default search action
Search dblp for Publications
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 227 matches
- 2025
- Weihan Li, Zongyang Zhang, Yanpei Guo, Sherman S. M. Chow, Zhiguo Wan:
Succinct Hash-Based Arbitrary-Range Proofs. IEEE Trans. Inf. Forensics Secur. 20: 145-158 (2025) - 2024
- Tsz Hon Yuen, Sherman S. M. Chow, Huangting Wu, Cong Zhang, Siu-Ming Yiu:
Exponent-Inversion P-Signatures and Accountable Identity-Based Encryption from SXDH. IACR Commun. Cryptol. 1(3): 48 (2024) - Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow:
Distributionally Robust Degree Optimization for BATS Codes. ISIT 2024: 1315-1320 - Jiafan Wang, Sherman S. M. Chow:
Unus pro omnibus: Multi-Client Searchable Encryption via Access Control. NDSS 2024 - Harry W. H. Wong, Jack P. K. Ma, Sherman S. M. Chow:
Secure Multiparty Computation of Threshold Signatures Made More Efficient. NDSS 2024 - Zongyang Zhang, Weihan Li, Yanpei Guo, Kexin Shi, Sherman S. M. Chow, Ximeng Liu, Jin Dong:
Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing. USENIX Security Symposium 2024 - Hoover H. F. Yin, Jie Wang, Sherman S. M. Chow:
Distributionally Robust Degree Optimization for BATS Codes. CoRR abs/2405.08194 (2024) - 2023
- Minxin Du, Peipei Jiang, Qian Wang, Sherman S. M. Chow, Lingchen Zhao:
Shielding Graph for eXact Analytics With SGX. IEEE Trans. Dependable Secur. Comput. 20(6): 5102-5112 (2023) - Sherman S. M. Chow, Jack P. K. Ma, Tsz Hon Yuen:
Scored Anonymous Credentials. ACNS 2023: 484-515 - Huangting Wu, Sherman S. M. Chow:
Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions. ACNS 2023: 366-395 - Yu Zheng, Qizhi Zhang, Sherman S. M. Chow, Yuxiang Peng, Sijun Tan, Lichun Li, Shan Yin:
Secure Softmax/Sigmoid for Machine-learning Computation. ACSAC 2023: 463-476 - Yu Zheng, Wei Song, Minxin Du, Sherman S. M. Chow, Qian Lou, Yongjun Zhao, Xiuhua Wang:
Cryptography-Inspired Federated Learning for Generative Adversarial Networks and Meta Learning. ADMA (2) 2023: 393-407 - Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. CCS 2023: 2665-2679 - Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-Based Anonymous Systems. CSF 2023: 568-583 - Jack P. K. Ma, Sherman S. M. Chow:
SMART Credentials in the Multi-queue of Slackness (or Secure Management of Anonymous Reputation Traits without Global Halting). EuroS&P 2023: 896-912 - Shuyang Tang, Sherman S. M. Chow:
Towards Decentralized Adaptive Control of Cryptocurrency Liquidity via Auction. ICDCS 2023: 910-919 - Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. ISIT 2023: 648-653 - Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
Real Threshold ECDSA. NDSS 2023 - Harry W. H. Wong, Jack P. K. Ma, Hoover H. F. Yin, Sherman S. M. Chow:
How (Not) to Build Threshold EdDSA. RAID 2023: 123-134 - Lucien K. L. Ng, Sherman S. M. Chow:
SoK: Cryptographic Neural-Network Computation. SP 2023: 497-514 - Minxin Du, Xiang Yue, Sherman S. M. Chow, Huan Sun:
Sanitizing Sentence Embeddings (and Labels) for Local Differential Privacy. WWW 2023: 2349-2359 - Cheuk Ting Li, Sherman S. M. Chow:
Unconditionally Secure Access Control Encryption. CoRR abs/2305.07593 (2023) - Minxin Du, Xiang Yue, Sherman S. M. Chow, Tianhao Wang, Chenyu Huang, Huan Sun:
DP-Forward: Fine-tuning and Inference on Language Models with Differential Privacy in Forward Pass. CoRR abs/2309.06746 (2023) - Sherman S. M. Chow, Christoph Egger, Russell W. F. Lai, Viktoria Ronge, Ivy K. Y. Woo:
On Sustainable Ring-based Anonymous Systems. IACR Cryptol. ePrint Arch. 2023: 743 (2023) - 2022
- Yu Chen, Baodong Qin, Jiang Zhang, Yi Deng, Sherman S. M. Chow:
Non-Malleable Functions and their Applications. J. Cryptol. 35(2): 11 (2022) - Jiafan Wang, Sherman S. M. Chow:
Forward and Backward-Secure Range-Searchable Symmetric Encryption. Proc. Priv. Enhancing Technol. 2022(1): 28-48 (2022) - Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Chao Shen, Qian Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. IEEE Trans. Dependable Secur. Comput. 19(3): 1592-1604 (2022) - Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow:
Don't Tamper with Dual System Encryption - Beyond Polynomial Related-Key Security of IBE. ACNS 2022: 419-439 - Jack P. K. Ma, Sherman S. M. Chow:
Secure-Computation-Friendly Private Set Intersection from Oblivious Compact Graph Evaluation. AsiaCCS 2022: 1086-1097 - Jiafan Wang, Sherman S. M. Chow:
Omnes pro uno: Practical Multi-Writer Encrypted Database. USENIX Security Symposium 2022: 2371-2388
skipping 197 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-01-23 20:03 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint