Search

Your search keyword '"Heng, Swee-Huay"' showing total 283 results

Search Constraints

Start Over You searched for: Author "Heng, Swee-Huay" Remove constraint Author: "Heng, Swee-Huay"
283 results on '"Heng, Swee-Huay"'

Search Results

2. A Blockchain-Based E-Voting System

6. Blockchain-Based Content Sharing and Data Repository System

7. Blockchain-Based Image Sharing Application

8. A Note on the Invisibility and Anonymity of Undeniable Signature Schemes

9. Transformation from e-voting to e-cheque.

10. Security-Mediated Certificateless Undeniable Signature Scheme

11. A Generic Framework for Accountable Optimistic Fair Exchange Protocol

17. Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme

25. Short and Efficient Identity-Based Undeniable Signature Scheme

26. On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR

27. A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction

28. On the Security of a Robust Watermarking Scheme Based on RDWT-SVD

29. Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS ’09

32. Analysis on the Improved SVD-Based Watermarking Scheme

33. Java Implementation for Pairing-Based Cryptosystems

36. Fuzzy Identity-Based Identification Scheme

37. An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model

38. Attacks on SVD-Based Watermarking Schemes

39. Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes

42. A Fragile Watermarking Scheme Protecting Originator’s Rights for Multimedia Service

43. Security Mediated Certificateless Signatures

44. Cryptanalysis of Some Proxy Signature Schemes Without Certificates

45. Linkability of Some Blind Signature Schemes

46. Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication : (Extended Abstract)

47. Relations Among Security Notions for Undeniable Signature Schemes

48. An Efficient Certificateless Signature Scheme

49. New Constructions of Universal Hash Functions Based on Function Sums

50. The Power of Identification Schemes

Catalog

Books, media, physical & digital resources