M. Chow:
Towards Decentralized Adaptive Control of Cryptocurrency Liquidity via Auction. ICDCS 2023: 910-919 - [c128]Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. ISIT 2023: 648-653 - [c127]Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
Real Threshold ECDSA. NDSS 2023 - [c126]Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
How (Not) to Build Threshold EdDSA. RAID 2023: 123-134 - [c125]Lucien K. L. Ng, Sherman S. M. Chow:
SoK: Cryptographic Neural-Network Computation. SP 2023: 497-514 - [c124]Minxin Du, Xiang Yue, Sherman S. M. Chow, Huan Sun:
Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy. WWW 2023: 2349-2359 - [i39]Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. CoRR abs/2305.07593 (2023) - [i38]Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. CoRR abs/2309.06746 (2023) - [i37]Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-based Anonymous Systems. IACR Cryptol. ePrint Arch. 2023: 743 (2023) - 2022
- [j38]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - [j37]Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2022(1): 28-48 (2022) - [j36]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - [c123]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. ACNS 2022: 419-439 - [c122]Jack P. K. Ma, Sherman S. M. Chow:
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. AsiaCCS 2022: 1086-1097 - [c121]Jiafan Wang, Sherman S. M. Chow:
Omnes pro uno: Practical Multi-Writer Encrypted Database. USENIX Security Symposium 2022: 2371-2388 - [i36]Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng:
Prove You Owned Me: One Step beyond RFID Tag/Mutual Authentication. CoRR abs/2210.10244 (2022) - 2021
- [j35]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Universal location referencing and homomorphic evaluation of geospatial query. Comput. Secur. 102: 102137 (2021) - [j34]Sherman S. M. Chow, Kim-Kwang Raymond Choo, Jinguang Han:
Editorial for accountability and privacy issues in blockchain and cryptocurrency. Future Gener. Comput. Syst. 114: 647-648 (2021) - [j33]Yongjun Zhao, Sherman S. M. Chow:
Updatable Block-Level Message-Locked Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1620-1631 (2021) - [j32]Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IEEE Trans. Dependable Secur. Comput. 18(4): 1821-1835 (2021) - [c120]Lucien K. L. Ng, Sherman S. M. Chow, Anna P. Y. Woo, Donald P. H. Wong, Yongjun Zhao:
Goten: GPU-Outsourcing Trusted Execution of Neural Network Training. AAAI 2021: 14876-14883 - [c119]Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow:
Differential Privacy for Text Analytics via Natural Text Sanitization. ACL/IJCNLP (Findings) 2021: 3853-3866 - [c118]Xiuhua Wang, Harry W. H. Wong, Sherman S. M. Chow:
Access Control Encryption from Group Encryption. ACNS (1) 2021: 417-441 - [c117]Sherman S. M. Chow, Ming Li, Yongjun Zhao, Wenqiang Jin:
Sipster: Settling IOU Privately and Quickly with Smart Meters. ACSAC 2021: 219-234 - [c116]Jiafan Wang, Sherman S. M. Chow:
Simple Storage-Saving Structure for Volume-Hiding Encrypted Multi-maps - (A Slot in Need is a Slot Indeed). DBSec 2021: 63-83 - [c115]Lucien K. L. Ng, Sherman S. M. Chow, Donald P. H. Wong, Anna P. Y. Woo:
LDSP: Shopping with Cryptocurrency Privately and Quickly under Leadership. ICDCS 2021: 261-271 - [c114]Jack P. K. Ma, Raymond K. H. Tai, Yongjun Zhao, Sherman S. M. Chow:
Let's Stride Blindfolded in a Forest: Sublinear Multi-Client Decision Trees Evaluation. NDSS 2021 - [c113]Xiuhua Wang, Sherman S. M. Chow:
Cross-Domain Access Control Encryption: Arbitrary-policy, Constant-size, Efficient. SP 2021: 748-761 - [c112]Lucien K. L. Ng, Sherman S. M. Chow:
GForce: GPU-Friendly Oblivious and Rapid Neural Network Inference. USENIX Security Symposium 2021: 2147-2164 - [i35]Xiang Yue, Minxin Du, Tianhao Wang, Yaliang Li, Huan Sun, Sherman S. M. Chow:
Differential Privacy for Text Analytics via Natural Text Sanitization. CoRR abs/2106.01221 (2021) - 2020
- [c111]Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-client Oblivious RAM with Poly-logarithmic Communication. ASIACRYPT (2) 2020: 160-190 - [c110]Jiafan Wang, Minxin Du, Sherman S. M. Chow:
Stargazing in the Dark: Secure Skyline Queries with SGX. DASFAA (3) 2020: 322-338 - [c109]Harry W. H. Wong, Jack P. K. Ma, Donald P. H. Wong, Lucien K. L. Ng, Sherman S. M. Chow:
Learning Model with Error - Exposing the Hidden Model of BAYHENN. IJCAI 2020: 3529-3535 - [i34]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Minxin Du, Zhibo Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. CoRR abs/2002.10944 (2020) - [i33]Sherman S. M. Chow, Katharina Fech, Russell W. F. Lai, Giulio Malavolta:
Multi-Client Oblivious RAM with Poly-Logarithmic Communication. IACR Cryptol. ePrint Arch. 2020: 1551 (2020)
2010 – 2019
- 2019
- [j31]Zhiqiang Liu, Shuyang Tang, Sherman S. M. Chow, Zhen Liu, Yu Long:
Fork-free hybrid consensus with flexible Proof-of-Activity. Future Gener. Comput. Syst. 96: 515-524 (2019) - [j30]Russell W. F. Lai, Kam-Fung Cheung, Sherman S. M. Chow, Anthony Man-Cho So:
Another Look at Anonymous Communication. IEEE Trans. Dependable Secur. Comput. 16(5): 731-742 (2019) - [j29]Lejla Batina, Sherman S. M. Chow, Gerhard P. Hancke, Zhe Liu:
Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks. ACM Trans. Embed. Comput. Syst. 18(3): 22:1-22:3 (2019) - [c108]Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. ACISP 2019: 271-288 - [c107]Sherman S. M. Chow:
Can We Securely Outsource Big Data Analytics with Lightweight Cryptography? SCC@AsiaCCS 2019: 1 - [c106]Tao Zhang, Huangting Wu, Sherman S. M. Chow:
Structure-Preserving Certificateless Encryption and Its Application. CT-RSA 2019: 1-22 - [c105]Sherman S. M. Chow, Alexander Russell, Qiang Tang, Moti Yung, Yongjun Zhao, Hong-Sheng Zhou:
Let a Non-barking Watchdog Bite: Cliptographic Signatures with an Offline Watchdog. Public Key Cryptography (1) 2019: 221-251 - [i32]Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. IACR Cryptol. ePrint Arch. 2019: 497 (2019) - [i31]Asma Aloufi, Peizhao Hu, Harry W. H. Wong, Sherman S. M. Chow:
Blindfolded Evaluation of Random Forests with Multi-Key Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2019: 819 (2019) - [i30]Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow:
Universal Location Referencing and Homomorphic Evaluation of Geospatial Query. IACR Cryptol. ePrint Arch. 2019: 820 (2019) - 2018
- [j28]Jin Li, Xiaofeng Chen, Sherman S. M. Chow, Qiong Huang, Duncan S. Wong, Zheli Liu:
Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 112: 89-96 (2018) - [j27]Qian Wang, Meiqi He, Minxin Du, Sherman S. M. Chow, Russell W. F. Lai, Qin Zou:
Searchable Encryption over Feature-Rich Data. IEEE Trans. Dependable Secur. Comput. 15(3): 496-510 (2018) - [j26]Shengshan Hu, Minghui Li, Qian Wang, Sherman S. M. Chow, Minxin Du:
Outsourced Biometric Identification With Privacy. IEEE Trans. Inf. Forensics Secur. 13(10): 2448-2463 (2018) - [c104]Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
Multi-key Homomorphic Signatures Unforgeable Under Insider Corruption. ASIACRYPT (2) 2018: 465-492 - [c103]Shuyang Tang, Sherman S. M. Chow:
Systematic Market Control of Cryptocurrency Inflations. BCC@AsiaCCS 2018: 61-63 - [c102]Sherman S. M. Chow:
Privacy-Preserving Machine Learning. FCS 2018: 3-6 - [c101]Minghui Li, Mingxue Zhang, Qian Wang, Sherman S. M. Chow, Minxin Du, Yanjiao Chen, Chenliang Li:
InstantCryptoGram: Secure Image Retrieval Service. INFOCOM 2018: 2222-2230 - [c100]Sherman S. M. Chow, Ziliang Lai, Chris Liu, Eric Lo, Yongjun Zhao:
Sharding Blockchain. iThings/GreenCom/CPSCom/SmartData 2018: 1665 - [c99]Weizhi Meng, Jianfeng Wang, Xianmin Wang, Joseph K. Liu, Zuoxia Yu, Jin Li, Yongjun Zhao, Sherman S. M. Chow:
Position Paper on Blockchain Technology: Smart Contract and Applications. NSS 2018: 474-483 - [c98]Russell W. F. Lai, Christoph Egger, Manuel Reinert, Sherman S. M. Chow, Matteo Maffei, Dominique Schröder:
Simple Password-Hardened Encryption Services. USENIX Security Symposium 2018: 1405-1421 - [c97]Yongjun Zhao, Sherman S. M. Chow:
Can You Find The One for Me? WPES@CCS 2018: 54-65 - [e4]Srdjan Capkun, Sherman S. M. Chow:
Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers. Lecture Notes in Computer Science 11261, Springer 2018, ISBN 978-3-030-02640-0 [contents] - [i29]Yongjun Zhao, Sherman S. M. Chow:
Can you find the one for me? Privacy-Preserving Matchmaking via Threshold PSI. IACR Cryptol. ePrint Arch. 2018: 184 (2018) - [i28]Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial Query with User-Controlled Privacy. IACR Cryptol. ePrint Arch. 2018: 304 (2018) - 2017
- [j25]Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. Proc. Priv. Enhancing Technol. 2017(1): 149-169 (2017) - [c96]Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. ACNS 2017: 478-497 - [c95]Yongjun Zhao, Sherman S. M. Chow:
Updatable Block-Level Message-Locked Encryption. AsiaCCS 2017: 449-460 - [c94]Raymond K. H. Tai, Jack P. K. Ma, Yongjun Zhao, Sherman S. M. Chow:
Privacy-Preserving Decision Trees Evaluation via Linear Functions. ESORICS (2) 2017: 494-512 - [c93]Sherman S. M. Chow, Haibin Zhang, Tao Zhang:
Real Hidden Identity-Based Signatures. Financial Cryptography 2017: 21-38 - [c92]Jiafan Wang, Sherman S. M. Chow:
Secure Strategyproof Ascending-Price Spectrum Auction. PAC 2017: 96-106 - [c91]Russell W. F. Lai, Christoph Egger, Dominique Schröder, Sherman S. M. Chow:
Phoenix: Rebirth of a Cryptographic Password-Hardening Service. USENIX Security Symposium 2017: 899-916 - [c90]Peizhao Hu, Sherman S. M. Chow, Asma Aloufi:
Geosocial query with user-controlled privacy. WISEC 2017: 163-172 - [i27]Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2017: 268 (2017) - [i26]Shuyang Tang, Zhiqiang Liu, Sherman S. M. Chow, Zhen Liu, Yu Long:
Forking-Free Hybrid Consensus with Generalized Proof-of-Activity. IACR Cryptol. ePrint Arch. 2017: 367 (2017) - [i25]Russell W. F. Lai, Sherman S. M. Chow:
Forward-Secure Searchable Encryption on Labeled Bipartite Graphs. IACR Cryptol. ePrint Arch. 2017: 659 (2017) - 2016
- [j24]Joseph K. Liu, Sze Ling Yeo, Wun-She Yap, Sherman S. M. Chow, Duncan S. Wong, Willy Susilo:
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol. Comput. J. 59(7): 945-954 (2016) - [j23]Sherman S. M. Chow, Urs Hengartner, Joseph K. Liu, Kui Ren:
Special Issue on Security and Privacy in Mobile Clouds. Pervasive Mob. Comput. 28: 100-101 (2016) - [j22]Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure Cloud Storage Meets with Secure Network Coding. IEEE Trans. Computers 65(6): 1936-1948 (2016) - [c89]Sherman S. M. Chow:
Functional Credentials for Internet of Things. IoTPTS@AsiaCCS 2016: 1 - [c88]Tao Zhang, Sherman S. M. Chow, Jinyuan Sun:
Password-Controlled Encryption with Accountable Break-Glass Access. AsiaCCS 2016: 235-246 - [c87]Zhe Zhou, Tao Zhang, Sherman S. M. Chow, Yupeng Zhang, Kehuan Zhang:
Efficient Authenticated Multi-Pattern Matching. AsiaCCS 2016: 593-604 - [c86]Cong Zhang, David Cash, Xiuhua Wang, Xiaoqi Yu, Sherman S. M. Chow:
Combiners for Chosen-Ciphertext Security. COCOON 2016: 257-268 - [c85]Russell W. F. Lai, Tao Zhang, Sherman S. M. Chow, Dominique Schröder:
Efficient Sanitizable Signatures Without Random Oracles. ESORICS (1) 2016: 363-380 - [c84]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Cryptography for Parallel RAM from Indistinguishability Obfuscation. ITCS 2016: 179-190 - [c83]Tao Zhang, Sherman S. M. Chow, Zhe Zhou, Ming Li:
Privacy-Preserving Wi-Fi Fingerprinting Indoor Localization. IWSEC 2016: 215-233 - [c82]Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow, Anthony Man-Cho So:
Another Look at Anonymous Communication - Security and Modular Constructions. Mycrypt 2016: 56-82 - [c81]Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao:
Privacy Preserving Credit Systems. NSS 2016: 184-199 - [c80]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. Public Key Cryptography (2) 2016: 386-416 - [c79]Yongjun Zhao, Sherman S. M. Chow:
Towards Proofs of Ownership Beyond Bounded Leakage. ProvSec 2016: 340-350 - [c78]Sherman S. M. Chow:
A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation. SACMAT 2016: 215-226 - [c77]Tao Zhang, Xiuhua Wang, Sherman S. M. Chow:
Privacy-Preserving Multi-pattern Matching. SecureComm 2016: 199-218 - [c76]Russell W. F. Lai, Sherman S. M. Chow:
Parallel and Dynamic Structured Encryption. SecureComm 2016: 219-238 - [c75]Shengshan Hu, Qian Wang, Jingjun Wang, Sherman S. M. Chow, Qin Zou:
Securing Fast Learning! Ridge Regression over Encrypted Big Data. Trustcom/BigDataSE/ISPA 2016: 19-26 - [i24]Russell W. F. Lai, Raymond K. H. Tai, Harry W. H. Wong, Sherman S. M. Chow:
A Zoo of Homomorphic Signatures: Multi-Key and Key-Homomorphism. IACR Cryptol. ePrint Arch. 2016: 834 (2016) - 2015
- [j21]Ying-Kai Tang, Sherman S. M. Chow, Joseph K. Liu:
Comments on 'Efficient Revocable Certificateless Encryption Secure in the Standard Model'. Comput. J. 58(4): 779-781 (2015) - [j20]Zongyang Zhang, Sherman S. M. Chow, Zhenfu Cao:
Post-challenge leakage in public-key encryption. Theor. Comput. Sci. 572: 25-49 (2015) - [j19]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu, Yong Ding:
Practical (fully) distributed signatures provably secure in the standard model. Theor. Comput. Sci. 595: 143-158 (2015) - [j18]Joseph K. Liu, Cheng-Kang Chu, Sherman S. M. Chow, Xinyi Huang, Man Ho Au, Jianying Zhou:
Time-Bound Anonymous Authentication for Roaming Networks. IEEE Trans. Inf. Forensics Secur. 10(1): 178-189 (2015) - [c74]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Siu-Ming Yiu:
Related Randomness Attacks for Public Key Cryptosystems. AsiaCCS 2015: 215-223 - [c73]Yongjun Zhao, Sherman S. M. Chow:
Privacy Preserving Collaborative Filtering from Asymmetric Randomized Encoding. Financial Cryptography 2015: 459-477 - [c72]Russell W. F. Lai, Sherman S. M. Chow:
Structured Encryption with Non-interactive Updates and Parallel Traversal. ICDCS 2015: 776-777 - [c71]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle Model. ProvSec 2015: 435-454 - [e3]Feng Bao, Steven Miller, Sherman S. M. Chow, Danfeng Yao:
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015. ACM 2015, ISBN 978-1-4503-3447-1 [contents] - [i23]Yu-Chi Chen, Sherman S. M. Chow, Kai-Min Chung, Russell W. F. Lai, Wei-Kai Lin, Hong-Sheng Zhou:
Computation-Trace Indistinguishability Obfuscation and its Applications. IACR Cryptol. ePrint Arch. 2015: 406 (2015) - [i22]Yongjun Zhao, Sherman S. M. Chow:
Are you The One to Share? Secret Transfer with Access Structure. IACR Cryptol. ePrint Arch. 2015: 929 (2015) - [i21]Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and Their Applications. IACR Cryptol. ePrint Arch. 2015: 1253 (2015) - 2014
- [j17]Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability. IEEE J. Biomed. Health Informatics 18(2): 419-429 (2014) - [j16]Cheng-Kang Chu, Sherman S. M. Chow, Wen-Guey Tzeng, Jianying Zhou, Robert H. Deng:
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 25(2): 468-477 (2014) - [c70]Zongyang Zhang, Yu Chen, Sherman S. M. Chow, Goichiro Hanaoka, Zhenfu Cao, Yunlei Zhao:
All-but-One Dual Projective Hashing and Its Applications. ACNS 2014: 181-198 - [c69]Hua Deng, Qianhong Wu, Bo Qin, Sherman S. M. Chow, Josep Domingo-Ferrer, Wenchang Shi:
Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. AsiaCCS 2014: 425-434 - [c68]Tao Zhang, Sherman S. M. Chow:
Security of Direct Anonymous Authentication Using TPM 2.0 Signature - A Possible Implementation Flaw. Inscrypt 2014: 37-48 - [c67]Russell W. F. Lai, Henry K. F. Cheung, Sherman S. M. Chow:
Trapdoors for Ideal Lattices with Applications. Inscrypt 2014: 239-256 - [c66]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
A tale of two clouds: Computing on data encrypted under multiple keys. CNS 2014: 337-345 - [c65]Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-malleability, and Applications. CT-RSA 2014: 85-105 - [c64]Yujue Wang, Duncan S. Wong, Qianhong Wu, Sherman S. M. Chow, Bo Qin, Jianwei Liu:
Practical Distributed Signatures in the Standard Model. CT-RSA 2014: 307-326 - [c63]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Sherman S. M. Chow, Zhen Liu, Xiao Tan:
Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage. ESORICS (1) 2014: 326-343 - [c62]Fei Chen, Tao Xiang, Yuanyuan Yang, Sherman S. M. Chow:
Secure cloud storage meets with secure network coding. INFOCOM 2014: 673-681 - [e2]Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3 [contents] - [e1]Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings. Lecture Notes in Computer Science 8782, Springer 2014, ISBN 978-3-319-12474-2 [contents] - [i20]Pili Hu, Sherman S. M. Chow, Wing Cheong Lau:
Secure Friend Discovery via Privacy-Preserving and Decentralized Community Detection. CoRR abs/1405.4951 (2014) - [i19]Tsz Hon Yuen, Sherman S. M. Chow, Cong Zhang, Siu-Ming Yiu:
Exponent-inversion Signatures and IBE under Static Assumptions. IACR Cryptol. ePrint Arch. 2014: 311 (2014) - 2013
- [j15]Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo:
Double-trapdoor anonymous tags for traceable signatures. Int. J. Inf. Sec. 12(1): 19-31 (2013) - [j14]Sherman S. M. Chow, Man Ho Au, Willy Susilo:
Server-aided signatures verification secure against collusion attack. Inf. Secur. Tech. Rep. 17(3): 46-57 (2013) - [j13]Man Ho Au, Willy Susilo, Yi Mu, Sherman S. M. Chow:
Constant-Size Dynamic $k$ -Times Anonymous Authentication. IEEE Syst. J. 7(2): 249-261 (2013) - [j12]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IEEE Trans. Computers 62(2): 362-375 (2013) - [c61]Cong Zhang, Tsz Hon Yuen, Hao Xiong, Sherman S. M. Chow, Siu-Ming Yiu, Yi Jun He:
Multi-key leakage-resilient threshold cryptography. AsiaCCS 2013: 61-70 - [c60]Lei Zhang, Qianhong Wu, Josep Domingo-Ferrer, Bo Qin, Sherman S. M. Chow, Wenchang Shi:
Secure One-to-Group Communications Escrow-Free ID-Based Asymmetric Group Key Agreement. Inscrypt 2013: 239-254 - [c59]Boyang Wang, Ming Li, Sherman S. M. Chow, Hui Li:
Computing encrypted cloud data efficiently under multiple keys. CNS 2013: 504-513 - [c58]Yue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li:
Towards auditable cloud-assisted access of encrypted health data. CNS 2013: 514-519 - [c57]Tolga Acar, Sherman S. M. Chow, Lan Nguyen:
Accumulators and U-Prove Revocation. Financial Cryptography 2013: 189-196 - [c56]Boyang Wang, Sherman S. M. Chow, Ming Li, Hui Li:
Storing Shared Data on the Cloud via Security-Mediator. ICDCS 2013: 124-133 - [c55]Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu:
Towards Anonymous Ciphertext Indistinguishability with Identity Leakage. ProvSec 2013: 139-153 - [i18]Sherman S. M. Chow, Matthew K. Franklin, Haibin Zhang:
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications. IACR Cryptol. ePrint Arch. 2013: 858 (2013) - 2012
- [j11]Sherman S. M. Chow, Changshe Ma, Jian Weng:
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. Algorithmica 64(2): 246-266 (2012) - [c54]Sherman S. M. Chow, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
SPICE - Simple Privacy-Preserving Identity-Management for Cloud Environment. ACNS 2012: 526-543 - [c53]Sherman S. M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, Robert H. Deng:
Dynamic Secure Cloud Storage with Provenance. Cryptography and Security 2012: 442-464 - [c52]Kin Ying Yu, Tsz Hon Yuen, Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
PE(AR)2: Privacy-Enhanced Anonymous Authentication with Reputation and Revocation. ESORICS 2012: 679-696 - [c51]Tsz Hon Yuen, Sherman S. M. Chow, Ye Zhang, Siu-Ming Yiu:
Identity-Based Encryption Resilient to Continual Auxiliary Leakage. EUROCRYPT 2012: 117-134 - 2011
- [j10]Sherman S. M. Chow, Siu-Ming Yiu:
Exclusion-intersection encryption. Int. J. Secur. Networks 6(2/3): 136-146 (2011) - [c50]Masayuki Abe, Sherman S. M. Chow, Kristiyan Haralambiev, Miyako Ohkubo:
Double-Trapdoor Anonymous Tags for Traceable Signatures. ACNS 2011: 183-200 - [c49]Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou:
Identity-based online/offline key encapsulation and encryption. AsiaCCS 2011: 52-60 - [c48]Cheng-Kang Chu, Wen Tao Zhu, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Secure mobile subscription of sensor-encrypted data. AsiaCCS 2011: 228-237 - [c47]Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie:
Multi-authority ciphertext-policy attribute-based encryption with accountability. AsiaCCS 2011: 386-390 - [c46]Sherman S. M. Chow, Man Ho Au, Willy Susilo:
Server-aided signatures verification secure against collusion attack. AsiaCCS 2011: 401-405 - [c45]Ching-Hua Yu, Sherman S. M. Chow, Kai-Min Chung, Feng-Hao Liu:
Efficient Secure Two-Party Exponentiation. CT-RSA 2011: 17-32 - [c44]Sherman S. M. Chow, Kristiyan Haralambiev:
Non-interactive Confirmer Signatures. CT-RSA 2011: 49-64 - [c43]Dinh Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, Sherman S. M. Chow:
Optimal Sybil-resilient node admission control. INFOCOM 2011: 3218-3226 - 2010
- [b1]Sherman S. M. Chow:
New Privacy-Preserving Architectures for Identity-/Attribute-based Encryption. New York University, USA, 2010 - [j9]Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An efficient signcryption scheme with key privacy and its extension to ring signcryption. J. Comput. Secur. 18(3): 451-473 (2010) - [c42]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. AFRICACRYPT 2010: 316-332 - [c41]Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rouselakis, Brent Waters:
Practical leakage-resilient identity-based encryption from simple assumptions. CCS 2010: 152-161 - [c40]Sherman S. M. Chow, Changshe Ma, Jian Weng:
Zero-Knowledge Argument for Simultaneous Discrete Logarithms. COCOON 2010: 520-529 - [c39]Dinh Nguyen Tran, Jinyang Li, Lakshminarayanan Subramanian, Sherman S. M. Chow:
Brief announcement: improving social-network-based sybil-resilient node admission control. PODC 2010: 241-242 - [i17]Sherman S. M. Chow, Joseph K. Liu, Jianying Zhou:
Identity-Based Online/Offline Key Encapsulation and Encryption. IACR Cryptol. ePrint Arch. 2010: 194 (2010)
2000 – 2009
- 2009
- [j8]Sherman S. M. Chow:
Blind signature and ring signature schemes: Rehabilitation and attack. Comput. Stand. Interfaces 31(4): 707-712 (2009) - [j7]Sherman S. M. Chow, Wun-She Yap:
Partial decryption attacks in security-mediated certificateless encryption. IET Inf. Secur. 3(4): 148-151 (2009) - [c38]Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Conditional Proxy Broadcast Re-Encryption. ACISP 2009: 327-342 - [c37]Melissa Chase, Sherman S. M. Chow:
Improving privacy and security in multi-authority attribute-based encryption. CCS 2009: 121-130 - [c36]Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan Subramanian:
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. NDSS 2009 - [c35]Sherman S. M. Chow:
Removing Escrow from Identity-Based Encryption. Public Key Cryptography 2009: 256-276 - [c34]Sherman S. M. Chow:
Real Traceable Signatures. Selected Areas in Cryptography 2009: 92-107 - [p1]Sherman S. M. Chow:
Certificateless Encryption. Identity-Based Cryptography 2009: 135-155 - [i16]Sherman S. M. Chow, Jian Weng, Yanjiang Yang, Robert H. Deng:
Efficient Unidirectional Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2009: 189 (2009) - [i15]Cong Wang, Sherman S. M. Chow, Qian Wang, Kui Ren, Wenjing Lou:
Privacy-Preserving Public Auditing for Secure Cloud Storage. IACR Cryptol. ePrint Arch. 2009: 579 (2009) - 2008
- [j6]Sherman S. M. Chow:
Multi-Designated Verifiers Signatures Revisited. Int. J. Netw. Secur. 7(3): 348-357 (2008) - [j5]Sherman S. M. Chow, H. W. Go, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Multiplicative Forward-Secure Threshold Signature Scheme. Int. J. Netw. Secur. 7(3): 397-403 (2008) - [j4]Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow:
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. J. Univers. Comput. Sci. 14(3): 463-480 (2008) - [c33]Sherman S. M. Chow, Raphael C.-W. Phan:
Proxy Re-signatures in the Standard Model. ISC 2008: 260-276 - [c32]Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong:
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. NDSS 2008 - [c31]Sherman S. M. Chow, Siu-Ming Yiu:
Timed-Release Encryption Revisited. ProvSec 2008: 38-51 - [c30]Sherman S. M. Chow, Volker Roth, Eleanor Gilbert Rieffel:
General Certificateless Encryption and Timed-Release Encryption. SCN 2008: 126-143 - [i14]Sherman S. M. Chow, Volker Roth, Eleanor Gilbert Rieffel:
General Certificateless Encryption and Timed-Release Encryption. IACR Cryptol. ePrint Arch. 2008: 23 (2008) - 2007
- [c29]Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. ACNS 2007: 459-477 - [c28]Sherman S. M. Chow:
Running on Karma - P2P Reputation and Currency Systems. CANS 2007: 146-158 - [c27]Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow:
An Efficient Signcryption Scheme with Key Privacy. EuroPKI 2007: 78-93 - [c26]Sherman S. M. Chow, Duncan S. Wong:
Anonymous Identification and Designated-Verifiers Signatures from Insecure Batch Verification. EuroPKI 2007: 203-219 - [c25]Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-Based Key Agreement and Anonymous Extension. ISC 2007: 203-220 - [c24]Sherman S. M. Chow:
Token-Controlled Public Key Encryption in the Standard Model. ISC 2007: 315-332 - [c23]Patrick P. Tsang, Sherman S. M. Chow, Sean W. Smith:
Batch Pairing Delegation. IWSEC 2007: 74-90 - [i13]Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Strongly-Secure Identity-based Key Agreement and Anonymous Extension. IACR Cryptol. ePrint Arch. 2007: 18 (2007) - [i12]Sherman S. M. Chow, Wun-She Yap:
Certificateless Ring Signatures. IACR Cryptol. ePrint Arch. 2007: 236 (2007) - [i11]Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow:
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model. IACR Cryptol. ePrint Arch. 2007: 262 (2007) - 2006
- [j3]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Practical electronic lotteries with offline TTP. Comput. Commun. 29(15): 2830-2840 (2006) - [c22]Sherman S. M. Chow, Victor K.-W. Wei, Joseph K. Liu, Tsz Hon Yuen:
Ring signatures without random oracles. AsiaCCS 2006: 297-302 - [c21]Man Ho Au, Sherman S. M. Chow, Willy Susilo, Patrick P. Tsang:
Short Linkable Ring Signatures Revisited. EuroPKI 2006: 101-115 - [c20]Sherman S. M. Chow:
Identity-Based Strong Multi-Designated Verifiers Signatures. EuroPKI 2006: 257-259 - [c19]Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto:
Security-Mediated Certificateless Cryptography. Public Key Cryptography 2006: 508-524 - [c18]Sherman S. M. Chow, Willy Susilo, Tsz Hon Yuen:
Escrowed Linkability of Ring Signatures and Its Applications. VIETCRYPT 2006: 175-192 - [i10]Sherman S. M. Chow, Willy Susilo:
Generic Construction of (Identity-based) Perfect Concurrent Signatures. IACR Cryptol. ePrint Arch. 2006: 361 (2006) - 2005
- [j2]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Forward-secure multisignature and blind signature schemes. Appl. Math. Comput. 168(2): 895-908 (2005) - [j1]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Richard W. C. Lui:
A generic anti-spyware solution by access control list at kernel level. J. Syst. Softw. 75(1-2): 227-234 (2005) - [c17]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ACISP 2005: 316-328 - [c16]Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Role Activation Management in Role Based Access Control. ACISP 2005: 358-369 - [c15]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. ACNS 2005: 499-512 - [c14]Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu:
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. CISC 2005: 290-301 - [c13]Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Ring Signature: Why, How and What Next. EuroPKI 2005: 144-161 - [c12]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
An e-Lottery Scheme Using Verifiable Random Function. ICCSA (3) 2005: 651-660 - [c11]Sherman S. M. Chow, Willy Susilo:
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ICICS 2005: 194-206 - [c10]Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Supporting Efficient Authorization in Delegation with Supervision. ICPADS (2) 2005: 240-244 - [c9]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. ICPADS (2) 2005: 275-279 - [c8]Man Ho Au, Sherman S. M. Chow, Willy Susilo:
Short E-Cash. INDOCRYPT 2005: 332-346 - [c7]Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Delegation Network. Mycrypt 2005: 99-115 - [c6]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. SEC 2005: 443-457 - [i9]Sherman S. M. Chow, Joseph K. Liu, Victor K. Wei, Tsz Hon Yuen:
Ring Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 317 (2005) - [i8]Sherman S. M. Chow, Siu-Ming Yiu:
Exclusion-Intersection Encryption. IACR Cryptol. ePrint Arch. 2005: 377 (2005) - 2004
- [c5]Sherman S. M. Chow, H. W. Go, Ricky W. M. Tang:
Impact of Recent Advances in Crytography on Online Game. ADCOG 2004: 68-73 - [c4]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Secure Hierarchical Identity Based Signature and Its Application. ICICS 2004: 480-494 - [c3]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. ICISC 2004: 218-232 - [c2]Sherman S. M. Chow:
Verifiable Pairing and Its Applications. WISA 2004: 170-187 - [i7]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. IACR Cryptol. ePrint Arch. 2004: 108 (2004) - [i6]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Identity Based Threshold Ring Signature. IACR Cryptol. ePrint Arch. 2004: 179 (2004) - [i5]Sherman S. M. Chow, Tsz Hon Yuen, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Signcryption in Hierarchical Identity Based Cryptosystem. IACR Cryptol. ePrint Arch. 2004: 244 (2004) - [i4]Zhengjun Cao, Sherman S. M. Chow:
Security Flaws in a Pairing-based Group Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 299 (2004) - [i3]Ai Fen Sui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow, Wai Wan Tsang, C. F. Chong, Kevin K. H. Pun, H. W. Chan:
Separable and Anonymous Identity-Based Key Issuing. IACR Cryptol. ePrint Arch. 2004: 322 (2004) - [i2]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Efficient Identity Based Ring Signature. IACR Cryptol. ePrint Arch. 2004: 327 (2004) - 2003
- [c1]Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. ICISC 2003: 352-369 - [i1]Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow:
A Secure Modified ID-Based Undeniable Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 262 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint