Items where Author is "Heng, Swee-Huay"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 26.

Article

Lai, Jian-Foo and Heng, Swee-Huay (2022) Secure File Storage On Cloud Using Hybrid Cryptography. Journal of Informatics and Web Engineering, 1 (2). pp. 1-18. ISSN 2821-370X

Yap, Wun-She and Yeo, Sze Ling and Heng, Swee-Huay and Henricksen, Matt (2014) Parallelizable MAC revisited. Security and Communication Networks, 7 (7). pp. 1115-1127. ISSN 1939-0122

Heng, Swee-Huay and Lu, Jiqiang and Yap, Wun-She and Henricksen, Matt (2014) Differential attack on nine rounds of the SEED block cipher. Information Processing Letters, 114 (3). pp. 116-123. ISSN 0020-0190

Ling, Huo-Chong and Phan, Raphael C.-W. and Heng, Swee-Huay (2013) Comment on “Robust blind image watermarking scheme based on Redundant Discrete Wavelet Transform and Singular Value Decomposition”. AEU - International Journal of Electronics and Communications, 67 (10). pp. 894-897. ISSN 1434-8411

Chan, Gaik-Yee and Lee, Chien-Sing and Heng, Swee-Huay (2013) PeANFIS-FARM Framework in defending against Web Service attacks. Advances in Intelligent Systems Research. pp. 108-112. ISSN 1951-6851

Chan, Gaik-Yee and Lee, Chien-Sing and Heng, Swee-Huay (2013) Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. Journal of Network and Computer Applications, 36 (2). pp. 829-842. ISSN 1084-8045

Tan, Syh-Yuan and Jin, Zhe and Teoh, Andrew Beng Jin and Heng, Swee-Huay and Goi, Bok-Min (2012) On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Security and Communication Networks, 5 (12). pp. 1312-1324. ISSN 1939-0122

Chan, Gaik-Yee and Lee, Chien-Sing and Heng, Swee-Huay (2012) Policy-enhanced ANFIS model to counter SOAP-related attacks. Knowledge-Based Systems, 35. pp. 64-76. ISSN 09507051

Yau, Wei-Chuen and Phan, Raphael C.-W. and Heng, Swee-Huay and Goi, Bok-Min (2012) Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. International Journal of Computer Mathematics. pp. 1-7. ISSN 0020-7160

Yau, Wei-Chuen and Phan, Raphael C. -W. and Heng, Swee-Huay and Goi, Bok-Min (2012) Security models for delegated keyword searching within encrypted contents. Journal of Internet Services and Applications, 3 (2). pp. 233-241. ISSN 1867-4828

Ling, Huo-Chong and Phan, Raphael C.-W. and Heng, Swee-Huay (2011) On an optimal robust digital image watermarking based on SVD using differential evolution algorithm. Optics Communications, 284 (19). pp. 4458-4459. ISSN 00304018

Ling, Huo-Chong and Phan, Raphael C.-W. and Heng, Swee-Huay (2011) On the security of a hybrid watermarking algorithm based on singular value decomposition and Radon transform. AEU - International Journal of Electronics and Communications, 65 (11). pp. 958-960. ISSN 1434- 8411

Book Section

Behnia, Rouzbeh and Heng, Swee-Huay and Gan, Che-Sheng (2012) Short and efficient identity-based undeniable signature scheme. In: Trust, Privacy and Security in Digital Business. Lecture Notes in Computer Science (7449). Springer Berlin Heidelberg, pp. 143-148. ISBN 978-3-642-32286-0

Aris, Marjuni and Ahmad Fauzi, Mohammad Faizal and Heng, Swee-Huay and Rajasvaran, Logeswaran (2012) A joint filtering based SVD technique for image de-noising. In: 2012 IEEE Symposium on Computers & Informatics (ISCI). IEEE Xplore, pp. 237-240. ISBN 978-1-4673-1685-9

Yau, Wei-Chuen and Phan, Raphael C. -W. and Goi, Bok-Min and Heng, Swee-Huay (2011) Cryptanalysis of a provably secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement protocol of CANS ’09. In: Cryptology and Network Security. Lecture Notes in Computer Science (7092). Springer Berlin Heidelberg, pp. 172-184. ISBN 978-3-642-25512-0

Ling, Huo-Chong and Phan, Raphael C. -W. and Heng, Swee-Huay (2011) On the security of a hybrid SVD-DCT watermarking method based on LPSNR. In: Advances in Image and Video Technology. Lecture Notes in Computer Science, 7087 (7087). Springer Berlin Heidelberg, pp. 257-266. ISBN 978-3-642-25366-9

Ling, Huo-Chong and Phan, Raphael C. -W. and Heng, Swee-Huay (2011) On the security of a robust watermarking scheme based on RDWT-SVD. In: Future Generation Information Technology. Lecture Notes in Computer Science (7105). Springer Berlin Heidelberg, pp. 249-256. ISBN 978-3-642-27141-0

Tan, Syh-Yuan and Heng, Swee-Huay and Goi, Bok-Min (2011) On the security of two fuzzy identity-based signature schemes. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security. IEEE Xplore, pp. 1-5. ISBN 978-1-4244-8705-9

Tan, Syh-Yuan and Heng, Swee-Huay and Phan, Raphael C. -W. and Goi, Bok-Min (2011) A variant of Schnorr identity-based identification scheme with tight reduction. In: Future Generation Information Technology. Lecture Notes in Computer Science (7105). Springer Berlin Heidelberg, pp. 361-370. ISBN 978-3-642-27141-0

Ling, Huo-Chong and Phan, Raphael C-W. and Heng, Swee-Huay (2010) Analysis on the improved SVD-based watermarking scheme. In: Advances in Computer Science and Information Technology. Lecture Notes in Computer Science (6059). Springer Berlin Heidelberg, pp. 143-149. ISBN 978-3-642-13576-7

Tan, Syh-Yuan and Heng, Swee-Huay and Goi, Bok-Min (2010) Java implementation for pairing-based cryptosystems. In: Computational Science and Its Applications – ICCSA 2010. Lecture Notes in Computer Science (6019). Springer Berlin Heidelberg, pp. 188-198. ISBN 978-3-642-12188-3

Yap, Nvun-She and Chow, Sherman S. M. and Heng, Swee-Huay and Goi, Bok-Min (2007) Security mediated certificateless signatures. In: Applied Cryptography and Network Security. Lecture Notes in Computer Science (4521). Springer Berlin Heidelberg, pp. 459-477. ISBN 978-3-540-72737-8

Yap, Wun-She and Heng, Swee-Huay and Goi, Bok-Min (2007) Cryptanalysis of some proxy signature schemes without certificates. In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. Lecture Notes in Computer Science (4462). Springer Berlin Heidelberg, pp. 115-126. ISBN 978-3-540-72353-0

Heng, Swee-Huay and Yap, Wun-She and Khoo, Khoongming (2007) Linkability of some blind signature schemes. In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems. Lecture Notes in Computer Science (4462). Springer Berlin Heidelberg, pp. 80-89. ISBN 978-3-540-72353-0

Conference or Workshop Item

Ting, Grace C. -W. and Goi, Bok-Min and Heng, Swee-Huay (2007) A fragile watermarking scheme protecting originator's rights for multimedia service. In: International Conference on Computational Science and Its Applications (ICCSA 2007), 26-29 AUG 2007 , Kuala Lumpur, MALAYSIA.

Ling, Huo-Chong and Heng, Swee-Huay and Phan, Raphael C.-W. (2007) Attacks on a Blind Signature-Based Steganographic Protocol of IEEE-WISP 2001. In: 9th International Conference on Advanced Communication Technology (ICACT 2007), FEB 12-14, 2007, Phoenix Pk, SOUTH KOREA.

This list was generated on Sat Dec 21 23:49:49 2024 +08.