Остановите войну!
for scientists:
default search action
Swee-Huay Heng
- > Home > Persons > Swee-Huay Heng
Publications
- 2018
- [j28]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Commun. 12(10): 1230-1235 (2018) - 2016
- [j26]Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi, Wei-Chuen Yau, Swee-Huay Heng:
On the effective subkey space of some image encryption algorithms using external key. J. Vis. Commun. Image Represent. 40: 51-57 (2016) - 2013
- [j16]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12): 2581-2587 (2013) - [j14]Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 7(4): 910-922 (2013) - 2012
- [j12]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Security models for delegated keyword searching within encrypted contents. J. Internet Serv. Appl. 3(2): 233-241 (2012) - [j10]Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Swee-Huay Heng:
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Secur. Commun. Networks 5(12): 1312-1324 (2012) - [j9]Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi, Raphael C.-W. Phan:
Efficient encryption with keyword search in mobile networks. Secur. Commun. Networks 5(12): 1412-1422 (2012) - 2011
- [c31]Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng:
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. CANS 2011: 172-184 - [c29]Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Bok-Min Goi:
A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction. FGIT 2011: 361-370 - [c28]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
On the Security of Two Fuzzy Identity-Based Signature Schemes. NTMS 2011: 1-5 - 2010
- [c26]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. FGIT-SecTech/DRBC 2010: 149-160 - [c25]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
Java Implementation for Pairing-Based Cryptosystems. ICCSA (4) 2010: 188-198 - [e2]Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi:
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6467, Springer 2010, ISBN 978-3-642-17618-0 [contents] - 2009
- [j7]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attack on a semi-blind watermarking scheme based on singular value decomposition. Comput. Stand. Interfaces 31(2): 523-525 (2009) - [c23]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
Hierarchical Identity-Based Identification Schemes. FGIT-SecTech 2009: 93-99 - [c22]Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi:
Attacks on a Block Based SVD Watermarking Scheme. ITNG 2009: 371-375 - 2008
- [j6]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attacks on a robust watermarking scheme based on self-reference image. Comput. Stand. Interfaces 30(1-2): 32-35 (2008) - [c20]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
On the Security of an Identity-Based Aggregate Signature Scheme. AINA Workshops 2008: 1523-1528 - [c19]Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi:
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. ATC 2008: 100-105 - [c18]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. EuroPKI 2008: 60-73 - 2007
- [c16]Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. ACNS 2007: 459-477 - [c15]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. ICCSA (1) 2007: 644-654 - [c12]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. WISTP 2007: 115-126 - 2006
- [c11]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
An Efficient Certificateless Signature Scheme. EUC Workshops 2006: 322-331
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 02:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint