Swee-Huay Heng
Swee-Huay Heng
Verified email at mmu.edu.my
TitleCited byYear
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
International Conference on Embedded and Ubiquitous Computing, 322-331, 2006
1572006
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
International Conference on Autonomic and Trusted Computing, 100-105, 2008
862008
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
International Workshop on Public Key Cryptography, 248-261, 2004
852004
3-move undeniable signature scheme
K Kurosawa, SH Heng
Annual International Conference on the Theory and Applications of …, 2005
652005
The security of the FDH variant of Chaum’s undeniable signature scheme
W Ogata, K Kurosawa, SH Heng
International Workshop on Public Key Cryptography, 328-345, 2005
432005
Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
WS Yap, RCW Phan, WC Yau, SH Heng
Nonlinear Dynamics 80 (3), 1483-1491, 2015
412015
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
International Conference on Applied Cryptography and Network Security, 459-477, 2007
412007
Identity-based identification without random oracles
K Kurosawa, SH Heng
International Conference on Computational Science and Its Applications, 603-613, 2005
412005
k-Resilient Identity-Based Encryption in the Standard Model
SH Heng, K Kurosawa
Cryptographers’ Track at the RSA Conference, 67-80, 2004
362004
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
352015
The power of identification schemes
K Kurosawa, SH Heng
International Workshop on Public Key Cryptography, 364-377, 2006
352006
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
332013
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
322010
Proxy re-encryption with keyword search: new definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity, 149-160, 2010
312010
On the security of ownership watermarking of digital images based on singular value decomposition
HC Ling, RCW Phan, SH Heng
Journal of Electronic Imaging 20 (1), 0105011-0105012, 2011
29*2011
The security of the FDH variant of Chaum's undeniable signature scheme
W Ogata, K Kurosawa, SH Heng
IEEE Transactions on Information Theory 52 (5), 2006
272006
On the security of a hybrid watermarking algorithm based on singular value decomposition and Radon transform
HC Ling, RCW Phan, SH Heng
AEU-International Journal of Electronics and Communications 65 (11), 958-960, 2011
252011
Cryptanalysis of some proxy signature schemes without certificates
WS Yap, SH Heng, BM Goi
IFIP International Workshop on Information Security Theory and Practices …, 2007
222007
Comment on “Robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition”
HC Ling, RCW Phan, SH Heng
AEU-International Journal of Electronics and Communications 67 (10), 894-897, 2013
192013
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
162008
The system can't perform the operation now. Try again later.
Articles 1–20