Bok-Min Goi
Bok-Min Goi
Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Verified email at utar.edu.my - Homepage
TitleCited byYear
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
International Conference on Embedded and Ubiquitous Computing, 322-331, 2006
1592006
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
International Conference on Autonomic and Trusted Computing, 100-105, 2008
922008
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
882012
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
882008
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
Pacific Rim International Conference on Artificial Intelligence, 335-346, 2012
792012
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
552014
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
International Conference on Applied Cryptography and Network Security, 369-382, 2004
522004
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
International Conference on Applied Cryptography and Network Security, 33-39, 2005
462005
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
International Conference on Applied Cryptography and Network Security, 459-477, 2007
432007
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
422016
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
International Conference on Cryptology in India, 232-243, 2005
422005
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
RCW Phan, BM Goi
International Conference on Cryptology in India, 104-117, 2006
392006
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
382010
Cancellable iris template generation based on Indexing-First-One hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
372017
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
372013
Proxy re-encryption with keyword search: new definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity, 149-160, 2010
352010
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18 (4), 739-755, 2015
332015
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
292016
Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
RCW Phan, BM Goi
International Conference on Applied Cryptography and Network Security, 226-238, 2006
252006
Cryptanalysis of some proxy signature schemes without certificates
WS Yap, SH Heng, BM Goi
IFIP International Workshop on Information Security Theory and Practices …, 2007
222007
The system can't perform the operation now. Try again later.
Articles 1–20