The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Swee-Huay Heng: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Swee-Huay Heng, Kaoru Kurosawa
    Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:522-531 [Conf]
  2. Swee-Huay Heng, Kaoru Kurosawa
    k-Resilient Identity-Based Encryption in the Standard Model. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:67-80 [Conf]
  3. Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
    An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:322-331 [Conf]
  4. Kaoru Kurosawa, Swee-Huay Heng
    3-Move Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:181-197 [Conf]
  5. Khoongming Khoo, Swee-Huay Heng
    New Constructions of Universal Hash Functions Based on Function Sums. [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:416-425 [Conf]
  6. Kaoru Kurosawa, Swee-Huay Heng
    Identity-Based Identification Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ICCSA (2), 2005, pp:603-613 [Conf]
  7. Kaoru Kurosawa, Swee-Huay Heng
    From Digital Signature to ID-based Identification/Signature. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:248-261 [Conf]
  8. Kaoru Kurosawa, Swee-Huay Heng
    The Power of Identification Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:364-377 [Conf]
  9. Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
    The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:328-345 [Conf]
  10. Kaoru Kurosawa, Swee-Huay Heng
    Relations Among Security Notions for Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:34-48 [Conf]
  11. Swee-Huay Heng, Kaoru Kurosawa
    Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:54-59 [Journal]
  12. Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng
    The security of the FDH variant of Chaum's undeniable signature scheme. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2006, v:52, n:5, pp:2006-2017 [Journal]
  13. Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
    Security Mediated Certificateless Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:459-477 [Conf]
  14. Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng
    A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:644-654 [Conf]
  15. Swee-Huay Heng, Wun-She Yap, Khoongming Khoo
    Linkability of Some Blind Signature Schemes. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:80-89 [Conf]
  16. Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
    Cryptanalysis of Some Proxy Signature Schemes Without Certificates. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:115-126 [Conf]
  17. Raphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng
    Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:169-177 [Conf]

  18. On the Security of an Identity-Based Aggregate Signature Scheme. [Citation Graph (, )][DBLP]


  19. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. [Citation Graph (, )][DBLP]


  20. An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. [Citation Graph (, )][DBLP]


  21. Java Implementation for Pairing-Based Cryptosystems. [Citation Graph (, )][DBLP]


  22. Attacks on SVD-Based Watermarking Schemes. [Citation Graph (, )][DBLP]


  23. Attacks on a Block Based SVD Watermarking Scheme. [Citation Graph (, )][DBLP]


  24. Mobile and ubiquitous malware. [Citation Graph (, )][DBLP]


  25. Analysis on the Improved SVD-Based Watermarking Scheme. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002