D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 42 Citations 9,834 188 World Ranking 5181 National Ranking 486

Overview

What is he best known for?

The fields of study he is best known for:

  • Cryptography
  • Operating system
  • Computer security

Sherman S. M. Chow focuses on Computer security, Encryption, Ciphertext, Random oracle and Ring signature. His work in Computer security addresses subjects such as Cloud computing, which are connected to disciplines such as Information privacy. Sherman S. M. Chow interconnects Proxy and Access control in the investigation of issues within Encryption.

His research integrates issues of Signcryption and Semantic security in his study of Ciphertext. The Ring signature study combines topics in areas such as Theoretical computer science and Schnorr signature. In Cryptography, Sherman S. M. Chow works on issues like Verifiable secret sharing, which are connected to Client-side.

His most cited work include:

  • Privacy-Preserving Public Auditing for Secure Cloud Storage (847 citations)
  • Improving privacy and security in multi-authority attribute-based encryption (526 citations)
  • Efficient unidirectional proxy re-encryption (277 citations)

What are the main themes of his work throughout his whole career to date?

Sherman S. M. Chow mainly focuses on Computer security, Encryption, Theoretical computer science, Cryptography and Random oracle. In the field of Computer security, his study on Public-key cryptography, Anonymity and Cryptosystem overlaps with subjects such as Signature. His study focuses on the intersection of Theoretical computer science and fields such as Key with connections in the field of Protocol.

His work carried out in the field of Cryptography brings together such families of science as Distributed computing, Cloud computing, Verifiable secret sharing and Certificateless cryptography. His research on Cloud computing also deals with topics like

  • Information privacy that intertwine with fields like Data integrity,
  • Server and related Database. His Random oracle research integrates issues from Security level, Algorithm, Schnorr signature and Ring signature.

He most often published in these fields:

  • Computer security (50.27%)
  • Encryption (41.53%)
  • Theoretical computer science (27.32%)

What were the highlights of his more recent work (between 2017-2021)?

  • Encryption (41.53%)
  • Computer security (50.27%)
  • Homomorphic encryption (6.01%)

In recent papers he was focusing on the following fields of study:

Sherman S. M. Chow spends much of his time researching Encryption, Computer security, Homomorphic encryption, Cloud computing and Server. Sherman S. M. Chow studies Encryption, focusing on Ciphertext in particular. The concepts of his Computer security study are interwoven with issues in Construct and Digital signature.

Sherman S. M. Chow combines subjects such as Cryptography and Artificial intelligence with his study of Cloud computing. In general Cryptography study, his work on Secret sharing often relates to the realm of Throughput, thereby connecting several areas of interest. Sherman S. M. Chow has researched Server in several fields, including Data mining, Skyline, Database, Image retrieval and Symmetric-key algorithm.

Between 2017 and 2021, his most popular works were:

  • Searchable Encryption over Feature-Rich Data (81 citations)
  • Multi-authority fine-grained access control with accountability and its application in cloud (71 citations)
  • Outsourced Biometric Identification With Privacy (13 citations)

In his most recent research, the most cited papers focused on:

  • Cryptography
  • Operating system
  • Computer network

His primary areas of investigation include Computer security, Encryption, Blockchain, Homomorphic encryption and Access control. He has included themes like Construct and Digital signature in his Computer security study. His research related to Multiple encryption, On-the-fly encryption, Filesystem-level encryption, Link encryption and Client-side encryption might be considered part of Encryption.

His Blockchain study also includes

  • Cryptocurrency, which have a strong connection to Smart contract, Position paper and Computer network,
  • Database transaction, which have a strong connection to Scalability. His Homomorphic encryption research includes themes of Biometrics, Data mining, Identification and Server. His Access control study incorporates themes from Password, Data security, End user and Vulnerability.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Privacy-Preserving Public Auditing for Secure Cloud Storage

Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)

1838 Citations

Improving privacy and security in multi-authority attribute-based encryption

Melissa Chase;Sherman S.M. Chow.
computer and communications security (2009)

1114 Citations

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

Cheng-Kang Chu;Sherman S. M. Chow;Wen-Guey Tzeng;Jianying Zhou.
IEEE Transactions on Parallel and Distributed Systems (2014)

430 Citations

Efficient unidirectional proxy re-encryption

Sherman S. M. Chow;Jian Weng;Yanjiang Yang;Robert H. Deng.
international conference on cryptology in africa (2010)

388 Citations

Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity

Sherman S. M. Chow;Siu-Ming Yiu;Lucas Chi Kwong Hui;K. P. Chow.
international conference on information security and cryptology (2003)

291 Citations

Real Traceable Signatures

Sherman S. Chow.
selected areas in cryptography (2009)

282 Citations

Storing Shared Data on the Cloud via Security-Mediator

Boyang Wang;Sherman S. M. Chow;Ming Li;Hui Li.
international conference on distributed computing systems (2013)

245 Citations

Efficient identity based ring signature

Sherman S. M. Chow;Siu-Ming Yiu;Lucas C. K. Hui.
applied cryptography and network security (2005)

231 Citations

SPICE: simple privacy-preserving identity-management for cloud environment

Sherman S. M. Chow;Yi-Jun He;Lucas C. K. Hui;Siu Ming Yiu.
applied cryptography and network security (2012)

222 Citations

Optimal Sybil-resilient node admission control

Nguyen Tran;Jinyang Li;Lakshminarayanan Subramanian;Sherman S.M. Chow.
international conference on computer communications (2011)

221 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Sherman S. M. Chow

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 105

Yi Mu

Yi Mu

Fujian Normal University

Publications: 76

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 58

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 56

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 42

Qianhong Wu

Qianhong Wu

Beihang University

Publications: 38

C.Pandu Rangan

C.Pandu Rangan

Indian Institute of Technology Madras

Publications: 38

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 37

Kim-Kwang Raymond Choo

Kim-Kwang Raymond Choo

The University of Texas at San Antonio

Publications: 33

Zhenfu Cao

Zhenfu Cao

East China Normal University

Publications: 33

Duncan S. Wong

Duncan S. Wong

City University of Hong Kong

Publications: 31

Xinyi Huang

Xinyi Huang

Fujian Normal University

Publications: 29

Jianfeng Ma

Jianfeng Ma

Xidian University

Publications: 28

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 27

Brent Waters

Brent Waters

The University of Texas at Austin

Publications: 26

Cong Wang

Cong Wang

City University of Hong Kong

Publications: 25

Trending Scientists

Bao-Qiang Liao

Bao-Qiang Liao

Lakehead University

Johannes Neugebauer

Johannes Neugebauer

University of Münster

Donald E Ellis

Donald E Ellis

Northwestern University

Dyann F. Wirth

Dyann F. Wirth

Harvard University

Cheol-Hee Kim

Cheol-Hee Kim

Chungnam National University

Isabella Screpanti

Isabella Screpanti

Sapienza University of Rome

Bruce E. Anderson

Bruce E. Anderson

Langley Research Center

Fabrice Bartolomei

Fabrice Bartolomei

Aix-Marseille University

Emiliano Santarnecchi

Emiliano Santarnecchi

Beth Israel Deaconess Medical Center

Cheryl B. McNeil

Cheryl B. McNeil

West Virginia University

Sergio Stagno

Sergio Stagno

University of Alabama at Birmingham

Renato Pasquali

Renato Pasquali

University of Bologna

Ding-Shinn Chen

Ding-Shinn Chen

National Taiwan University

Martin Oliver

Martin Oliver

University College London

Lorin M. Hitt

Lorin M. Hitt

University of Pennsylvania

Julia Lane

Julia Lane

New York University

Something went wrong. Please try again later.