关注
Jia-Chng Loh
Jia-Chng Loh
在 uow.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules
J Ning, GS Poh, JC Loh, J Chia, EC Chang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
552019
Pine: Enabling privacy-preserving deep packet inspection on TLS with rule-hiding and fast connection establishment
J Ning, X Huang, GS Poh, S Xu, JC Loh, J Weng, RH Deng
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
232020
On the invisibility and anonymity of undeniable signature schemes
JC Loh, SH Heng, SY Tan, K Kurosawa
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2020
82020
A Generic Framework for Accountable Optimistic Fair Exchange Protocol
JC Loh, SH Heng, SY Tan
Information Security Practice and Experience: 14th International Conference …, 2018
42018
A Generic Framework for Accountable Optimistic Fair Exchange Protocol
JC Loh, SH Heng, SY Tan
Symmetry 11 (2), 285, 2019
32019
A note on the invisibility and anonymity of undeniable signature schemes
JC Loh, SH Heng, SY Tan, K Kurosawa
Information Security Applications: 20th International Conference, WISA 2019 …, 2020
12020
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates
JC Loh, GS Poh, JHM Ying, J Xu, HW Lim, J Pan, W Wong
1*
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM
JC Loh, F Guo, W Susilo, G Yang
Australasian Conference on Information Security and Privacy, 199-219, 2023
2023
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes
JC Loh, SH Heng, SY Tan, K Kurosawa
International Workshop on Information Security Applications, 112-125, 2019
2019
A survey on optimistic fair exchange protocol and its variants
JC Loh, SH Heng, SY Tan
Information and Communication Technology (ICoIC7), 2017 5th International …, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–10