The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bok-Min Goi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Raphael Chung-Wei Phan, Bok-Min Goi
    Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:33-39 [Conf]
  2. Raphael C.-W. Phan, Bok-Min Goi
    Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:226-238 [Conf]
  3. Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi
    Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:369-382 [Conf]
  4. Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi
    Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:936-944 [Conf]
  5. Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
    An Efficient Certificateless Signature Scheme. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:322-331 [Conf]
  6. Chee-Seng Leong, Bok-Min Goi
    Smart Home Microcontroller: Telephone Interfacing. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2006, pp:424-431 [Conf]
  7. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2005, pp:488-497 [Conf]
  8. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. [Citation Graph (0, 0)][DBLP]
    ICCSA (4), 2005, pp:1065-1074 [Conf]
  9. Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi
    Cryptanalysis of PASS II and MiniPass. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:159-168 [Conf]
  10. Raphael Chung-Wei Phan, Bok-Min Goi
    On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:136-146 [Conf]
  11. Michael Coglianese, Bok-Min Goi
    MaTRU: A New NTRU-Based Cryptosystem. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:232-243 [Conf]
  12. Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah
    Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:50-61 [Conf]
  13. Raphael C.-W. Phan, Bok-Min Goi
    Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:104-117 [Conf]
  14. Raphael Chung-Wei Phan, Bok-Min Goi, Kah-Hoong Wong
    Cryptanalysis of some improved password-authenticated key exchange schemes. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2822-2829 [Journal]
  15. Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi
    Security Mediated Certificateless Signatures. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:459-477 [Conf]
  16. Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng
    A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:644-654 [Conf]
  17. Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah
    Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. [Citation Graph (0, 0)][DBLP]
    ICCSA (1), 2007, pp:951-960 [Conf]
  18. Raphael C.-W. Phan, Bok-Min Goi
    On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    UIC, 2007, pp:1213-1221 [Conf]
  19. Wun-She Yap, Swee-Huay Heng, Bok-Min Goi
    Cryptanalysis of Some Proxy Signature Schemes Without Certificates. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:115-126 [Conf]

  20. On the Security of an Identity-Based Aggregate Signature Scheme. [Citation Graph (, )][DBLP]


  21. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. [Citation Graph (, )][DBLP]


  22. Attacks on Improved Key Distribution Protocols with Perfect Reparability. [Citation Graph (, )][DBLP]


  23. (In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map. [Citation Graph (, )][DBLP]


  24. An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. [Citation Graph (, )][DBLP]


  25. Java Implementation for Pairing-Based Cryptosystems. [Citation Graph (, )][DBLP]


  26. Attacks on a Block Based SVD Watermarking Scheme. [Citation Graph (, )][DBLP]


  27. (In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005. [Citation Graph (, )][DBLP]


  28. On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. [Citation Graph (, )][DBLP]


  29. Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002