Sherman S. M. Chow focuses on Computer security, Encryption, Ciphertext, Random oracle and Ring signature. His work in Computer security addresses subjects such as Cloud computing, which are connected to disciplines such as Information privacy. Sherman S. M. Chow interconnects Proxy and Access control in the investigation of issues within Encryption.
His research integrates issues of Signcryption and Semantic security in his study of Ciphertext. The Ring signature study combines topics in areas such as Theoretical computer science and Schnorr signature. In Cryptography, Sherman S. M. Chow works on issues like Verifiable secret sharing, which are connected to Client-side.
Sherman S. M. Chow mainly focuses on Computer security, Encryption, Theoretical computer science, Cryptography and Random oracle. In the field of Computer security, his study on Public-key cryptography, Anonymity and Cryptosystem overlaps with subjects such as Signature. His study focuses on the intersection of Theoretical computer science and fields such as Key with connections in the field of Protocol.
His work carried out in the field of Cryptography brings together such families of science as Distributed computing, Cloud computing, Verifiable secret sharing and Certificateless cryptography. His research on Cloud computing also deals with topics like
Sherman S. M. Chow spends much of his time researching Encryption, Computer security, Homomorphic encryption, Cloud computing and Server. Sherman S. M. Chow studies Encryption, focusing on Ciphertext in particular. The concepts of his Computer security study are interwoven with issues in Construct and Digital signature.
Sherman S. M. Chow combines subjects such as Cryptography and Artificial intelligence with his study of Cloud computing. In general Cryptography study, his work on Secret sharing often relates to the realm of Throughput, thereby connecting several areas of interest. Sherman S. M. Chow has researched Server in several fields, including Data mining, Skyline, Database, Image retrieval and Symmetric-key algorithm.
His primary areas of investigation include Computer security, Encryption, Blockchain, Homomorphic encryption and Access control. He has included themes like Construct and Digital signature in his Computer security study. His research related to Multiple encryption, On-the-fly encryption, Filesystem-level encryption, Link encryption and Client-side encryption might be considered part of Encryption.
His Blockchain study also includes
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Cong Wang;S. S. M. Chow;Qian Wang;Kui Ren.
IEEE Transactions on Computers (2013)
Improving privacy and security in multi-authority attribute-based encryption
Melissa Chase;Sherman S.M. Chow.
computer and communications security (2009)
Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
Cheng-Kang Chu;Sherman S. M. Chow;Wen-Guey Tzeng;Jianying Zhou.
IEEE Transactions on Parallel and Distributed Systems (2014)
Efficient unidirectional proxy re-encryption
Sherman S. M. Chow;Jian Weng;Yanjiang Yang;Robert H. Deng.
international conference on cryptology in africa (2010)
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity
Sherman S. M. Chow;Siu-Ming Yiu;Lucas Chi Kwong Hui;K. P. Chow.
international conference on information security and cryptology (2003)
Real Traceable Signatures
Sherman S. Chow.
selected areas in cryptography (2009)
Storing Shared Data on the Cloud via Security-Mediator
Boyang Wang;Sherman S. M. Chow;Ming Li;Hui Li.
international conference on distributed computing systems (2013)
Efficient identity based ring signature
Sherman S. M. Chow;Siu-Ming Yiu;Lucas C. K. Hui.
applied cryptography and network security (2005)
SPICE: simple privacy-preserving identity-management for cloud environment
Sherman S. M. Chow;Yi-Jun He;Lucas C. K. Hui;Siu Ming Yiu.
applied cryptography and network security (2012)
Optimal Sybil-resilient node admission control
Nguyen Tran;Jinyang Li;Lakshminarayanan Subramanian;Sherman S.M. Chow.
international conference on computer communications (2011)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: