His primary scientific interests are in Computer security, Public-key cryptography, Computer security model, Cloud computing and Computer network. Computer security and Revocation are frequently intertwined in his study. His work investigates the relationship between Public-key cryptography and topics such as Certificate that intersect with problems in Escrow, Certificate-based encryption and Implicit certificate.
His work focuses on many connections between Computer security model and other disciplines, such as Ring signature, that overlap with his field of interest in Algorithm. His Cloud computing study combines topics from a wide range of disciplines, such as Data integrity and Information privacy. His Computer network study integrates concerns from other disciplines, such as Infrastructure security and Real time video.
Man Ho Au focuses on Computer security, Encryption, Cryptography, Theoretical computer science and Random oracle. As part of his studies on Computer security, Man Ho Au often connects relevant subjects like Cloud computing. His Cryptography research incorporates themes from Verifiable secret sharing and Digital signature.
His Theoretical computer science research integrates issues from Hash function, Bounded function, Identity and Ring signature. Man Ho Au has researched Random oracle in several fields, including Block and Blind signature. His Public-key cryptography research is multidisciplinary, incorporating elements of Adversary and Authentication.
Man Ho Au spends much of his time researching Computer security, Cryptography, Encryption, Theoretical computer science and Blockchain. His Computer security study combines topics from a wide range of disciplines, such as Cloud computing and Protocol. His work on Zero-knowledge proof as part of his general Cryptography study is frequently connected to Collusion, thereby bridging the divide between different branches of science.
His Encryption research is under the purview of Computer network. His Theoretical computer science research incorporates themes from Random oracle, Hash function, Computer security model and Graph. The Public-key cryptography study combines topics in areas such as Adversary and Bounded function.
The scientist’s investigation covers issues in Computer security, Cryptography, Cloud computing, Encryption and Zero-knowledge proof. In his works, Man Ho Au performs multidisciplinary study on Computer security and Ring. His Cryptography research focuses on subjects like Authentication, which are linked to Data integrity and Blacklist.
His Cloud computing study which covers Access control that intersects with Edge computing and Fog computing. His Encryption research includes themes of Overhead and Verifiable secret sharing. His work carried out in the field of Revocation brings together such families of science as Random oracle, Attribute-based encryption and Theoretical computer science.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage
Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)
Attribute-based signature and its applications
Jin Li;Man Ho Au;Willy Susilo;Dongqing Xie.
computer and communications security (2010)
Malicious KGC attacks in certificateless cryptography
Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)
RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero
Shi Feng Sun;Shi Feng Sun;Man Ho Au;Joseph K. Liu;Tsz Hon Yuen.
european symposium on research in computer security (2017)
Blacklistable anonymous credentials: blocking misbehaving users without ttps
Patrick P. Tsang;Man Ho Au;Apu Kapadia;Sean W. Smith.
computer and communications security (2007)
Constant-size dynamic k -TAA
Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)
Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.
Joseph K. Liu;Man Ho Au;Willy Susilo.
IACR Cryptology ePrint Archive (2006)
A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2014)
A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
grid computing (2015)
Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract
Joseph K. Liu;Man Ho Au;Willy Susilo.
computer and communications security (2007)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
University of Wollongong
Monash University
Fujian Normal University
Singapore University of Technology and Design
City University of Hong Kong
Hong Kong Polytechnic University
Singapore Management University
Fujian Normal University
Chinese Academy of Sciences
Chinese University of Hong Kong
Technische Universität Braunschweig
Chinese University of Hong Kong
Old Dominion University
University of Hull
University of Münster
Georgia Institute of Technology
Oak Ridge National Laboratory
University of Florida
University of Adelaide
Montreal Neurological Institute and Hospital
Aarhus University
University of Bordeaux
University of Amsterdam
Newcastle University
Stanford University
University of Calgary