D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 41 Citations 6,147 198 World Ranking 5575 National Ranking 536

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Computer security

His primary scientific interests are in Computer security, Public-key cryptography, Computer security model, Cloud computing and Computer network. Computer security and Revocation are frequently intertwined in his study. His work investigates the relationship between Public-key cryptography and topics such as Certificate that intersect with problems in Escrow, Certificate-based encryption and Implicit certificate.

His work focuses on many connections between Computer security model and other disciplines, such as Ring signature, that overlap with his field of interest in Algorithm. His Cloud computing study combines topics from a wide range of disciplines, such as Data integrity and Information privacy. His Computer network study integrates concerns from other disciplines, such as Infrastructure security and Real time video.

His most cited work include:

  • Attribute-based signature and its applications (207 citations)
  • Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage (167 citations)
  • Malicious KGC attacks in certificateless cryptography (166 citations)

What are the main themes of his work throughout his whole career to date?

Man Ho Au focuses on Computer security, Encryption, Cryptography, Theoretical computer science and Random oracle. As part of his studies on Computer security, Man Ho Au often connects relevant subjects like Cloud computing. His Cryptography research incorporates themes from Verifiable secret sharing and Digital signature.

His Theoretical computer science research integrates issues from Hash function, Bounded function, Identity and Ring signature. Man Ho Au has researched Random oracle in several fields, including Block and Blind signature. His Public-key cryptography research is multidisciplinary, incorporating elements of Adversary and Authentication.

He most often published in these fields:

  • Computer security (62.11%)
  • Encryption (25.55%)
  • Cryptography (22.91%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (62.11%)
  • Cryptography (22.91%)
  • Encryption (25.55%)

In recent papers he was focusing on the following fields of study:

Man Ho Au spends much of his time researching Computer security, Cryptography, Encryption, Theoretical computer science and Blockchain. His Computer security study combines topics from a wide range of disciplines, such as Cloud computing and Protocol. His work on Zero-knowledge proof as part of his general Cryptography study is frequently connected to Collusion, thereby bridging the divide between different branches of science.

His Encryption research is under the purview of Computer network. His Theoretical computer science research incorporates themes from Random oracle, Hash function, Computer security model and Graph. The Public-key cryptography study combines topics in areas such as Adversary and Bounded function.

Between 2017 and 2021, his most popular works were:

  • A Survey on Access Control in Fog Computing (54 citations)
  • Platform-Independent Secure Blockchain-Based Voting System (43 citations)
  • Efficient attribute-based encryption with attribute revocation for assured data deletion (40 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Computer security

The scientist’s investigation covers issues in Computer security, Cryptography, Cloud computing, Encryption and Zero-knowledge proof. In his works, Man Ho Au performs multidisciplinary study on Computer security and Ring. His Cryptography research focuses on subjects like Authentication, which are linked to Data integrity and Blacklist.

His Cloud computing study which covers Access control that intersects with Edge computing and Fog computing. His Encryption research includes themes of Overhead and Verifiable secret sharing. His work carried out in the field of Revocation brings together such families of science as Random oracle, Attribute-based encryption and Theoretical computer science.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

348 Citations

Attribute-based signature and its applications

Jin Li;Man Ho Au;Willy Susilo;Dongqing Xie.
computer and communications security (2010)

334 Citations

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

276 Citations

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero

Shi Feng Sun;Shi Feng Sun;Man Ho Au;Joseph K. Liu;Tsz Hon Yuen.
european symposium on research in computer security (2017)

216 Citations

Blacklistable anonymous credentials: blocking misbehaving users without ttps

Patrick P. Tsang;Man Ho Au;Apu Kapadia;Sean W. Smith.
computer and communications security (2007)

199 Citations

Constant-size dynamic k -TAA

Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)

198 Citations

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.

Joseph K. Liu;Man Ho Au;Willy Susilo.
IACR Cryptology ePrint Archive (2006)

195 Citations

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing

Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2014)

146 Citations

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
grid computing (2015)

144 Citations

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract

Joseph K. Liu;Man Ho Au;Willy Susilo.
computer and communications security (2007)

140 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Man Ho Au

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 85

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 62

Yi Mu

Yi Mu

Fujian Normal University

Publications: 51

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 50

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 31

Debiao He

Debiao He

Wuhan University

Publications: 30

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 25

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 24

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 24

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 22

Lei Zhang

Lei Zhang

Southeast University

Publications: 20

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 20

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 20

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 20

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 19

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 19

Trending Scientists

Sándor P. Fekete

Sándor P. Fekete

Technische Universität Braunschweig

Jie Huang

Jie Huang

Chinese University of Hong Kong

William Q. Judge

William Q. Judge

Old Dominion University

Ron J. Patton

Ron J. Patton

University of Hull

Johannes Neugebauer

Johannes Neugebauer

University of Münster

Laren M. Tolbert

Laren M. Tolbert

Georgia Institute of Technology

Bruce A. Moyer

Bruce A. Moyer

Oak Ridge National Laboratory

Richard Voellmy

Richard Voellmy

University of Florida

Andrew C.W. Zannettino

Andrew C.W. Zannettino

University of Adelaide

Philippe Séguéla

Philippe Séguéla

Montreal Neurological Institute and Hospital

Christian Tegner

Christian Tegner

Aarhus University

Nathalie Tzourio-Mazoyer

Nathalie Tzourio-Mazoyer

University of Bordeaux

Wery P. M. van den Wildenberg

Wery P. M. van den Wildenberg

University of Amsterdam

Vicki Bruce

Vicki Bruce

Newcastle University

Stuart B. Goodman

Stuart B. Goodman

Stanford University

Barry C. Sanders

Barry C. Sanders

University of Calgary

Something went wrong. Please try again later.