Bok-Min Goi
Orcid: 0000-0002-9854-7121
According to our database1,
Bok-Min Goi
authored at least 122 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform.
Clust. Comput., November, 2024
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map.
J. Inf. Secur. Appl., 2024
Privacy-Preserving Detection of Helmet and Mask Wearing with Fully Homomorphic Encryption: Towards a Secure Inference Approach.
Proceedings of the 8th IEEE Forum on Research and Technologies for Society and Industry Innovation, 2024
2023
Digit. Commun. Networks, February, 2023
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography.
IEEE Trans. Inf. Forensics Secur., 2023
Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023
2022
KSII Trans. Internet Inf. Syst., 2022
Int. J. Inf. Comput. Secur., 2022
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022
2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA.
J. Supercomput., 2021
Accelerating number theoretic transform in GPU platform for fully homomorphic encryption.
J. Supercomput., 2021
Towards Better Performance for Protected Iris Biometric System with Confidence Matrix.
Symmetry, 2021
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
2020
IEEE Trans. Very Large Scale Integr. Syst., 2020
Neural Comput. Appl., 2020
Multim. Tools Appl., 2020
IEEE Internet Things J., 2020
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020
2019
Symmetry, 2019
Pedestrian gender classification using combined global and local parts-based convolutional neural networks.
Pattern Anal. Appl., 2019
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification.
Neural Networks, 2019
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019
Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures.
Concurr. Comput. Pract. Exp., 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Proceedings of the 2019 3rd International Conference on Digital Signal Processing, 2019
Proceedings of the 2019 3rd International Conference on Digital Signal Processing, 2019
2018
Cancellable speech template via random binary orthogonal matrices projection hashing.
Pattern Recognit., 2018
J. Netw. Comput. Appl., 2018
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Commun., 2018
IEEE Access, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 International Conference on Information Networking, 2018
Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018
2017
Pattern Recognit., 2017
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2017
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017
Proceedings of the International Carnahan Conference on Security Technology, 2017
Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017
2016
Wirel. Pers. Commun., 2016
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication.
IEEE Trans. Syst. Man Cybern. Syst., 2016
Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation.
Pattern Recognit., 2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016
Int. J. Commun. Syst., 2016
Clust. Comput., 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
Bi-local region based iris segmentation framework for less- constrained visible wavelength images.
Proceedings of the 7th International Conference on Imaging for Crime Detection and Prevention, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015
Improving the probability of complete decoding of random code by trading-off computational complexity.
IET Commun., 2015
Comput. Electr. Eng., 2015
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2015
Small-angle approximation attack on angle-based many-to-one functions for biometric templates.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015
2014
A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template.
Secur. Commun. Networks, 2014
A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template.
Pattern Recognit. Lett., 2014
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014
Non-invertible analysis on Graph-based Hamming Embedding Transform for protecting fingerprint minutiae.
Proceedings of the International Conference on Electronics, Information and Communications, 2014
2013
J. Signal Process. Syst., 2013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013
Int. J. Commun. Syst., 2013
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013
IEICE Trans. Commun., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013
2012
Secur. Commun. Networks, 2012
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics.
Secur. Commun. Networks, 2012
J. Internet Serv. Appl., 2012
MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks
CoRR, 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012
2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011
Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks.
KSII Trans. Internet Inf. Syst., 2011
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting.
KSII Trans. Internet Inf. Syst., 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the Future Generation Information Technology, 2011
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
2009
Comput. Stand. Interfaces, 2009
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Security Technology, 2009
2008
Comput. Stand. Interfaces, 2008
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.
Proceedings of the Public Key Infrastructure, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007
Proceedings of the Computational Science and Its Applications, 2007
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection.
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Comput. Commun., 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
Proceedings of the Progress in Cryptology, 2005
On the Security Bounds of CMC, EME, EME<sup>+</sup> and EME<sup>*</sup> Modes of Operation.
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
Proceedings of the Computational Science and Its Applications, 2005
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'.
IEEE Trans. Consumer Electron., 2004
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004
2003
Computational complexity and implementation aspects of the incremental hash function.
IEEE Trans. Consumer Electron., 2003
2001
Proceedings of the Progress in Cryptology, 2001