Syh Yuan Tan
Syh Yuan Tan
Verified email at newcastle.ac.uk
Title
Cited by
Cited by
Year
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
442010
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
422015
A study of attribute-based encryption for body sensor networks
YL Tan, BM Goi, R Komiya, SY Tan
International Conference on Informatics Engineering and Information Science†…, 2011
162011
On the security of a certificateless short signature scheme
R Behnia, SH Heng, SY Tan
Malays. J. Math. Sci 9, 103-113, 2015
132015
On the security of an attribute-based signature scheme
SY Tan, SH Heng, BM Goi
International Conference on U-and E-Service, Science and Technology, 161-168, 2009
112009
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
SY Tan, KW Yeow, SO Hwang
IEEE Internet of Things Journal 6 (4), 6384-6395, 2019
92019
A variant of Schnorr identity-based identification scheme with tight reduction
SY Tan, SH Heng, RCW Phan, BM Goi
International Conference on Future Generation Information Technology, 361-370, 2011
72011
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
WS Yap, JK Liu, SY Tan, BM Goi
Security and Communication Networks 8 (17), 3094-3098, 2015
62015
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
62015
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
62013
A java implementation of paillier homomorphic encryption scheme
R Harerimana, SY Tan, WC Yau
2017 5th International Conference on Information and Communication†…, 2017
42017
Cryptanalysis of a CP-ABE scheme with policy in normal forms
SY Tan, WS Yap
Information Processing Letters 116 (7), 492-495, 2016
42016
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
42013
On the realization of fuzzy identity‐based identification scheme using fingerprint biometrics
SY Tan, Z Jin, ABJ Teoh, BM Goi, SH Heng
Security and Communication Networks 5 (12), 1312-1324, 2012
42012
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
PS Teh, N Zhang, SY Tan, Q Shi, WH Khoh, R Nawaz
Journal of Ambient Intelligence and Humanized Computing, 1-21, 2019
32019
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
SY Tan, JJ Chin, SH Heng, BM Goi
TIIS 7 (4), 910-922, 2013
32013
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
L Guo, Z Li, WC Yau, SY Tan
IEEE Access 8, 26107-26118, 2020
22020
Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
SY Tan
IEEE Access 7, 17045-17049, 2019
22019
Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”
SY Tan
IEEE Access 6, 22464-22465, 2018
22018
A Variant of BLS Signature Scheme with Tight Security Reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20