Year | Title |
---|---|
2021 |
Published In
IEEE Transactions on Industrial Informatics
|
2021 |
Published In
Computer Standards and Interfaces
|
2021 |
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2020 |
Published In
Computer Journal
|
2020 |
Published In
Journal of Information Security and Applications
|
2020 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2020 |
Published In
IEEE Transactions on Emerging Topics in Computing
|
2020 |
Published In
IEEE Access
|
2020 |
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020 |
Published In
IEEE Transactions on Services Computing
|
2020 |
Published In
Information Sciences
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2019 |
Published In
IEEE Transactions on Industrial Informatics
|
2019 |
Published In
Gerontologist
|
2019 |
Published In
Journal of Computer Security
|
2019 |
Published In
Information Sciences
|
2019 |
Published In
IEEE Internet of Things Journal
|
2019 |
Published In
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
|
2019 |
Published In
Information Sciences
|
2019 |
Published In
Lecture Notes in Computer Science
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019 |
Published In
IEEE Access
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019 |
Published In
Information Sciences
|
2019 |
Published In
Designs, Codes and Cryptography
|
2019 |
Published In
Lecture Notes in Computer Science
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
Journal of Computer Science and Technology
|
2018 |
Published In
IEEE Access
|
2018 |
Published In
The Computer Journal
|
2018 |
Published In
Lecture Notes in Computer Science
|
2018 |
Published In
Information Sciences
|
2018 |
Published In
Symmetry
|
2018 |
Published In
The Computer Journal
|
2018 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
IEEE Transactions on Dependable and Secure Computing
|
2018 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
Lecture Notes in Computer Science
|
2018 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2018 |
Published In
IEEE Transactions on Dependable and Secure Computing
|
2018 |
Published In
IEEE Transactions on Information Forensics and Security
|
2018 |
Published In
Cluster Computing
|
2018 |
Published In
Wireless Communications and Mobile Computing
|
2017 |
Published In
International Journal of Computer Mathematics
|
2017 |
Published In
International Journal of Applied Cryptography
|
2017 |
Published In
Designs, Codes and Cryptography
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2017 |
Published In
Wireless Personal Communications: an international journal
|
2017 |
Published In
Telecommunication Systems
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
International Journal of Foundations of Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2017 |
Published In
Sensors
|
2017 |
Published In
Journal of Information Security and Applications
|
2017 |
Published In
Designs, Codes and Cryptography
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
The Computer Journal
|
2016 |
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
IEEE Transactions on Wireless Communications
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
Security and Communication Networks
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2015 |
Published In
Information
|
2015 |
Published In
Theoretical Computer Science
|
2015 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
Wireless Personal Communications: an international journal
|
2015 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
IEEE Transactions on Information Forensics and Security
|
2015 |
Published In
The Computer Journal
|
2014 |
Published In
Concurrency and Computation: Practice and Experience
|
2014 |
Published In
IEEE Transactions on Information Forensics and Security
|
2014 |
Published In
Security and Communication Networks
|
2014 |
Published In
Lecture Notes in Computer Science
|
2014 |
Published In
Lecture Notes in Computer Science
|
2014 |
Published In
ACM Transactions on Information and System Security
|
2014 |
Published In
Lecture Notes in Computer Science
|
2014 |
Published In
Theoretical Computer Science
|
2014 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
Wireless Personal Communications: an international journal
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
International Journal of Information Security
|
2011 |
Published In
Theoretical Computer Science
|
2011 |
Published In
Theoretical Computer Science
|
2011 |
Published In
IEEE Transactions on Wireless Communications
|
2011 |
Published In
International Journal of Information Security
|
2011 |
Published In
The Computer Journal
|
2011 |
Published In
Journal of Systems and Software
|
2010 |
Published In
IEEE Transactions on Information Theory
|
2010 |
Published In
IEEE Transactions on Wireless Communications
|
2009 |
Published In
Lecture Notes in Computer Science
|
2008 |
Published In
Theoretical Computer Science
|
2008 |
Published In
Journal of Universal Computer Science
|
2008 |
Published In
Journal of Computer and System Sciences
|
2007 |
Published In
Theoretical Computer Science
|
2007 |
Published In
IEEE Transactions on Wireless Communications
|
Year | Title |
---|---|
2010 |
Published In
Topics in Cryptology - CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
Publisher
Germany
|
Year | Title |
---|---|
2019 |
Published In
2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings
|
2019 |
Published In
Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019
|
2017 |
Published In
14th International Conference on Cooperative Design
|
2017 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2016 |
Published In
International Conference on the Theory and Application of Cryptology and Information Security
|
2016 |
Published In
22nd International Conference on the Theory and Application of Cryptology and Information Security
|
2016 |
Published In
ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
|
2016 |
Published In
Topics in Cryptology - CT-RSA 2016
|
2015 |
Published In
Information Security and Privacy: Proceedings of the 20th Australasian Conference, ACISP 2015
|
2015 |
Published In
20th European Symposium On Research In Computer Security: ESORICS 2015
|
2014 |
Published In
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
|
2014 |
Published In
ACM CCS 2014
|
2014 |
Published In
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security Wrocław, Poland, September 7-11, 2014 Proceedings, Part I
|
2013 |
Published In
Proceedings - IEEE INFOCOM
|
2011 |
Published In
Financial Cryptography and Data Security Conference: 15th International Conference
|
2011 |
Published In
ACM Symposium on Information, Computer and Communications Security
|
2008 |
Published In
International Conference on the Theory and Application of Cryptology and Information Security
|
2008 |
Published In
RSA Conference 2008, Cryptographers' Track (CT-RSA 2008)
|
2008 |
Published In
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008
|
2007 |
Published In
4th European PKI Workshop: Theory and Practice, EuroPKI 2007
|
2007 |
Published In
Proceedings of the 2nd ACM symposium on Information, computer and communications security
|
Year | Title |
---|---|
2020 - 2023 | Awarded by: Funding Scheme: Discovery Projects |
2018 - 2019 | Awarded by: Funding Scheme: Pilot Grants |
2016 - 2019 | Funding Scheme: Measurement Science and Engineering (MSE) Research Grant Programs |
2015 - 2018 | Awarded by: Funding Scheme: Discovery Early Career Researcher Award (DECRA) |
Degree | Research Title | Advisee | |
---|---|---|---|
Doctor of Philosophy | Lattice-based Cryptography: Expanding the Design Space | Sipasseuth, Arnaud | |
Doctor of Philosophy | Searchable Encryption Technology | Liu, Xueqiao | |
Doctor of Philosophy | Contributions to Blockchain-based Security Protocols | Li, Yannan | |
Doctor of Philosophy | Attribute-based encryption secure against malicious senders | Loh, Jason |
Year | Title |
---|---|
2021 |
Published In
IEEE Transactions on Industrial Informatics
|
2021 |
Published In
Computer Standards and Interfaces
|
2021 |
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2020 |
Published In
Computer Journal
|
2020 |
Published In
Journal of Information Security and Applications
|
2020 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2020 |
Published In
IEEE Transactions on Emerging Topics in Computing
|
2020 |
Published In
IEEE Access
|
2020 |
Published In
IEEE Transactions on Dependable and Secure Computing
|
2020 |
Published In
IEEE Transactions on Services Computing
|
2020 |
Published In
Information Sciences
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2019 |
Published In
IEEE Transactions on Industrial Informatics
|
2019 |
Published In
Gerontologist
|
2019 |
Published In
Journal of Computer Security
|
2019 |
Published In
Information Sciences
|
2019 |
Published In
IEEE Internet of Things Journal
|
2019 |
Published In
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
|
2019 |
Published In
Information Sciences
|
2019 |
Published In
Lecture Notes in Computer Science
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019 |
Published In
IEEE Access
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2019 |
Published In
Information Sciences
|
2019 |
Published In
Designs, Codes and Cryptography
|
2019 |
Published In
Lecture Notes in Computer Science
|
2019 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
Journal of Computer Science and Technology
|
2018 |
Published In
IEEE Access
|
2018 |
Published In
The Computer Journal
|
2018 |
Published In
Lecture Notes in Computer Science
|
2018 |
Published In
Information Sciences
|
2018 |
Published In
Symmetry
|
2018 |
Published In
The Computer Journal
|
2018 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
IEEE Transactions on Dependable and Secure Computing
|
2018 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2018 |
Published In
Lecture Notes in Computer Science
|
2018 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2018 |
Published In
IEEE Transactions on Dependable and Secure Computing
|
2018 |
Published In
IEEE Transactions on Information Forensics and Security
|
2018 |
Published In
Cluster Computing
|
2018 |
Published In
Wireless Communications and Mobile Computing
|
2017 |
Published In
International Journal of Computer Mathematics
|
2017 |
Published In
International Journal of Applied Cryptography
|
2017 |
Published In
Designs, Codes and Cryptography
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2017 |
Published In
Wireless Personal Communications: an international journal
|
2017 |
Published In
Telecommunication Systems
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
International Journal of Foundations of Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science
|
2017 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2017 |
Published In
Sensors
|
2017 |
Published In
Journal of Information Security and Applications
|
2017 |
Published In
Designs, Codes and Cryptography
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
The Computer Journal
|
2016 |
Published In
IEEE Transactions on Parallel and Distributed Systems
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
IEEE Transactions on Wireless Communications
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
Security and Communication Networks
|
2016 |
Published In
Lecture Notes in Computer Science
|
2016 |
Published In
IEEE Transactions on Information Forensics and Security
|
2016 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2015 |
Published In
Information
|
2015 |
Published In
Theoretical Computer Science
|
2015 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
Wireless Personal Communications: an international journal
|
2015 |
Published In
Lecture Notes in Computer Science
|
2015 |
Published In
IEEE Transactions on Information Forensics and Security
|
2015 |
Published In
The Computer Journal
|
2014 |
Published In
Concurrency and Computation: Practice and Experience
|
2014 |
Published In
IEEE Transactions on Information Forensics and Security
|
2014 |
Published In
Security and Communication Networks
|
2014 |
Published In
Lecture Notes in Computer Science
|
2014 |
Published In
Lecture Notes in Computer Science
|
2014 |
Published In
ACM Transactions on Information and System Security
|
2014 |
Published In
Lecture Notes in Computer Science
|
2014 |
Published In
Theoretical Computer Science
|
2014 |
Published In
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
Wireless Personal Communications: an international journal
|
2013 |
Published In
Lecture Notes in Computer Science
|
2013 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
Lecture Notes in Computer Science
|
2012 |
Published In
International Journal of Information Security
|
2011 |
Published In
Theoretical Computer Science
|
2011 |
Published In
Theoretical Computer Science
|
2011 |
Published In
IEEE Transactions on Wireless Communications
|
2011 |
Published In
International Journal of Information Security
|
2011 |
Published In
The Computer Journal
|
2011 |
Published In
Journal of Systems and Software
|
2010 |
Published In
IEEE Transactions on Information Theory
|
2010 |
Published In
IEEE Transactions on Wireless Communications
|
2009 |
Published In
Lecture Notes in Computer Science
|
2008 |
Published In
Theoretical Computer Science
|
2008 |
Published In
Journal of Universal Computer Science
|
2008 |
Published In
Journal of Computer and System Sciences
|
2007 |
Published In
Theoretical Computer Science
|
2007 |
Published In
IEEE Transactions on Wireless Communications
|
Year | Title |
---|---|
2010 |
Published In
Topics in Cryptology - CT-RSA 2010: The Cryptographers’ Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
Publisher
Germany
|
Year | Title |
---|---|
2019 |
Published In
2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings
|
2019 |
Published In
Proceedings - 4th IEEE European Symposium on Security and Privacy, EURO S and P 2019
|
2017 |
Published In
14th International Conference on Cooperative Design
|
2017 |
Published In
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
|
2016 |
Published In
International Conference on the Theory and Application of Cryptology and Information Security
|
2016 |
Published In
22nd International Conference on the Theory and Application of Cryptology and Information Security
|
2016 |
Published In
ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
|
2016 |
Published In
Topics in Cryptology - CT-RSA 2016
|
2015 |
Published In
Information Security and Privacy: Proceedings of the 20th Australasian Conference, ACISP 2015
|
2015 |
Published In
20th European Symposium On Research In Computer Security: ESORICS 2015
|
2014 |
Published In
2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014
|
2014 |
Published In
ACM CCS 2014
|
2014 |
Published In
Computer Security - ESORICS 2014 19th European Symposium on Research in Computer Security Wrocław, Poland, September 7-11, 2014 Proceedings, Part I
|
2013 |
Published In
Proceedings - IEEE INFOCOM
|
2011 |
Published In
Financial Cryptography and Data Security Conference: 15th International Conference
|
2011 |
Published In
ACM Symposium on Information, Computer and Communications Security
|
2008 |
Published In
International Conference on the Theory and Application of Cryptology and Information Security
|
2008 |
Published In
RSA Conference 2008, Cryptographers' Track (CT-RSA 2008)
|
2008 |
Published In
Applied Cryptography and Network Security, 6th International Conference, ACNS 2008
|
2007 |
Published In
4th European PKI Workshop: Theory and Practice, EuroPKI 2007
|
2007 |
Published In
Proceedings of the 2nd ACM symposium on Information, computer and communications security
|
Year | Title |
---|---|
2020 - 2023 | Awarded by: Funding Scheme: Discovery Projects |
2018 - 2019 | Awarded by: Funding Scheme: Pilot Grants |
2016 - 2019 | Funding Scheme: Measurement Science and Engineering (MSE) Research Grant Programs |
2015 - 2018 | Awarded by: Funding Scheme: Discovery Early Career Researcher Award (DECRA) |
Degree | Research Title | Advisee | |
---|---|---|---|
Doctor of Philosophy | Lattice-based Cryptography: Expanding the Design Space | Sipasseuth, Arnaud | |
Doctor of Philosophy | Searchable Encryption Technology | Liu, Xueqiao | |
Doctor of Philosophy | Contributions to Blockchain-based Security Protocols | Li, Yannan | |
Doctor of Philosophy | Attribute-based encryption secure against malicious senders | Loh, Jason |