Revocable identity-based encryption from lattices J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
137 2012 Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
116 2013 Shorter IBE and signatures via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
103 2013 HAtt: Hybrid remote attestation for the Internet of Things with high availability MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal 7 (8), 7220-7233, 2020
79 2020 Identity-based cryptography for grid security HW Lim, KG Paterson
International Journal of Information Security 10, 15-32, 2011
79 2011 On Identity-Based Cryptography and Grid Computing HW Lim, MJB Robshaw
Computational Science-ICCS 2004: 4th International Conference, Kraków …, 2004
70 2004 A Dynamic Key Infrastructure for Grid HW Lim, MJB Robshaw
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
55 2005 Combined public-key schemes: The case of ABE and ABS C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
53 2012 Distributed searchable symmetric encryption C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
42 2014 On the application of identity-based cryptography in grid security HW Lim
University of London, 2006
42 2006 What can identity-based cryptography offer to web services? J Crampton, HW Lim, KG Paterson
Proceedings of the 2007 ACM workshop on Secure web services, 26-36, 2007
41 2007 Cross-domain password-based authenticated key exchange revisited L Chen, HW Lim, G Yang
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014
31 2014 Privacy-preserving billing for e-ticketing systems in public transportation F Kerschbaum, HW Lim, I Gudymenko
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
28 2013 User-friendly grid security architecture and protocols L Chen, HW Lim, W Mao
Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007
27 2007 Data integrity threats and countermeasures in railway spot transmission systems HW Lim, WG Temple, BAN Tran, B Chen, Z Kalbarczyk, J Zhou
ACM Transactions on Cyber-Physical Systems 4 (1), 1-26, 2019
25 2019 : Privacy-Preserving Integration and Sharing of DatasetsHW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
25 2019 Workflow signatures for business process compliance HW Lim, F Kerschbaum, H Wang
IEEE Transactions on Dependable and Secure Computing 9 (5), 756-769, 2012
22 2012 A certificate-free grid security infrastructure supporting password-based user authentication J Crampton, HW Lim, KG Paterson, G Price
Proceedings of the 6th Annual PKI R&D Workshop, 103-118, 2007
22 2007 Shorter identity-based encryption via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73, 911-947, 2014
20 2014 A survey of privacy-preserving techniques for encrypted traffic inspection over network middleboxes GS Poh, DM Divakaran, HW Lim, J Ning, A Desai
arXiv preprint arXiv:2101.04338, 2021
19 2021