|
Search the dblp DataBase
Swee-Huay Heng:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Swee-Huay Heng, Kaoru Kurosawa
Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:522-531 [Conf]
- Swee-Huay Heng, Kaoru Kurosawa
k-Resilient Identity-Based Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:67-80 [Conf]
- Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2006, pp:322-331 [Conf]
- Kaoru Kurosawa, Swee-Huay Heng
3-Move Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2005, pp:181-197 [Conf]
- Khoongming Khoo, Swee-Huay Heng
New Constructions of Universal Hash Functions Based on Function Sums. [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:416-425 [Conf]
- Kaoru Kurosawa, Swee-Huay Heng
Identity-Based Identification Without Random Oracles. [Citation Graph (0, 0)][DBLP] ICCSA (2), 2005, pp:603-613 [Conf]
- Kaoru Kurosawa, Swee-Huay Heng
From Digital Signature to ID-based Identification/Signature. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2004, pp:248-261 [Conf]
- Kaoru Kurosawa, Swee-Huay Heng
The Power of Identification Schemes. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2006, pp:364-377 [Conf]
- Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2005, pp:328-345 [Conf]
- Kaoru Kurosawa, Swee-Huay Heng
Relations Among Security Notions for Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:34-48 [Conf]
- Swee-Huay Heng, Kaoru Kurosawa
Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:54-59 [Journal]
- Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
The security of the FDH variant of Chaum's undeniable signature scheme. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2006-2017 [Journal]
- Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
Security Mediated Certificateless Signatures. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:459-477 [Conf]
- Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng
A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. [Citation Graph (0, 0)][DBLP] ICCSA (1), 2007, pp:644-654 [Conf]
- Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
Linkability of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:80-89 [Conf]
- Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:115-126 [Conf]
- Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. [Citation Graph (0, 0)][DBLP] ProvSec, 2007, pp:169-177 [Conf]
On the Security of an Identity-Based Aggregate Signature Scheme. [Citation Graph (, )][DBLP]
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. [Citation Graph (, )][DBLP]
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. [Citation Graph (, )][DBLP]
Java Implementation for Pairing-Based Cryptosystems. [Citation Graph (, )][DBLP]
Attacks on SVD-Based Watermarking Schemes. [Citation Graph (, )][DBLP]
Attacks on a Block Based SVD Watermarking Scheme. [Citation Graph (, )][DBLP]
Mobile and ubiquitous malware. [Citation Graph (, )][DBLP]
Analysis on the Improved SVD-Based Watermarking Scheme. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|