H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 39 Citations 5,840 166 World Ranking 4871 National Ranking 446

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Cryptography
  • Computer security

His primary scientific interests are in Computer security, Public-key cryptography, Computer security model, Cloud computing and Computer network. Computer security and Revocation are frequently intertwined in his study. His work investigates the relationship between Public-key cryptography and topics such as Certificate that intersect with problems in Escrow, Certificate-based encryption and Implicit certificate.

His work focuses on many connections between Computer security model and other disciplines, such as Ring signature, that overlap with his field of interest in Algorithm. His Cloud computing study combines topics from a wide range of disciplines, such as Data integrity and Information privacy. His Computer network study integrates concerns from other disciplines, such as Infrastructure security and Real time video.

His most cited work include:

  • Attribute-based signature and its applications (207 citations)
  • Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage (167 citations)
  • Malicious KGC attacks in certificateless cryptography (166 citations)

What are the main themes of his work throughout his whole career to date?

Man Ho Au focuses on Computer security, Encryption, Cryptography, Theoretical computer science and Random oracle. As part of his studies on Computer security, Man Ho Au often connects relevant subjects like Cloud computing. His Cryptography research incorporates themes from Verifiable secret sharing and Digital signature.

His Theoretical computer science research integrates issues from Hash function, Bounded function, Identity and Ring signature. Man Ho Au has researched Random oracle in several fields, including Block and Blind signature. His Public-key cryptography research is multidisciplinary, incorporating elements of Adversary and Authentication.

He most often published in these fields:

  • Computer security (62.11%)
  • Encryption (25.55%)
  • Cryptography (22.91%)

What were the highlights of his more recent work (between 2017-2021)?

  • Computer security (62.11%)
  • Cryptography (22.91%)
  • Encryption (25.55%)

In recent papers he was focusing on the following fields of study:

Man Ho Au spends much of his time researching Computer security, Cryptography, Encryption, Theoretical computer science and Blockchain. His Computer security study combines topics from a wide range of disciplines, such as Cloud computing and Protocol. His work on Zero-knowledge proof as part of his general Cryptography study is frequently connected to Collusion, thereby bridging the divide between different branches of science.

His Encryption research is under the purview of Computer network. His Theoretical computer science research incorporates themes from Random oracle, Hash function, Computer security model and Graph. The Public-key cryptography study combines topics in areas such as Adversary and Bounded function.

Between 2017 and 2021, his most popular works were:

  • A Survey on Access Control in Fog Computing (54 citations)
  • Platform-Independent Secure Blockchain-Based Voting System (43 citations)
  • Efficient attribute-based encryption with attribute revocation for assured data deletion (40 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Computer security

The scientist’s investigation covers issues in Computer security, Cryptography, Cloud computing, Encryption and Zero-knowledge proof. In his works, Man Ho Au performs multidisciplinary study on Computer security and Ring. His Cryptography research focuses on subjects like Authentication, which are linked to Data integrity and Blacklist.

His Cloud computing study which covers Access control that intersects with Edge computing and Fog computing. His Encryption research includes themes of Overhead and Verifiable secret sharing. His work carried out in the field of Revocation brings together such families of science as Random oracle, Attribute-based encryption and Theoretical computer science.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Attribute-based signature and its applications

Jin Li;Man Ho Au;Willy Susilo;Dongqing Xie.
computer and communications security (2010)

290 Citations

Malicious KGC attacks in certificateless cryptography

Man Ho Au;Yi Mu;Jing Chen;Duncan S. Wong.
computer and communications security (2007)

271 Citations

Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu;Man Ho Au;Giuseppe Ateniese;Xinyi Huang.
IEEE Transactions on Information Forensics and Security (2017)

259 Citations

Constant-size dynamic k -TAA

Man Ho Au;Willy Susilo;Yi Mu.
security and cryptography for networks (2006)

198 Citations

Blacklistable anonymous credentials: blocking misbehaving users without ttps

Patrick P. Tsang;Man Ho Au;Apu Kapadia;Sean W. Smith.
computer and communications security (2007)

191 Citations

Self-Generated-Certificate Public Key Cryptography and Certificateless Signature / Encryption Scheme in the Standard Model.

Joseph K. Liu;Man Ho Au;Willy Susilo.
IACR Cryptology ePrint Archive (2006)

188 Citations

Self-Generated-Certificate Public Key Cryptography and certificateless signature/encryption scheme in the standard model: extended abstract

Joseph K. Liu;Man Ho Au;Willy Susilo.
computer and communications security (2007)

173 Citations

RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero

Shi Feng Sun;Shi Feng Sun;Man Ho Au;Joseph K. Liu;Tsz Hon Yuen.
european symposium on research in computer security (2017)

154 Citations

A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing

Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
IEEE Transactions on Information Forensics and Security (2014)

133 Citations

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Kaitai Liang;Man Ho Au;Joseph K. Liu;Willy Susilo.
grid computing (2015)

132 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Man Ho Au

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 85

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 62

Yi Mu

Yi Mu

Fujian Normal University

Publications: 51

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 50

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 31

Debiao He

Debiao He

Wuhan University

Publications: 30

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 25

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 24

Sherman S. M. Chow

Sherman S. M. Chow

Chinese University of Hong Kong

Publications: 24

Xiaodong Lin

Xiaodong Lin

University of Guelph

Publications: 22

Lei Zhang

Lei Zhang

Southeast University

Publications: 20

Xiaojiang Du

Xiaojiang Du

Temple University

Publications: 20

Jin Li

Jin Li

Guangzhou University

Publications: 20

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 20

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 19

Something went wrong. Please try again later.