default search action
Swee-Huay Heng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan:
Comment on "Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups". IEEE Access 12: 91551-91555 (2024) - [j36]Syh-Yuan Tan, Swee-Huay Heng:
Comment on "An efficient identity-based signature scheme with provable security". Inf. Sci. 659: 120079 (2024) - [c47]Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan:
K-Resilient Public Key Authenticated Encryption with Keyword Search. SECRYPT 2024: 381-388 - 2023
- [c46]Syh-Yuan Tan, Swee-Huay Heng:
New Identity-Based Identification and Signature Schemes in the Standard Model. ARES 2023: 147:1-147:8 - 2022
- [j35]Koon-Ming Chan, Swee-Huay Heng, Wei-Chuen Yau, Shing Chiang Tan:
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review. IEEE Access 10: 21584-21598 (2022) - [j34]Haw-Bin How, Swee-Huay Heng:
Blockchain-Enabled Searchable Encryption in Clouds: A Review. J. Inf. Secur. Appl. 67: 103183 (2022) - [j33]Yun-Xing Kho, Swee-Huay Heng, Ji-Jian Chin:
A Review of Cryptographic Electronic Voting. Symmetry 14(5): 858 (2022) - 2021
- [j32]Jason Chia, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, Wei-Chuen Yau:
An Implementation Suite for a Hybrid Public Key Infrastructure. Symmetry 13(8): 1535 (2021) - [j31]Chong-Gee Koa, Swee-Huay Heng, Ji-Jian Chin:
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism. Symmetry 13(9): 1640 (2021) - 2020
- [j30]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
On the Invisibility and Anonymity of Undeniable Signature Schemes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1): 18-34 (2020) - [c45]Kean-Wah Cheng, Swee-Huay Heng:
Blockchain-Based Content Sharing and Data Repository System. ACeS 2020: 207-224
2010 – 2019
- 2019
- [j29]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. Symmetry 11(2): 285 (2019) - [c44]Zhen-Kai Wong, Swee-Huay Heng:
Blockchain-Based Image Sharing Application. ACeS 2019: 46-59 - [c43]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. WISA 2019: 112-125 - [e3]Swee-Huay Heng, Javier López:
Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings. Lecture Notes in Computer Science 11879, Springer 2019, ISBN 978-3-030-34338-5 [contents] - 2018
- [j28]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Commun. 12(10): 1230-1235 (2018) - [c42]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. ISPEC 2018: 299-309 - 2017
- [c41]Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan:
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme. ICISA 2017: 306-314 - [c40]Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan:
From Sealed-Bid Electronic Auction to Electronic Cheque. ICISA 2017: 366-376 - 2016
- [j27]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Cryptogr. Commun. 8(4): 579-591 (2016) - [j26]Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi, Wei-Chuen Yau, Swee-Huay Heng:
On the effective subkey space of some image encryption algorithms using external key. J. Vis. Commun. Image Represent. 40: 51-57 (2016) - [c39]Rouzbeh Behnia, Swee-Huay Heng:
The insecurity of a certificateless undeniable signature scheme. IWCMC 2016: 582-587 - [c38]Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng:
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. Mycrypt 2016: 474-477 - 2015
- [j25]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [j24]Rouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan:
An efficient certificateless undeniable signature scheme. Int. J. Comput. Math. 92(7): 1313-1328 (2015) - [j23]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Rouzbeh Behnia:
A provable secure pairing-free certificateless identification scheme. Int. J. Comput. Math. 92(8): 1520-1535 (2015) - [j22]Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael C.-W. Phan:
Cryptanalysis of a certificateless identification scheme. Secur. Commun. Networks 8(2): 122-125 (2015) - [c37]Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng:
On the Security of Two Pairing-Based Signature Schemes. ICITCS 2015: 1-4 - [c36]Kin-Woon Yeow, Syh-Yuan Tan, Swee-Huay Heng, Rouzbeh Behnia:
Applications of undeniable signature schemes. ICSIPA 2015: 133-138 - 2014
- [j21]Gaik-Yee Chan, Chien-Sing Lee, Swee-Huay Heng:
Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules. Appl. Soft Comput. 24: 142-157 (2014) - [j20]Jiqiang Lu, Wun-She Yap, Matt Henricksen, Swee-Huay Heng:
Differential attack on nine rounds of the SEED block cipher. Inf. Process. Lett. 114(3): 116-123 (2014) - [j19]Ji-Jian Chin, Swee-Huay Heng, Raphael C.-W. Phan:
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 8(7): 2532-2553 (2014) - [j18]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Security analysis of GCM for communication. Secur. Commun. Networks 7(5): 854-864 (2014) - [j17]Wun-She Yap, Sze Ling Yeo, Swee-Huay Heng, Matt Henricksen:
Parallelizable MAC revisited. Secur. Commun. Networks 7(7): 1115-1127 (2014) - 2013
- [j16]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12): 2581-2587 (2013) - [j15]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
On the security of a modified Beth identity-based identification scheme. Inf. Process. Lett. 113(14-16): 580-583 (2013) - [j14]Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 7(4): 910-922 (2013) - [j13]Gaik-Yee Chan, Chien-Sing Lee, Swee-Huay Heng:
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks. J. Netw. Comput. Appl. 36(2): 829-842 (2013) - [c35]Ji-Jian Chin, Rouzbeh Behnia, Swee-Huay Heng, Raphael Chung-Wei Phan:
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme. AsiaJCIS 2013: 27-32 - [c34]Rouzbeh Behnia, Swee-Huay Heng:
Notes on Two Flawed Attacks on Undeniable Signature Schemes. ICITCS 2013: 1-4 - [c33]Ji-Jian Chin, Raphael C.-W. Phan, Rouzbeh Behnia, Swee-Huay Heng:
An Efficient and Provably Secure Certificateless Identification Scheme. SECRYPT 2013: 371-378 - 2012
- [j12]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Security models for delegated keyword searching within encrypted contents. J. Internet Serv. Appl. 3(2): 233-241 (2012) - [j11]Gaik-Yee Chan, Chien-Sing Lee, Swee-Huay Heng:
Policy-enhanced ANFIS model to counter SOAP-related attacks. Knowl. Based Syst. 35: 64-76 (2012) - [j10]Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Swee-Huay Heng:
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Secur. Commun. Networks 5(12): 1312-1324 (2012) - [j9]Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi, Raphael C.-W. Phan:
Efficient encryption with keyword search in mobile networks. Secur. Commun. Networks 5(12): 1412-1422 (2012) - [c32]Rouzbeh Behnia, Swee-Huay Heng, Che-Sheng Gan:
Short and Efficient Identity-Based Undeniable Signature Scheme. TrustBus 2012: 143-148 - 2011
- [j8]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
On the security of ownership watermarking of digital images based on singular value decomposition. J. Electronic Imaging 20(1): 010501 (2011) - [c31]Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng:
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. CANS 2011: 172-184 - [c30]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
On the Security of a Robust Watermarking Scheme Based on RDWT-SVD. FGIT 2011: 249-256 - [c29]Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Bok-Min Goi:
A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction. FGIT 2011: 361-370 - [c28]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
On the Security of Two Fuzzy Identity-Based Signature Schemes. NTMS 2011: 1-5 - [c27]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR. PSIVT (1) 2011: 257-266 - 2010
- [c26]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. FGIT-SecTech/DRBC 2010: 149-160 - [c25]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
Java Implementation for Pairing-Based Cryptosystems. ICCSA (4) 2010: 188-198 - [c24]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
Analysis on the Improved SVD-Based Watermarking Scheme. AST/UCMA/ISA/ACN 2010: 143-149 - [e2]Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi:
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6467, Springer 2010, ISBN 978-3-642-17618-0 [contents] - [e1]Swee-Huay Heng, Kaoru Kurosawa:
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6402, Springer 2010, ISBN 978-3-642-16279-4 [contents]
2000 – 2009
- 2009
- [j7]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attack on a semi-blind watermarking scheme based on singular value decomposition. Comput. Stand. Interfaces 31(2): 523-525 (2009) - [c23]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
Hierarchical Identity-Based Identification Schemes. FGIT-SecTech 2009: 93-99 - [c22]Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi:
Attacks on a Block Based SVD Watermarking Scheme. ITNG 2009: 371-375 - [c21]Yean Li Ho, Swee-Huay Heng:
Mobile and ubiquitous malware. MoMM 2009: 559-563 - 2008
- [j6]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attacks on a robust watermarking scheme based on self-reference image. Comput. Stand. Interfaces 30(1-2): 32-35 (2008) - [j5]Kaoru Kurosawa, Swee-Huay Heng:
The power of identification schemes. Int. J. Appl. Cryptogr. 1(1): 60-69 (2008) - [c20]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
On the Security of an Identity-Based Aggregate Signature Scheme. AINA Workshops 2008: 1523-1528 - [c19]Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi:
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. ATC 2008: 100-105 - [c18]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. EuroPKI 2008: 60-73 - [c17]Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng:
Attacks on SVD-Based Watermarking Schemes. ISI Workshops 2008: 83-91 - 2007
- [c16]Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. ACNS 2007: 459-477 - [c15]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. ICCSA (1) 2007: 644-654 - [c14]Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng:
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. ProvSec 2007: 169-177 - [c13]Swee-Huay Heng, Wun-She Yap, Khoongming Khoo:
Linkability of Some Blind Signature Schemes. WISTP 2007: 80-89 - [c12]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. WISTP 2007: 115-126 - 2006
- [j4]Swee-Huay Heng, Kaoru Kurosawa:
k-Resilient Identity-Based Encryption in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 39-46 (2006) - [j3]K. V. R. Ravi, Ramaswamy Palaniappan, Swee-Huay Heng:
Simplified fuzzy ARTMAP classification of individuals using optimal VEP channels. Int. J. Knowl. Based Intell. Eng. Syst. 10(6): 445-452 (2006) - [j2]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Trans. Inf. Theory 52(5): 2006-2017 (2006) - [c11]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
An Efficient Certificateless Signature Scheme. EUC Workshops 2006: 322-331 - [c10]Khoongming Khoo, Swee-Huay Heng:
New Constructions of Universal Hash Functions Based on Function Sums. ICCSA (3) 2006: 416-425 - [c9]Kaoru Kurosawa, Swee-Huay Heng:
The Power of Identification Schemes. Public Key Cryptography 2006: 364-377 - [c8]Kaoru Kurosawa, Swee-Huay Heng:
Relations Among Security Notions for Undeniable Signature Schemes. SCN 2006: 34-48 - 2005
- [c7]Kaoru Kurosawa, Swee-Huay Heng:
3-Move Undeniable Signature Scheme. EUROCRYPT 2005: 181-197 - [c6]Kaoru Kurosawa, Swee-Huay Heng:
Identity-Based Identification Without Random Oracles. ICCSA (2) 2005: 603-613 - [c5]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. Public Key Cryptography 2005: 328-345 - 2004
- [j1]Swee-Huay Heng, Kaoru Kurosawa:
Square Hash with a Small Key Size. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 54-59 (2004) - [c4]Swee-Huay Heng, Kaoru Kurosawa:
k-Resilient Identity-Based Encryption in the Standard Model. CT-RSA 2004: 67-80 - [c3]Khoongming Khoo, Swee-Huay Heng:
Universal hash functions over GF(2n). ISIT 2004: 205 - [c2]Kaoru Kurosawa, Swee-Huay Heng:
From Digital Signature to ID-based Identification/Signature. Public Key Cryptography 2004: 248-261 - [i1]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 290 (2004) - 2003
- [c1]Swee-Huay Heng, Kaoru Kurosawa:
Square Hash with a Small Key Size. ACISP 2003: 522-531
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 02:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint