Alwyn Goh
According to our database1,
Alwyn Goh
authored at least 26 papers
between 1998 and 2017.
Collaborative distances:
Collaborative distances:
Timeline
1998
2000
2002
2004
2006
2008
2010
2012
2014
2016
0
1
2
3
4
5
2
1
2
1
3
1
1
1
1
2
4
1
2
2
2
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2017
Proceedings of the 2017 International Conference on Advances in Computing, 2017
2016
Challenge response interaction for biometric liveness establishment and template protection.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
2015
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015
2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
2006
IEEE Trans. Circuits Syst. Video Technol., 2006
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs.
IEEE Trans. Pattern Anal. Mach. Intell., 2006
Proceedings of the Advances in Biometrics, International Conference, 2006
2005
Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005
2004
Biohashing: two factor authentication featuring fingerprint data and tokenised random number.
Pattern Recognit., 2004
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.
Proceedings of the Biometric Authentication, First International Conference, 2004
Proceedings of the Biometric Authentication, First International Conference, 2004
2003
Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.
Proceedings of the Communications and Multimedia Security, 2003
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Proceedings of the Communications and Multimedia Security, 2003
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.
Proceedings of the Communications and Multimedia Security, 2003
Proceedings of the Communications and Multimedia Security, 2003
2002
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.
Proceedings of the Information Security, 5th International Conference, 2002
2001
Analyzing Data Clusters: A Rough Sets Approach to Extract Cluster-Defining Symbolic Rules.
Proceedings of the Advances in Intelligent Data Analysis, 4th International Conference, 2001
A Web-Enabled Exam Preparation and Evaluation Service: Providing Real-Time Personalized Tests for Academic Enhancement.
Proceedings of the Proceedings IEEE International Conference on Advanced Learning Technology: Issues, 2001
1999
Proceedings of the Medical Informatics Europe '99, Proceedings, Ljubljana, Slovenia, 1999
Re-Visiting Backpropagation Network Optimization: Towards Maximally Pruned Networks.
Proceedings of the International Conference on Artificial Intelligence, 1999
1998
Proceedings of the PRICAI'98, 1998
Telemedicine and Medical Informatics in the Multimedia Super Corridor: The Malaysian Vision.
Proceedings of the MEDINFO '98, 1998