Syh Yuan Tan
Syh Yuan Tan
Verified email at
Cited by
Cited by
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
SY Tan, KW Yeow, SO Hwang
IEEE Internet of Things Journal 6 (4), 6384-6395, 2019
A study of attribute-based encryption for body sensor networks
YL Tan, BM Goi, R Komiya, SY Tan
International Conference on Informatics Engineering and Information Science†…, 2011
On the security of a certificateless short signature scheme
R Behnia, SH Heng, SY Tan
Malaysian Journal of Mathematical Sciences 9, 103-113, 2015
On the security of an attribute-based signature scheme
SY Tan, SH Heng, BM Goi
International Conference on U-and E-Service, Science and Technology, 161-168, 2009
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
PS Teh, N Zhang, SY Tan, Q Shi, WH Khoh, R Nawaz
Journal of Ambient Intelligence and Humanized Computing, 1-21, 2019
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
A variant of Schnorr identity-based identification scheme with tight reduction
SY Tan, SH Heng, RCW Phan, BM Goi
International Conference on Future Generation Information Technology, 361-370, 2011
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
L Guo, Z Li, WC Yau, SY Tan
IEEE Access 8, 26107-26118, 2020
A java implementation of paillier homomorphic encryption scheme
R Harerimana, SY Tan, WC Yau
2017 5th International Conference on Information and Communication†…, 2017
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
WS Yap, JK Liu, SY Tan, BM Goi
Security and Communication Networks 8 (17), 3094-3098, 2015
Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”
SY Tan
IEEE Access 6, 22464-22465, 2018
Cryptanalysis of a CP-ABE scheme with policy in normal forms
SY Tan, WS Yap
Information Processing Letters 116 (7), 492-495, 2016
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
SY Tan
IEEE Access 7, 17045-17049, 2019
A Variant of BLS Signature Scheme with Tight Security Reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
On the realization of fuzzy identity‐based identification scheme using fingerprint biometrics
SY Tan, Z Jin, ABJ Teoh, BM Goi, SH Heng
Security and Communication Networks 5 (12), 1312-1324, 2012
The system can't perform the operation now. Try again later.
Articles 1–20