Ji-Jian Chin
Ji-Jian Chin
Verified email at mmu.edu.my
TitleCited byYear
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 40, 2017
462017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
332015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
162008
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
International Conference on Security Technology, 93-99, 2009
132009
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
72018
IBI-Mobile Authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94 (1), 127-144, 2017
62017
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
52015
Twin-Schnorr: a security upgrade for the schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
52015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
42013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
32013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
SY Tan, JJ Chin, SH Heng, BM Goi
TIIS 7 (4), 910-922, 2013
32013
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
International Journal of Cryptology Research 2 (1), 15-25, 2010
32010
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
Cryptology 2010, 9-15, 2010
32010
A client-server prototype of a symmetric key searchable encryption scheme using open-source applications
SY Tan, JJ Chin, GS Poh, YHS Kam, WC Yau
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
22015
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
12017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
12015
A provable secure pairing-free certificateless identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan, R Behnia
International Journal of Computer Mathematics 92 (8), 1520-1535, 2015
12015
Implementation of identity-based and certificateless identification on android platform
JJ Chin, SY Tan, YHS Kam, CH Leong
Institute for Mathematical Research (INSPEM), 2014
12014
An adaptive-secure k-resilient identity-based identification scheme in the standard model
JJ Chin, SH Heng
International Information Institute (Tokyo). Information 17 (1), 197, 2014
12014
An efficient and provable secure security-mediated identity-based identification scheme
JJ Chin, R Behnia, SH Heng, C Raphael, W Phan
2013 Eighth Asia Joint Conference on Information Security, 27-32, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20