Syh Yuan Tan
Syh Yuan Tan
Verified email at newcastle.ac.uk
TitleCited byYear
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
332015
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
322010
A study of attribute-based encryption for body sensor networks
YL Tan, BM Goi, R Komiya, SY Tan
International Conference on Informatics Engineering and Information Science …, 2011
112011
On the security of an attribute-based signature scheme
SY Tan, SH Heng, BM Goi
International Conference on U-and E-Service, Science and Technology, 161-168, 2009
112009
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information …, 2013
62013
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
52015
A variant of Schnorr identity-based identification scheme with tight reduction
SY Tan, SH Heng, RCW Phan, BM Goi
International Conference on Future Generation Information Technology, 361-370, 2011
52011
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
WS Yap, JK Liu, SY Tan, BM Goi
Security and Communication Networks 8 (17), 3094-3098, 2015
42015
On the realization of fuzzy identity‐based identification scheme using fingerprint biometrics
SY Tan, Z Jin, ABJ Teoh, BM Goi, SH Heng
Security and Communication Networks 5 (12), 1312-1324, 2012
42012
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
32013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
SY Tan, JJ Chin, SH Heng, BM Goi
TIIS 7 (4), 910-922, 2013
32013
Cryptanalysis of a CP-ABE scheme with policy in normal forms
SY Tan, WS Yap
Information Processing Letters 116 (7), 492-495, 2016
22016
A client-server prototype of a symmetric key searchable encryption scheme using open-source applications
SY Tan, JJ Chin, GS Poh, YHS Kam, WC Yau
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
22015
Implementation of a Conditional Searchable Encryption System for Data Storage
DA Rahman, SH Heng, WC Yau, SY Tan
Computer Science and its Applications, 469-474, 2015
22015
Argument on biometrics identity‐based encryption schemes
SY Tan, Z Jin, ABJ Teoh
Security and Communication Networks 6 (11), 1344-1352, 2013
22013
Fuzzy identity-based identification scheme
SY Tan, SH Heng, BM Goi, SJ Moon
International Conference on U-and E-Service, Science and Technology, 123-130, 2009
22009
Comment on “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
SY Tan
IEEE Access, 2019
12019
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
12017
A java implementation of paillier homomorphic encryption scheme
R Harerimana, SY Tan, WC Yau
2017 5th International Conference on Information and Communication …, 2017
12017
An Optimized Pairing-Based Cryptography Library for Android
SY Tan, CS Wong, HH Ng
International Journal of Cryptology Research 6 (1), 16-30, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20