Computer security, Encryption, Computer security model, Cryptography and Attribute-based encryption are his primary areas of study. Key, Random oracle, Anonymity, Adversary and Cognitive password are subfields of Computer security in which his conducts study. His Encryption research incorporates elements of Cloud computing and Distributed computing.
His research in Computer security model focuses on subjects like Certificateless cryptography, which are connected to Public key infrastructure. Duncan S. Wong has included themes like Computer network and Digital signature in his Cryptography study. His research integrates issues of Standard model, Access structure and Access control in his study of Attribute-based encryption.
The scientist’s investigation covers issues in Computer security, Encryption, Theoretical computer science, Cryptography and Computer security model. His Public-key cryptography, Random oracle and Key study, which is part of a larger body of work in Computer security, is frequently linked to Signature, bridging the gap between disciplines. His Encryption study incorporates themes from Overhead and Standard model.
Duncan S. Wong focuses mostly in the field of Theoretical computer science, narrowing it down to matters related to Secret sharing and, in some cases, Lemma. The Cryptography study combines topics in areas such as Elliptic curve and Digital signature. His research investigates the connection between Computer security model and topics such as Key escrow that intersect with problems in Cryptosystem.
His primary areas of investigation include Computer security, Encryption, Computer network, Theoretical computer science and Cloud computing. His study in Public-key cryptography, Attribute-based encryption, Computer security model, Cryptographic primitive and Key are all subfields of Computer security. His studies deal with areas such as Eavesdropping, Overhead and Access control as well as Encryption.
His Computer network research is multidisciplinary, incorporating perspectives in Bounding overwatch and Cryptography. His Theoretical computer science research incorporates themes from Identity, Standard model, Schnorr signature and Secret sharing. His work on Cloud computing security and Cloud storage as part of general Cloud computing study is frequently linked to Outsourcing, therefore connecting diverse disciplines of science.
His scientific interests lie mostly in Computer security, Cloud computing, Encryption, Attribute-based encryption and Theoretical computer science. Computer security model, Multi-factor authentication, Mutual authentication, Password and Authentication are the subjects of his Computer security studies. His studies in Cloud computing integrate themes in fields like Computation and Distributed computing.
Duncan S. Wong usually deals with Encryption and limits it to topics linked to Access control and Key. Duncan S. Wong works mostly in the field of Attribute-based encryption, limiting it down to topics relating to Ciphertext and, in certain cases, Anonymity and Protocol, as a part of the same area of interest. His study explores the link between Theoretical computer science and topics such as Standard model that cross with problems in Overhead and Traitor tracing.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups
Joseph K. Liu;Victor K. Wei;Duncan S. Wong.
australasian conference on information security and privacy (2004)
Certificateless public-key signature: security model and efficient construction
Zhenfeng Zhang;Duncan S. Wong;Jing Xu;Dengguo Feng.
applied cryptography and network security (2006)
Certificateless signature revisited
Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)
A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security
Kaitai Liang;Liming Fang;Willy Susilo;Duncan S. Wong.
intelligent networking and collaborative systems (2013)
Malicious KGC attacks in certificateless cryptography
Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)
Key replacement attack against a generic construction of certificateless signature
Bessie C. Hu;Duncan S. Wong;Zhenfeng Zhang;Xiaotie Deng.
australasian conference on information security and privacy (2006)
Two-factor mutual authentication based on smart cards and passwords
Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)
Surveying the Development of Biometric User Authentication on Mobile Phones
Weizhi Meng;Duncan S. Wong;Steven Furnell;Jianying Zhou.
IEEE Communications Surveys and Tutorials (2015)
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing
Yinghui Zhang;Xiaofeng Chen;Jin Li;Duncan S. Wong.
Information Sciences (2017)
Probabilistic public key encryption with equality test
Guomin Yang;Chik How Tan;Qiong Huang;Duncan S. Wong.
the cryptographers track at the rsa conference (2010)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: