Ji-Jian Chin
Ji-Jian Chin
Verified email at mmu.edu.my
Title
Cited by
Cited by
Year
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
642017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
422015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
162008
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
International Conference on Security Technology, 93-99, 2009
122009
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
102018
IBI-Mobile Authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94 (1), 127-144, 2017
72017
Twin-schnorr: a security upgrade for the schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
62015
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
52015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
52013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
42013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
SY Tan, JJ Chin, SH Heng, BM Goi
TIIS 7 (4), 910-922, 2013
32013
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
International Journal of Cryptology Research 2 (1), 15-25, 2010
32010
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
Cryptology 2010, 9-15, 2010
32010
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
22017
On the security advantages of block-based multiserver searchable symmetric encryption
MS Mohamad, JJ Chin, GS Poh
2016 14th Annual Conference on Privacy, Security and Trust (PST), 349-352, 2016
22016
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
22015
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications
SY Tan, JJ Chin, GS Poh, YHS Kam, WC Yau
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
22015
A provable secure pairing-free certificateless identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan, R Behnia
International Journal of Computer Mathematics 92 (8), 1520-1535, 2015
22015
Proof of Bid as Alternative to Proof of Work
WK Chan, JJ Chin, VT Goh
International Conference on Advances in Cyber Security, 60-73, 2019
12019
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology†…, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20