Items where Author is "Tan, Syh Yuan"
Up a level |
Tan, Syh Yuan and Heng, Swee Huay (2024) Comment on “An efficient identity-based signature scheme with provable security”. Information Sciences, 659. p. 120079. ISSN 0020-0255
Chan, Koon Ming and Heng, Swee Huay and Tan, Syh Yuan and Tan, Shing Chiang (2024) Comment on “Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups”. IEEE Access, 12. pp. 91551-91555. ISSN 2169-3536
Tan, Syh Yuan and Heng, Swee Huay (2024) Efficient Active and Concurrent-Secure ID-Based Identification from Digital Signature. In: 2024 8th International Conference on Cryptography, Security and Privacy (CSP), 20-22 April 2024, Osaka, Japan.
Chan, Koon Ming and Heng, Swee Huay and Tan, Syh Yuan and Tan, Shing Chiang (2024) K-Resilient Public Key Authenticated Encryption with Keyword Search. In: 21st International Conference on Security and Cryptography, 8-10 July 2024, Dijon, France.
Kho, Yun Xing and Heng, Swee Huay and Tan, Syh Yuan and Chin, Ji Jian (2024) Transformation from e-voting to e-cheque. PLOS ONE, 19 (6). e0302659. ISSN 1932-6203
Tan, Syh Yuan and Heng, Swee Huay (2023) New Identity-Based Identification and Signature Schemes in the Standard Model. In: 18th International Conference on Availability, Reliability and Security, ARES 2023, 29 Aug - 1 Sep 2023, Benevento, Italy.
Chan, Jun Wen and Heng, Swee Huay and Tan, Syh Yuan (2023) Secure Data Sharing in a Cyber-Physical Cloud Environment. Journal of Telecommunications and the Digital Economy, 11 (4). pp. 94-112. ISSN 2203-1693
Chia, Jason and Heng, Swee Huay and Chin, Ji Jian and Tan, Syh Yuan and Yau, Wei Chuen (2021) An Implementation Suite for a Hybrid Public Key Infrastructure. Symmetry, 13 (8). p. 1535. ISSN 2073-8994
Braeken, An and Chin, Ji Jian and Tan, Syh Yuan (2021) ECQV-IBI: Identity-based identification with implicit certification. Journal of Information Security and Applications, 63. p. 103027. ISSN 2214-2126
Loh, Jia Ch’ng and Heng, Swee Huay and Tan, Syh Yuan and Kurosawa, Kaoru (2020) A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. In: Information Security Applications. Lecture Notes in Computer Science, 11897 . Springer, pp. 112-125. ISBN 9783030393021
Loh, Jia Ch’ng and Heng, Swee Huay and Tan, Syh Yuan and Kurosawa, Kaoru (2020) On the invisibility and anonymity of undeniable signature schemes. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA, 11 (1). pp. 18-34. ISSN 2093-5374
Khoh, Wee How and Teh, Pin Shen and Zhang, Ning and Tan, Syh Yuan and Shi, Qi and Nawaz, Raheel (2019) Strengthen user authentication on mobile devices by using user’s touch dynamics pattern. Journal of Ambient Intelligence and Humanized Computing (2020), 11 (10). pp. 4019-4039. ISSN 1868-5137, 1868-5145
Mohamad, soeheila and Tan, Syh Yuan and Chin, Ji Jian (2019) Searchable Symmetric Encryption Security Definitions. Malaysian Journal of Mathematical Sciences, 13 (S). pp. 31-47.
Heng, Swee Huay and Loh, Jia Ch’ng and Tan, Syh Yuan (2019) A Generic Framework for Accountable Optimistic Fair Exchange Protocol. Symmetry, 11 (2). pp. 229-309. ISSN 2073-8994
Ng, Tiong Sik and Tan, Syh Yuan and Chin, Ji Jian (2019) Improving Signature Schemes with Tight Security Reductions. Lecture Notes in Computer Science, 11879. pp. 273-292. ISSN 0302-9743
Teh, Pin Shen and Zhang, Ning and Tan, Syh Yuan and Shi, Qi and Nawaz, Raheel and Khoh, Wee How (2019) Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics. In: 2019 International Conference on Information and Communication Technology Convergence (ICTC) - ICTC2019, 16-18 Oct 2019, Ramada Plaza, Jeju Island, South Korea.
Tan, Syh Yuan (2018) Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”. IEEE Access, 6. pp. 22464-22465. ISSN 2169-3536
Ooi, Shih Yin and Lee, Nicholas Ming Ze and Tan, Syh Yuan and Pang, Ying Han and Hwang, Seong Oun (2018) Study of long short-term memory in flow-based network intrusion detection system. Journal of Intelligent & Fuzzy Systems, 35 (6). pp. 5947-5957. ISSN 1064-1246
Yeow, Kin Woon and Heng, Swee Huay and Tan, Syh Yuan (2017) On the security of two sealed-bid auction schemes. In: 2017 19th International Conference on Advanced Communication Technology (ICACT). IEEE, pp. 58-63. ISBN 978-89-968650-9-4, 978-1-5090-4892-2
Chin, Ji Jian and Tan, Syh Yuan and Heng, Swee Huay and Phan, Raphael Chung Wei (2016) Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Cryptography and Communications, 8 (4). pp. 579-591. ISSN 1936-2447
Yeow, Kin Woon and Tan, Syh Yuan and Heng, Swee Huay and Behnia, Rouzbeh (2016) Applications of undeniable signature schemes. In: 2015 IEEE International Conference on Signal and Image Processing Applications (ICSIPA). IEEE, pp. 133-138. ISBN 978-1-4799-8996-6
Tan, Syh Yuan and Chin, Ji Jian and Behnia, Rouzbeh (2016) Cryptanalysis of Two Identification Schemes. In: 2015 2nd International Conference on Information Science and Security (ICISS). IEEE, pp. 1-4. ISBN 978-1-4673-8611-1
Tan, Syh Yuan (2015) On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. Security and Communication Networks. ISSN 1939-0122
Tan, Syh Yuan (2014) Cryptanalysis of an ID-based Blind Signature Scheme. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 65-69. ISBN 978-983440694-3
Chin, Ji Jian and Tan, Syh Yuan and Heng, Swee Huay and Phan, Raphael Chung Wei (2014) Efficient and provable secure pairing-free security-mediated identity-based identification schemes. The Scientific World Journal, 2014. ISSN 1537-744X
Chin, Ji Jian and Tan, Syh Yuan and Kam, Yvonne Hwei Syn and Leong, Chee Hoe (2014) Implementation of identity-based and certificateless identification on android platform. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 57-64. ISBN 978-983440694-3
Behnia, Rouzbeh and Heng, Swee Huay and Tan, Syh Yuan (2014) On the security of a strongly secure efficient certificateless signature scheme. In: Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Institute for Mathematical Research (INSPEM), pp. 12-17. ISBN 978-983440694-3
Lim, Boon Hock and Tan, Syh Yuan and Yau, Wei Chuen (2013) An enhanced public key infrastructure. In: 3rd International Conference on IT Convergence and Security (ICITCS). IEEE. ISBN 978-1-4799-2845-3
Poh, Geong Sen and Mohd Nazir, Mohd Amril Nurman and Goi, Bok Min and Tan, Syh Yuan and Phan, Raphael Chung Wei and Shamsudin, Maryam Safiyah (2013) An authentication framework for peer-to-peer cloud. In: Proceedings of the 6th International Conference on Security of Information and Networks,Conference and Cultural Center, 26 - 28 November 2013, Aksaray University Campus,Turkey.
Chin, Ji Jian and Tan, Syh Yuan and Heng, Swee Huay and Phan, Raphael Chung Wei (2013) On the security of a modified Beth identity-based identification scheme. Information Processing Letters, 113 (14-16). pp. 580-583. ISSN 0020-0190
Tan, Syh Yuan and Chin, Ji Jian and Heng, Swee Huay and Goi, Bok Min (2013) An immproved efficient provable secure identity-based identification scheme in the standard model. KSII Transactions on Internet and Information Systems, 7 (4). pp. 910-922. ISSN 1976-7277
Yau, Wei Chuen and Heng, Swee Huay and Tan, Syh Yuan and Phan, Raphael Chung Wei and Goi, Bok Min (2012) Efficient encryption with keyword search in mobile networks. Security and Communication Networks, 5 (12). 1412-1422 . ISSN 1939-0122