Ji-Jian Chin
Ji-Jian Chin
Verified email at mmu.edu.my
Cited by
Cited by
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
International Conference on Security Technology, 93-99, 2009
Searchable Symmetric Encryption Over Multiple Servers
P Geong-Sen, M Soeheila Moesfa, C Ji-Jian
ArcticCrypt 2016, 2016
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94 (1), 127-144, 2017
Twin-schnorr: a security upgrade for the schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
An Efficient and Provably Secure Certificateless Identification Scheme.
JJ Chin, RCW Phan, R Behnia, SH Heng
SECRYPT, 371-378, 2013
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
On the security advantages of block-based multiserver searchable symmetric encryption
MS Mohamad, JJ Chin, GS Poh
2016 14th Annual Conference on Privacy, Security and Trust (PST), 349-352, 2016
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
Cryptology 2010, 9-15, 2010
Java implementation for identity-based identification
SY Tan, SH Heng, BM Goi, JJ Chin, S Moon
International Journal of Cryptology Research 1 (1), 21-32, 2009
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
Review of Blockchain-Based Public Key Infrastructure
CG Koa, SH Heng, SY Tan, JJ Chin
Cryptology and Information Security Conference 2020, 20, 2020
Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model
C Ji-Jian, H Swee-Huay
Malaysian Journal of Mathematical Science 7, 73-85, 2013
An improved efficient provable secure identity-Based identification scheme in the standard model
SY Tan, JJ Chin, SH Heng, BM Goi
KSII Transactions on Internet and Information Systems (TIIS) 7 (4), 910-922, 2013
Evolution of Bitcoin Addresses from Security Perspectives
WK Chan, JJ Chin, VT Goh
2020 15th International Conference for Internet Technology and Secured†…, 2020
The system can't perform the operation now. Try again later.
Articles 1–20