Bok-Min Goi
Bok-Min Goi
Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Verified email at utar.edu.my - Homepage
Title
Cited by
Cited by
Year
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
International Conference on Embedded and Ubiquitous Computing, 322-331, 2006
1642006
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
International Conference on Autonomic and Trusted Computing, 100-105, 2008
1062008
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
912012
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
882008
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
Pacific Rim International Conference on Artificial Intelligence, 335-346, 2012
872012
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
622014
Cancellable iris template generation based on Indexing-First-One hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
542017
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
International Conference on Applied Cryptography and Network Security, 369-382, 2004
542004
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
International Conference on Cryptology in India, 232-243, 2005
532005
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
502016
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
International Conference on Applied Cryptography and Network Security, 459-477, 2007
462007
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
International Conference on Applied Cryptography and Network Security, 33-39, 2005
462005
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
442010
Proxy re-encryption with keyword search: new definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity, 149-160, 2010
422010
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
412013
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
382016
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
RCW Phan, BM Goi
International Conference on Cryptology in India, 104-117, 2006
382006
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18 (4), 739-755, 2015
352015
Cryptanalysis of the n-party encrypted diffie-hellman key exchange using different passwords
RCW Phan, BM Goi
International Conference on Applied Cryptography and Network Security, 226-238, 2006
242006
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture
WK Lee, HS Cheong, RCW Phan, BM Goi
Cluster Computing 19 (1), 335-347, 2016
232016
The system can't perform the operation now. Try again later.
Articles 1–20