Ji-Jian Chin
Ji-Jian Chin
Verified email at mmu.edu.my
TitleCited byYear
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 40, 2017
532017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
412015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
162008
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
International Conference on Security Technology, 93-99, 2009
132009
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
92018
IBI-Mobile Authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94 (1), 127-144, 2017
62017
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
52015
Twin-Schnorr: a security upgrade for the schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
52015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
42013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
32013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
SY Tan, JJ Chin, SH Heng, BM Goi
TIIS 7 (4), 910-922, 2013
32013
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
International Journal of Cryptology Research 2 (1), 15-25, 2010
32010
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
Cryptology 2010, 9-15, 2010
32010
A client-server prototype of a symmetric key searchable encryption scheme using open-source applications
SY Tan, JJ Chin, GS Poh, YHS Kam, WC Yau
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
22015
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
12017
On the security advantages of block-based multiserver searchable symmetric encryption
MS Mohamad, JJ Chin, GS Poh
2016 14th Annual Conference on Privacy, Security and Trust (PST), 349-352, 2016
12016
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
12015
A provable secure pairing-free certificateless identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan, R Behnia
International Journal of Computer Mathematics 92 (8), 1520-1535, 2015
12015
Implementation of identity-based and certificateless identification on android platform
JJ Chin, SY Tan, YHS Kam, CH Leong
Institute for Mathematical Research (INSPEM), 2014
12014
An adaptive-secure k-resilient identity-based identification scheme in the standard model
JJ Chin, SH Heng
International Information Institute (Tokyo). Information 17 (1), 197, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20