Search the dblp DataBase
Chik How Tan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chik How Tan , Xun Yi , Chee Kheong Siew Signature Schemes Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:445-459 [Conf ] Chik How Tan , Xun Yi , Chee Kheong Siew A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:428-442 [Conf ] Chik How Tan , Joseph Chee Ming Teo , Jens-Are Amundsen Authenticated Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP ] AINA Workshops (1), 2007, pp:512-518 [Conf ] Chik How Tan , Joseph Chee Ming Teo Energy-efficient ID-based group key agreement protocols for wireless networks. [Citation Graph (0, 0)][DBLP ] IPDPS, 2006, pp:- [Conf ] Xiaosong Hou , Chik How Tan A New Electronic Cash Model. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:374-379 [Conf ] Chik How Tan , Joseph Chee Ming Teo Protection AgainstWeb-based Password Phishing. [Citation Graph (0, 0)][DBLP ] ITNG, 2007, pp:754-759 [Conf ] Chik How Tan Chosen Ciphertext Security from Identity-Based Encryption Without Strong Condition. [Citation Graph (0, 0)][DBLP ] IWSEC, 2006, pp:292-307 [Conf ] Chik How Tan Public-Key Encryption from ID-Based Encryption Without One-Time Signature. [Citation Graph (0, 0)][DBLP ] OTM Workshops (1), 2006, pp:450-459 [Conf ] Joseph Chee Ming Teo , Chik How Tan Energy-efficient and scalable group key agreement for large ad hoc networks. [Citation Graph (0, 0)][DBLP ] PE-WASUN, 2005, pp:114-121 [Conf ] Chik How Tan Key Substitution Attacks on Some Provably Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:226-227 [Journal ] Chik How Tan Key Substitution Attacks on Provably Secure Short Signature Schemes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:2, pp:611-612 [Journal ] Chik How Tan Analysis of improved signcryption scheme with key privacy. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 2006, v:99, n:4, pp:135-138 [Journal ] Chik How Tan A secure signature scheme. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:195-200 [Conf ] Joseph Chee Ming Teo , Chik How Tan , Jim Mee Ng Low-power group key agreement for heterogeneous wireless networks. [Citation Graph (0, 0)][DBLP ] IWCMC, 2006, pp:177-182 [Conf ] Insider-secure Hybrid Signcryption SchemeWithout Random Oracles. [Citation Graph (, )][DBLP ] Insider-secure Signcryption KEM/Tag-KEM Schemes without Random Oracles. [Citation Graph (, )][DBLP ] Certificateless Authenticated Two-Party Key Agreement Protocols. [Citation Graph (, )][DBLP ] Probabilistic Public Key Encryption with Equality Test. [Citation Graph (, )][DBLP ] Signcryption Scheme in Multi-user Setting without Random Oracles. [Citation Graph (, )][DBLP ] Denial-of-service resilience password-based group key agreement for wireless networks. [Citation Graph (, )][DBLP ] Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs