Ji-Jian Chin
Orcid: 0000-0001-9809-6976
According to our database1,
Ji-Jian Chin
authored at least 43 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
9
10
1
1
1
7
1
1
3
1
3
1
2
2
5
3
2
1
4
2
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
2023
J. Inf. Secur. Appl., August, 2023
2022
2021
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism.
Symmetry, 2021
A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures.
Symmetry, 2021
J. Inf. Secur. Appl., 2021
Cryptanalysis of an Anonymous Identity-based Identification Scheme in Ad-Hoc Group without Pairings.
IACR Cryptol. ePrint Arch., 2021
F1000Research, 2021
OrBit: OR-Proof Identity-Based Identification with Tight Security for (as Low As) 1-Bit Loss.
Proceedings of the Provable and Practical Security, 2021
Proceedings of the Advances in Cyber Security - Third International Conference, 2021
2020
An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries.
IEEE Access, 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020
Proceedings of the 15th International Conference for Internet Technology and Secured Transactions, 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Advances in Cyber Security - First International Conference, 2019
Proceedings of the Advances in Cyber Security - First International Conference, 2019
2018
2017
IBI-Mobile Authentication: A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
Wirel. Pers. Commun., 2017
Algorithms, 2017
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
2016
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016
On the security advantages of block-based multiserver searchable symmetric encryption.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
2015
Secur. Commun. Networks, 2015
Int. J. Comput. Math., 2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015
Proceedings of the Provable Security, 2015
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015
A Prototype to Facilitate Access Control Using Identity-Based Identification on Mobile Smart Devices.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2014
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2014
2013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013
Inf. Process. Lett., 2013
Proceedings of the SECRYPT 2013, 2013
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2009
Proceedings of the Security Technology, 2009
2008
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.
Proceedings of the Public Key Infrastructure, 2008