Volgen
Syh Yuan Tan
Syh Yuan Tan
Geverifieerd e-mailadres voor newcastle.ac.uk
Titel
Geciteerd door
Geciteerd door
Jaar
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
SY Tan, KW Yeow, SO Hwang
IEEE Internet of Things Journal 6 (4), 6384-6395, 2019
722019
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
662010
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
652015
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
PS Teh, N Zhang, SY Tan, Q Shi, WH Khoh, R Nawaz
Journal of Ambient Intelligence and Humanized Computing 11, 4019-4039, 2020
442020
A study of attribute-based encryption for body sensor networks
YL Tan, BM Goi, R Komiya, SY Tan
Informatics Engineering and Information Science: International Conference …, 2011
292011
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
L Guo, Z Li, WC Yau, SY Tan
IEEE Access 8, 26107-26118, 2020
222020
On the security of an attribute-based signature scheme
SY Tan, SH Heng, BM Goi
U-and E-Service, Science and Technology: International Conference, UNESST …, 2009
212009
MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System
SY Tan, T Groß
International Conference on the Theory and Application of Cryptology and …, 2020
202020
A variant of Schnorr identity-based identification scheme with tight reduction
SY Tan, SH Heng, RCW Phan, BM Goi
Future Generation Information Technology: Third International Conference …, 2011
172011
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
162015
A java implementation of paillier homomorphic encryption scheme
R Harerimana, SY Tan, WC Yau
2017 5th International Conference on Information and Communication …, 2017
112017
On the invisibility and anonymity of undeniable signature schemes
JC Loh, SH Heng, SY Tan, K Kurosawa
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2020
82020
Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
SY Tan
IEEE Access 7, 17045-17049, 2019
72019
Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”
SY Tan
IEEE Access 6, 22464-22465, 2018
72018
A Variant of BLS Signature Scheme with Tight Security Reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
72017
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information …, 2013
72013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
72013
ECQV-IBI: Identity-based identification with implicit certification
A Braeken, JJ Chin, SY Tan
Journal of Information Security and Applications 63, 103027, 2021
62021
A q-SDH-based graph signature scheme on full-domain messages with efficient protocols
SY Tan, I Sfyrakis, T Groß
Newcastle University, 2020
62020
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
62017
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20