Off-line keyword guessing attacks on recent public key encryption with keyword search schemes WC Yau, SH Heng, BM Goi Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008 | 181 | 2008 |
An efficient certificateless signature scheme WS Yap, SH Heng, BM Goi Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006 | 174 | 2006 |
From digital signature to ID-based identification/signature K Kurosawa, SH Heng Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 122 | 2004 |
3-move undeniable signature scheme K Kurosawa, SH Heng Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 82 | 2005 |
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester WC Yau, RCW Phan, SH Heng, BM Goi International Journal of Computer Mathematics 90 (12), 2581-2587, 2013 | 78 | 2013 |
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map WS Yap, RCW Phan, WC Yau, SH Heng Nonlinear Dynamics 80 (3), 1483-1491, 2015 | 76 | 2015 |
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ... Human-centric Computing and Information Sciences 5, 1-16, 2015 | 67 | 2015 |
Java implementation for pairing-based cryptosystems SY Tan, SH Heng, BM Goi International Conference on Computational Science and Its Applications, 188-198, 2010 | 66 | 2010 |
Proxy re-encryption with keyword search: New definitions and algorithms WC Yau, RCW Phan, SH Heng, BM Goi Security Technology, Disaster Recovery and Business Continuity …, 2010 | 58 | 2010 |
Identity-based identification without random oracles K Kurosawa, SH Heng Computational Science and Its Applications–ICCSA 2005: International …, 2005 | 57 | 2005 |
The security of the FDH variant of Chaum’s undeniable signature scheme W Ogata, K Kurosawa, SH Heng Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 57 | 2005 |
Security mediated certificateless signatures WS Yap, SSM Chow, SH Heng, BM Goi Applied Cryptography and Network Security: 5th International Conference …, 2007 | 54 | 2007 |
k-Resilient Identity-Based Encryption in the Standard Model SH Heng, K Kurosawa Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004 | 52 | 2004 |
The power of identification schemes K Kurosawa, SH Heng Public Key Cryptography-PKC 2006: 9th International Conference on Theory and …, 2006 | 42 | 2006 |
On the security of ownership watermarking of digital images based on singular value decomposition HC Ling, RCW Phan, SH Heng Journal of Electronic Imaging 20 (1), 0105011-0105012, 2011 | 41* | 2011 |
Comment on “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition” HC Ling, RCW Phan, SH Heng AEU-International Journal of Electronics and Communications 67 (10), 894-897, 2013 | 31 | 2013 |
The security of the FDH variant of Chaum's undeniable signature scheme W Ogata, K Kurosawa, SH Heng IEEE Transactions on Information Theory 52 (5), 2006 | 29 | 2006 |
On the security of a hybrid watermarking algorithm based on singular value decomposition and Radon transform HC Ling, RCW Phan, SH Heng AEU-International Journal of Electronics and Communications 65 (11), 958-960, 2011 | 28 | 2011 |
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks GY Chan, CS Lee, SH Heng Journal of Network and Computer Applications 36 (2), 829-842, 2013 | 27 | 2013 |
Cryptanalysis of some proxy signature schemes without certificates WS Yap, SH Heng, BM Goi Information Security Theory and Practices. Smart Cards, Mobile and …, 2007 | 26 | 2007 |