D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 57 Citations 10,101 220 World Ranking 1938 National Ranking 182

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • The Internet
  • Operating system

Computer security, Encryption, Computer security model, Cryptography and Attribute-based encryption are his primary areas of study. Key, Random oracle, Anonymity, Adversary and Cognitive password are subfields of Computer security in which his conducts study. His Encryption research incorporates elements of Cloud computing and Distributed computing.

His research in Computer security model focuses on subjects like Certificateless cryptography, which are connected to Public key infrastructure. Duncan S. Wong has included themes like Computer network and Digital signature in his Cryptography study. His research integrates issues of Standard model, Access structure and Access control in his study of Attribute-based encryption.

His most cited work include:

  • Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (216 citations)
  • A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security (205 citations)
  • Certificateless signature revisited (202 citations)

What are the main themes of his work throughout his whole career to date?

The scientist’s investigation covers issues in Computer security, Encryption, Theoretical computer science, Cryptography and Computer security model. His Public-key cryptography, Random oracle and Key study, which is part of a larger body of work in Computer security, is frequently linked to Signature, bridging the gap between disciplines. His Encryption study incorporates themes from Overhead and Standard model.

Duncan S. Wong focuses mostly in the field of Theoretical computer science, narrowing it down to matters related to Secret sharing and, in some cases, Lemma. The Cryptography study combines topics in areas such as Elliptic curve and Digital signature. His research investigates the connection between Computer security model and topics such as Key escrow that intersect with problems in Cryptosystem.

He most often published in these fields:

  • Computer security (54.35%)
  • Encryption (25.65%)
  • Theoretical computer science (22.17%)

What were the highlights of his more recent work (between 2014-2021)?

  • Computer security (54.35%)
  • Encryption (25.65%)
  • Computer network (18.70%)

In recent papers he was focusing on the following fields of study:

His primary areas of investigation include Computer security, Encryption, Computer network, Theoretical computer science and Cloud computing. His study in Public-key cryptography, Attribute-based encryption, Computer security model, Cryptographic primitive and Key are all subfields of Computer security. His studies deal with areas such as Eavesdropping, Overhead and Access control as well as Encryption.

His Computer network research is multidisciplinary, incorporating perspectives in Bounding overwatch and Cryptography. His Theoretical computer science research incorporates themes from Identity, Standard model, Schnorr signature and Secret sharing. His work on Cloud computing security and Cloud storage as part of general Cloud computing study is frequently linked to Outsourcing, therefore connecting diverse disciplines of science.

Between 2014 and 2021, his most popular works were:

  • Surveying the Development of Biometric User Authentication on Mobile Phones (160 citations)
  • New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations (151 citations)
  • Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing (144 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • The Internet
  • Operating system

His scientific interests lie mostly in Computer security, Cloud computing, Encryption, Attribute-based encryption and Theoretical computer science. Computer security model, Multi-factor authentication, Mutual authentication, Password and Authentication are the subjects of his Computer security studies. His studies in Cloud computing integrate themes in fields like Computation and Distributed computing.

Duncan S. Wong usually deals with Encryption and limits it to topics linked to Access control and Key. Duncan S. Wong works mostly in the field of Attribute-based encryption, limiting it down to topics relating to Ciphertext and, in certain cases, Anonymity and Protocol, as a part of the same area of interest. His study explores the link between Theoretical computer science and topics such as Standard model that cross with problems in Overhead and Traitor tracing.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups

Joseph K. Liu;Victor K. Wei;Duncan S. Wong.
australasian conference on information security and privacy (2004)

421 Citations

Certificateless public-key signature: security model and efficient construction

Zhenfeng Zhang;Duncan S. Wong;Jing Xu;Dengguo Feng.
applied cryptography and network security (2006)

381 Citations

Certificateless signature revisited

Xinyi Huang;Yi Mu;Willy Susilo;Duncan S. Wong.
australasian conference on information security and privacy (2007)

365 Citations

A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security

Kaitai Liang;Liming Fang;Willy Susilo;Duncan S. Wong.
intelligent networking and collaborative systems (2013)

283 Citations

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

271 Citations

Key replacement attack against a generic construction of certificateless signature

Bessie C. Hu;Duncan S. Wong;Zhenfeng Zhang;Xiaotie Deng.
australasian conference on information security and privacy (2006)

264 Citations

Two-factor mutual authentication based on smart cards and passwords

Guomin Yang;Duncan S. Wong;Huaxiong Wang;Xiaotie Deng.
Journal of Computer and System Sciences (2008)

236 Citations

Surveying the Development of Biometric User Authentication on Mobile Phones

Weizhi Meng;Duncan S. Wong;Steven Furnell;Jianying Zhou.
IEEE Communications Surveys and Tutorials (2015)

227 Citations

Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing

Yinghui Zhang;Xiaofeng Chen;Jin Li;Duncan S. Wong.
Information Sciences (2017)

213 Citations

Probabilistic public key encryption with equality test

Guomin Yang;Chik How Tan;Qiong Huang;Duncan S. Wong.
the cryptographers track at the rsa conference (2010)

194 Citations

Best Scientists Citing Duncan S. Wong

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 143

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 81

Yi Mu

Yi Mu

Fujian Normal University

Publications: 73

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 64

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 62

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 49

Jin Li

Jin Li

Guangzhou University

Publications: 47

Debiao He

Debiao He

Wuhan University

Publications: 46

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 41

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 39

Guomin Yang

Guomin Yang

University of Wollongong

Publications: 36

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 34

Jianying Zhou

Jianying Zhou

Singapore University of Technology and Design

Publications: 28

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 28

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 28

Ximeng Liu

Ximeng Liu

Fuzhou University

Publications: 28

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us
Something went wrong. Please try again later.