Items where Author is "Heng, Swee Huay"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 55.

Tan, Syh Yuan and Heng, Swee Huay (2024) Comment on “An efficient identity-based signature scheme with provable security”. Information Sciences, 659. p. 120079. ISSN 0020-0255

Chan, Koon Ming and Heng, Swee Huay and Tan, Syh Yuan and Tan, Shing Chiang (2024) Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”. IEEE Access, 12. pp. 91551-91555. ISSN 2169-3536

Tan, Syh Yuan and Heng, Swee Huay (2024) Efficient Active and Concurrent-Secure ID-Based Identification from Digital Signature. In: 2024 8th International Conference on Cryptography, Security and Privacy (CSP), 20-22 April 2024, Osaka, Japan.

Chan, Koon Ming and Heng, Swee Huay and Tan, Syh Yuan and Tan, Shing Chiang (2024) K-Resilient Public Key Authenticated Encryption with Keyword Search. In: 21st International Conference on Security and Cryptography, 8-10 July 2024, Dijon, France.

Kho, Yun Xing and Heng, Swee Huay and Tan, Syh Yuan and Chin, Ji Jian (2024) Transformation from e-voting to e-cheque. PLOS ONE, 19 (6). e0302659. ISSN 1932-6203

Tan, Syh Yuan and Heng, Swee Huay (2023) New Identity-Based Identification and Signature Schemes in the Standard Model. In: 18th International Conference on Availability, Reliability and Security, ARES 2023, 29 Aug - 1 Sep 2023, Benevento, Italy.

Hamidey, Mohammad Hadiff and Heng, Swee Huay (2023) A Blockchain-Based E-Voting System. Lecture Notes in Electrical Engineering, 983. pp. 553-567. ISSN 1876-1100

Chan, Jun Wen and Heng, Swee Huay and Tan, Syh Yuan (2023) Secure Data Sharing in a Cyber-Physical Cloud Environment. Journal of Telecommunications and the Digital Economy, 11 (4). pp. 94-112. ISSN 2203-1693

Chan, Koon Ming and Heng, Swee Huay and Tan, Shing Chiang (2022) Design And Analysis of Searchable Encryption. In: Postgraduate Colloquium December 2022, 1-15 December 2022, Multimedia University, Malaysia. (Unpublished)

Koa, Chong Gee and Heng, Swee Huay and Chin, Ji Jian (2022) ETHERST: A New Blockchain Based PKI. In: Postgraduate Colloquium December 2022, 1-15 December 2022, Multimedia University, Malaysia. (Unpublished)

Dwiputriane, Daphne Bunga and Heng, Swee Huay (2022) Authentication for 5G Mobile Wireless Networks. Journal of Engineering Technology and Applied Physics, 4 (1). pp. 16-24. ISSN 2682-8383

How, Haw Bin and Heng, Swee Huay (2022) Blockchain-Enabled Searchable Encryption in Clouds: A Review. Journal of Information Security and Applications, 67. p. 103183. ISSN 2214-2126

Kho, Yun Xing and Heng, Swee Huay and Chin, Ji Jian (2022) A Review of Cryptographic Electronic Voting. Symmetry, 14 (5). p. 858. ISSN 2073-8994

Tan, Soo Chin and Heng, Swee Huay (2022) Secure Cryptographic E-Auction System. International Journal of Technology, 13 (6). p. 1222. ISSN 2086-9614

Soh, Zhen Ang and Heng, Swee Huay (2022) Security and Privacy of Contact Tracing Protocols for COVID-19. Journal of Engineering Technology and Applied Physics, 4 (1). pp. 30-34. ISSN 2682-8383

Chan, Koon Ming and Heng, Swee Huay and Yau, Wei Chuen and Tan, Shing Chiang (2022) Trapdoor Privacy in Public Key Encryption with Keyword Search: A Review. IEEE Access. p. 1. ISSN 2169-3536

Koa, Chong Gee and Heng, Swee Huay and Chin, Ji Jian (2021) ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism. Symmetry, 13 (9). p. 1640. ISSN 2073-8994

Chia, Jason and Heng, Swee Huay and Chin, Ji Jian and Tan, Syh Yuan and Yau, Wei Chuen (2021) An Implementation Suite for a Hybrid Public Key Infrastructure. Symmetry, 13 (8). p. 1535. ISSN 2073-8994

Cheng, Kean Wah and Heng, Swee Huay (2021) Blockchain-Based Content Sharing and Data Repository System. In: International Conference on Advances in Cyber Security (ACeS), 8-9 December 2020, Penang, Malaysia.

Heng, Swee Huay and Wong, Zhen Kai (2020) Blockchain-Based Image Sharing Application. In: Advances in Cyber Security. Communications in Computer and Information Science, 1132 . Springer, pp. 46-59. ISBN 9789811526923

Loh, Jia Ch’ng and Heng, Swee Huay and Tan, Syh Yuan and Kurosawa, Kaoru (2020) A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. In: Information Security Applications. Lecture Notes in Computer Science, 11897 . Springer, pp. 112-125. ISBN 9783030393021

Loh, Jia Ch’ng and Heng, Swee Huay and Tan, Syh Yuan and Kurosawa, Kaoru (2020) On the invisibility and anonymity of undeniable signature schemes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA, 11 (1). pp. 18-34. ISSN 2093-5374

Heng, Swee Huay and Loh, Jia Ch’ng and Tan, Syh Yuan (2019) A Generic Framework for Accountable Optimistic Fair Exchange Protocol. Symmetry, 11 (2). pp. 229-309. ISSN 2073-8994

Phang, Mei Ling and Heng, Swee Huay (2019) A Survey on Crypto-Steganographic Schemes and A Use Case in Healthcare System. Journal of Engineering Technology and Applied Physics, 1 (2). pp. 25-33. ISSN 26828383

Yap, Wun She and Heng, Swee Huay and Goi, Bok Min (2018) Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Communications, 12 (10). pp. 1230-1235. ISSN 1751-8628

Heng, Swee Huay and Yuen, Tsz Hon (2018) Security-Mediated Certificateless Undeniable Signature Scheme. In: Third International Congress on Information and Communication Technology. Advances in Intelligent Systems and Computing, 797 . Springer Link, pp. 25-32. ISBN Print ISBN 978-981-13-1164-2, 978-981-13-1165-9

Yeow, Kin Woon and Heng, Swee Huay and Tan, Syh Yuan (2017) On the security of two sealed-bid auction schemes. In: 2017 19th International Conference on Advanced Communication Technology (ICACT). IEEE, pp. 58-63. ISBN 978-89-968650-9-4, 978-1-5090-4892-2

Yap, Wun She and Phan, Raphael Chung Wei and Goi, Bok Min and Yau, Wei Chuen and Heng, Swee Huay (2016) On the effective subkey space of some image encryption algorithms using external key. Journal of Visual Communication and Image Representation, 40 (A). pp. 51-57. ISSN 1047-3203

Chin, Ji Jian and Tan, Syh Yuan and Heng, Swee Huay and Phan, Raphael Chung Wei (2016) Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Cryptography and Communications, 8 (4). pp. 579-591. ISSN 1936-2447

Behnia, Rouzbeh and Heng, Swee Huay (2016) The insecurity of a certificateless undeniable signature scheme. In: 2016 International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, pp. 582-587. ISBN 978-1-5090-0304-4

Yeow, Kin Woon and Tan, Syh Yuan and Heng, Swee Huay and Behnia, Rouzbeh (2016) Applications of undeniable signature schemes. In: 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA). IEEE, pp. 133-138. ISBN 978-1-4799-8996-6

Behnia, Rouzbeh and Heng, Swee Huay and Gan, Che Seng (2015) An efficient certificateless undeniable signature scheme. International Journal of Computer Mathematics, 92 (7). pp. 1313-1328. ISSN 0020-7160

Yap, Wun She and Heng, Swee Huay and Phan, Raphael Chung Wei and Yau, Wei Chuen (2015) Cryptanalysis of a new image alternate encryption algorithm based on chaotic map. Nonlinear Dynamics, 80 (3). pp. 1483-1491. ISSN 1573-269X

Chin, Ji Jian and Heng, Swee Huay and Phan, Raphael Chung Wei and Behnia, Rouzbeh (2015) Cryptanalysis of a certificateless identification scheme. Security and Communication Networks, 8 (2). pp. 122-125. ISSN 1939-0122

Chan, Gaik Yee and Lee, Chien Sing and Heng, Swee Huay (2014) Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Applied Soft Computing, 24. pp. 142-157. ISSN 1568-4946

Chin, Ji Jian and Heng, Swee Huay and Phan, Raphael Chung Wei (2014) An efficient and provable secure certificateless identification scheme in the standard model. KSII Transactions on Internet and Information Systems, 8 (7). pp. 2532-2553. ISSN 1976-7277

Chin, Ji Jian and Phan, Raphael Chung Wei and Anada, Hiroaki and Arita, Seiko and Sakurai, Kouichi and Heng, Swee Huay (2014) Survey and new idea for attribute-based identification scheme secure against reset attacks. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 39-47. ISBN 978-983440694-3

Chin, Ji Jian and Tan, Syh Yuan and Heng, Swee Huay and Phan, Raphael Chung Wei (2014) Efficient and provable secure pairing-free security-mediated identity-based identification schemes. The Scientific World Journal, 2014. ISSN 1537-744X

Yap, Wun She and Henricksen, Matt and Heng, Swee Huay and Yeo, Sze Ling (2014) Security analysis of GCM for communication. Security and Communication Networks, 7 (5). pp. 854-864. ISSN 1939-0122

Chin, Ji Jian and Heng, Swee Huay (2014) An adaptive-secure k-resilient identity-based identification scheme in the standard model. Information (Japan), 17 (1). pp. 197-207. ISSN 1344-8994

Behnia, Rouzbeh and Heng, Swee Huay and Tan, Syh Yuan (2014) On the security of a strongly secure efficient certificateless signature scheme. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 12-17. ISBN 978-983440694-3

Behnia, Rouzbeh and Heng, Swee Huay (2013) Notes on two flawed attacks on undeniable signature schemes. In: IT Convergence and Security (ICITCS), 2013 International Conference on. IEEE, pp. 1-4. ISBN 978-1-4799-2845-3

Chin, Ji Jian and Tan, Syh Yuan and Heng, Swee Huay and Phan, Raphael Chung Wei (2013) On the security of a modified Beth identity-based identification scheme. Information Processing Letters, 113 (14-16). pp. 580-583. ISSN 0020-0190

Chin, Ji Jian and Behnia, Rouzbeh and Heng, Swee Huay and Phan, Raphael Chung Wei (2013) An efficient and provable secure security-mediated identity-based identification scheme. In: 2013 Eighth Asia Joint Conference on Information Security. IEEE Xplore, pp. 27-32. ISBN 978-0-7695-5075-6/13

Tan, Syh Yuan and Chin, Ji Jian and Heng, Swee Huay and Goi, Bok Min (2013) An immproved efficient provable secure identity-based identification scheme in the standard model. KSII Transactions on Internet and Information Systems, 7 (4). pp. 910-922. ISSN 1976-7277

Behnia, Rouzbeh and Heng, Swee Huay and Gan, Che Seng (2013) Security of NIDV Proof Systems for Certificate-Free Undeniable Signature Schemes. International Journal of Cryptology Research, 4 (1). pp. 102-123. ISSN 1985-5753

Chin, Ji Jian and Heng, Swee Huay (2013) Security upgrade for a K-resilient identity-based identification scheme in the standard model. Malaysian Journal of Mathematical Sciences, 7 (S). pp. 73-85. ISSN 1823-8343

Behnia, Rouzbeh and Heng, Swee Huay and Chin, Ji Jian and Phan, Raphael Chung Wei (2013) An efficient and provably secure certificateless identification scheme. In: 2013 International Conference on Security and Cryptography (SECRYPT), 29-31 Jul 2013, Reykjavik, Iceland.

Yau, Wei Chuen and Heng, Swee Huay and Tan, Syh Yuan and Phan, Raphael Chung Wei and Goi, Bok Min (2012) Efficient encryption with keyword search in mobile networks. Security and Communication Networks, 5 (12). 1412-1422 . ISSN 1939-0122

Ogata, Wakaha and Kurosawa, Kaoru and Heng, Swee Huay (2006) The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Transactions on Information Theory, 52 (5). pp. 2006-2017. ISSN 0018-9448

Kurosawa, Kaoru and Heng, Swee Huay (2006) Relations among security notions for undeniable signature schemes. In: Security and Cryptography for Networks. Lecture Notes in Computer Science, 4116 . Springer, pp. 34-48. ISBN Print ISBN 978-3-540-38080-1, 978-3-540-38081-8

Yap, Wun She and Heng, Swee Huay and Goi, Bok Min (2006) An efficient certificateless signature scheme. In: Emerging Directions in Embedded and Ubiquitous Computing. Lecture Notes in Computer Science (4097). Springer Berlin Heidelberg, pp. 322-331. ISBN 978-3-540-36851-9

Kurosawa, Kaoru and Heng, Swee Huay (2006) The power of identification schemes. In: Public Key Cryptography - PKC 2006. Lecture Notes in Computer Science, 3958 . Springer, pp. 364-377. ISBN 978-3-540-33851-2, 978-3-540-33852-9

Kurosawa, Kaoru and Heng, Swee Huay (2005) 3-Move undeniable signature scheme. In: Advances in Cryptology – EUROCRYPT 2005. Lecture Notes in Computer Science, 3494 . Springer Berlin Heidelberg, pp. 181-197. ISBN 978-3-540-25910-7

Kurosawa, Kaoru and Heng, Swee Huay (2005) Identity-based identification without random oracles. In: Computational Science and Its Applications – ICCSA 2005. Lecture Notes in Computer Science, 3481 . Springer, pp. 603-613. ISBN 978-3-540-25861-2, 978-3-540-32044-9

This list was generated on Wed Nov 20 23:43:32 2024 +08.