Follow
Bok-Min Goi
Bok-Min Goi
Senior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Verified email at utar.edu.my - Homepage
Title
Cited by
Cited by
Year
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
1762006
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008
1742008
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
1192012
Cancellable iris template generation based on indexing-first-one hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
1152017
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012
1142012
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
1132014
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
1072016
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
992005
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
892008
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
852016
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18, 739-755, 2015
792015
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
722013
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
662010
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
582004
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear dynamics 92 (2), 575-593, 2018
572018
Proxy re-encryption with keyword search: New definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity …, 2010
552010
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
Applied Cryptography and Network Security: Third International Conference …, 2005
542005
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
Applied Cryptography and Network Security: 5th International Conference …, 2007
532007
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
RCW Phan, BM Goi
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
392006
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture
WK Lee, HS Cheong, RCW Phan, BM Goi
Cluster Computing 19, 335-347, 2016
382016
The system can't perform the operation now. Try again later.
Articles 1–20