Követés
Swee-Huay Heng
Swee-Huay Heng
E-mail megerősítve itt: mmu.edu.my
Cím
Hivatkozott rá
Hivatkozott rá
Év
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
International conference on autonomic and trusted computing, 100-105, 2008
1812008
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
1732006
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
1232004
3-move undeniable signature scheme
K Kurosawa, SH Heng
Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005
822005
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
802013
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
WS Yap, RCW Phan, WC Yau, SH Heng
Nonlinear Dynamics 80 (3), 1483-1491, 2015
782015
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
672010
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
662015
Proxy re-encryption with keyword search: New definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity …, 2010
582010
Identity-based identification without random oracles
K Kurosawa, SH Heng
Computational Science and Its Applications–ICCSA 2005: International …, 2005
572005
The security of the FDH variant of Chaum’s undeniable signature scheme
W Ogata, K Kurosawa, SH Heng
Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005
562005
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
Applied Cryptography and Network Security: 5th International Conference …, 2007
552007
k-Resilient Identity-Based Encryption in the Standard Model
SH Heng, K Kurosawa
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
542004
The power of identification schemes
K Kurosawa, SH Heng
Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006
422006
On the security of ownership watermarking of digital images based on singular value decomposition
HC Ling, RCW Phan, SH Heng
Journal of Electronic Imaging 20 (1), 0105011-0105012, 2011
41*2011
A review of cryptographic electronic voting
YX Kho, SH Heng, JJ Chin
Symmetry 14 (5), 858, 2022
342022
Comment on “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition”
HC Ling, RCW Phan, SH Heng
AEU-International Journal of Electronics and Communications 67 (10), 894-897, 2013
302013
The security of the FDH variant of Chaum's undeniable signature scheme
W Ogata, K Kurosawa, SH Heng
IEEE Transactions on Information Theory 52 (5), 2006
302006
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks
GY Chan, CS Lee, SH Heng
Journal of Network and Computer Applications 36 (2), 829-842, 2013
282013
On the security of a hybrid watermarking algorithm based on singular value decomposition and Radon transform
HC Ling, RCW Phan, SH Heng
AEU-International Journal of Electronics and Communications 65 (11), 958-960, 2011
282011
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20