Chen, "Anonymous identity-based broadcast encryption with revocation for file sharing," in
ACISP 2016, LNCS 9723, pp.
The Eighth Australasian Conference on Information Security and Privacy (
ACISP '03).
[25] and presented as an invited talk at
ACISP 2017 conference.
In: Information Security and Privacy, 12th Australasian Conference,
ACISP 2007, volume 4586 of LNCS, p.
Chen, "Building secure tame-like multivariate public-key cryptosystems: the new TTS," in Proceedings of the Australasian Conference on Information Security and Privacy (
ACISP 2005), pp.
Wu, "Certificateless signature revisited," in Proceedings of the 12th Australasian Conference on Information Security and Privacy (
ACISP '07), pp.
Schuldt, "Efficient identity-based signatures secure in the standard model," in Proceedings of the
ACISP 2006, vol.
Povey, "PKI seeks a trusting relationship," in Information Security and Privacy: 5th Australasian Conference,
ACISP 2000, Brisbane, Australia, July 10-12, 2000.
McAven, "Cancelable key-based fingerprint templates," in Proceedings of the 10th Australasian Conference on Information Security and Privacy,
ACISP 2005, pp.