关注
Ji-Jian Chin
Ji-Jian Chin
在 plymouth.ac.uk 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
1502017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
652015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008
222008
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
202021
A review of cryptographic electronic voting
YX Kho, SH Heng, JJ Chin
Symmetry 14 (5), 858, 2022
162022
Searchable Symmetric Encryption Over Multiple Servers
P Geong-Sen, M Soeheila Moesfa, C Ji-Jian
ArcticCrypt 2016, 2016
16*2016
Twin-Schnorr: a security upgrade for the Schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
162015
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009
132009
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94, 127-144, 2017
122017
An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin
IEEE Access 8, 61711-61725, 2020
82020
ECQV-IBI: Identity-based identification with implicit certification
A Braeken, JJ Chin, SY Tan
Journal of Information Security and Applications 63, 103027, 2021
72021
Digital signature schemes with strong existential unforgeability
J Chia, JJ Chin, SC Yip
F1000Research 10, 2021
72021
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
72017
Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model
C Ji-Jian, H Swee-Huay
Malaysian Journal of Mathematical Science 7, 73-85, 2013
7*2013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
72013
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
62017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
62015
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
62015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 international conference on security and cryptography (SECRYPT), 1-8, 2013
62013
Evolution of Bitcoin addresses from security perspectives
WK Chan, JJ Chin, VT Goh
2020 15th International Conference for Internet Technology and Secured …, 2020
52020
系统目前无法执行此操作,请稍后再试。
文章 1–20