The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Chik How Tan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chik How Tan, Xun Yi, Chee Kheong Siew
    Signature Schemes Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:445-459 [Conf]
  2. Chik How Tan, Xun Yi, Chee Kheong Siew
    A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:428-442 [Conf]
  3. Chik How Tan, Joseph Chee Ming Teo, Jens-Are Amundsen
    Authenticated Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:512-518 [Conf]
  4. Chik How Tan, Joseph Chee Ming Teo
    Energy-efficient ID-based group key agreement protocols for wireless networks. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  5. Xiaosong Hou, Chik How Tan
    A New Electronic Cash Model. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:374-379 [Conf]
  6. Chik How Tan, Joseph Chee Ming Teo
    Protection AgainstWeb-based Password Phishing. [Citation Graph (0, 0)][DBLP]
    ITNG, 2007, pp:754-759 [Conf]
  7. Chik How Tan
    Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2006, pp:292-307 [Conf]
  8. Chik How Tan
    Public-Key Encryption from ID-Based Encryption Without One-Time Signature. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (1), 2006, pp:450-459 [Conf]
  9. Joseph Chee Ming Teo, Chik How Tan
    Energy-efficient and scalable group key agreement for large ad hoc networks. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2005, pp:114-121 [Conf]
  10. Chik How Tan
    Key Substitution Attacks on Some Provably Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:226-227 [Journal]
  11. Chik How Tan
    Key Substitution Attacks on Provably Secure Short Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:2, pp:611-612 [Journal]
  12. Chik How Tan
    Analysis of improved signcryption scheme with key privacy. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2006, v:99, n:4, pp:135-138 [Journal]
  13. Chik How Tan
    A secure signature scheme. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:195-200 [Conf]
  14. Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng
    Low-power group key agreement for heterogeneous wireless networks. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:177-182 [Conf]

  15. Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. [Citation Graph (, )][DBLP]


  16. Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. [Citation Graph (, )][DBLP]


  17. Certificateless Authenticated Two-Party Key Agreement Protocols. [Citation Graph (, )][DBLP]


  18. Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP]


  19. Signcryption Scheme in Multi-user Setting without Random Oracles. [Citation Graph (, )][DBLP]


  20. Denial-of-service resilience password-based group key agreement for wireless networks. [Citation Graph (, )][DBLP]


  21. Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002