Hoon Wei Lim
Orcid: 0000-0002-7830-3007Affiliations:
- Royal Holloway, University of London, UK
According to our database1,
Hoon Wei Lim
authored at least 49 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems.
ACM Trans. Cyber Phys. Syst., January, 2024
KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
IEEE Syst. J., 2022
IEEE Internet Things J., 2022
2021
IACR Cryptol. ePrint Arch., 2021
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
ACM Trans. Cyber Phys. Syst., 2020
IEEE Internet Things J., 2020
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates.
IACR Cryptol. ePrint Arch., 2020
2016
IEEE Trans. Parallel Distributed Syst., 2016
2015
Proceedings of the Computer Security - ESORICS 2015, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
Des. Codes Cryptogr., 2014
The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014
Des. Codes Cryptogr., 2014
Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
IACR Cryptol. ePrint Arch., 2012
CoRR, 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Provable Security - 6th International Conference, 2012
2011
Int. J. Inf. Sec., 2011
Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011
An Efficient Cacheable Secure Scalar Product Protocol for Privacy-Preserving Data Mining.
Proceedings of the Data Warehousing and Knowledge Discovery, 2011
2009
Proceedings of the Public Key Infrastructures, Services and Applications, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the Cryptography and Coding, 2007
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
2005
Proceedings of the Security Protocols, 2005
Proceedings of the Security Protocols, 2005
Proceedings of the Advances in Grid Computing, 2005
2004
Proceedings of the Computational Science, 2004