Swee-Huay Heng

Orcid: 0000-0003-3627-2131

According to our database1, Swee-Huay Heng authored at least 80 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Comment on "An efficient identity-based signature scheme with provable security".
Inf. Sci., February, 2024

Comment on "Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups".
IEEE Access, 2024

K-Resilient Public Key Authenticated Encryption with Keyword Search.
Proceedings of the 21st International Conference on Security and Cryptography, 2024

2023
New Identity-Based Identification and Signature Schemes in the Standard Model.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A Review of Cryptographic Electronic Voting.
Symmetry, 2022

Blockchain-Enabled Searchable Encryption in Clouds: A Review.
J. Inf. Secur. Appl., 2022

Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review.
IEEE Access, 2022

2021
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism.
Symmetry, 2021

An Implementation Suite for a Hybrid Public Key Infrastructure.
Symmetry, 2021

2020
On the Invisibility and Anonymity of Undeniable Signature Schemes.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020

Blockchain-Based Content Sharing and Data Repository System.
Proceedings of the Advances in Cyber Security - Second International Conference, 2020

2019
A Generic Framework for Accountable Optimistic Fair Exchange Protocol.
Symmetry, 2019

A Note on the Invisibility and Anonymity of Undeniable Signature Schemes.
Proceedings of the Information Security Applications - 20th International Conference, 2019

Blockchain-Based Image Sharing Application.
Proceedings of the Advances in Cyber Security - First International Conference, 2019

2018
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Commun., 2018

2017
From Sealed-Bid Electronic Auction to Electronic Cheque.
Proceedings of the Information Science and Applications 2017, 2017

Known Bid Attack on an Electronic Sealed-Bid Auction Scheme.
Proceedings of the Information Science and Applications 2017, 2017

2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016

Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016

Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

The insecurity of a certificateless undeniable signature scheme.
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016

2015
Cryptanalysis of a certificateless identification scheme.
Secur. Commun. Networks, 2015

A provable secure pairing-free certificateless identification scheme.
Int. J. Comput. Math., 2015

An efficient certificateless undeniable signature scheme.
Int. J. Comput. Math., 2015

Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

Applications of undeniable signature schemes.
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015

On the Security of Two Pairing-Based Signature Schemes.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
Parallelizable MAC revisited.
Secur. Commun. Networks, 2014

Security analysis of GCM for communication.
Secur. Commun. Networks, 2014

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2014

Differential attack on nine rounds of the SEED block cipher.
Inf. Process. Lett., 2014

Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules.
Appl. Soft Comput., 2014

2013
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks.
J. Netw. Comput. Appl., 2013

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013

On the security of a modified Beth identity-based identification scheme.
Inf. Process. Lett., 2013

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013

An Efficient and Provably Secure Certificateless Identification Scheme.
Proceedings of the SECRYPT 2013, 2013

Notes on Two Flawed Attacks on Undeniable Signature Schemes.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Efficient encryption with keyword search in mobile networks.
Secur. Commun. Networks, 2012

On the realization of fuzzy identity-based identification scheme using fingerprint biometrics.
Secur. Commun. Networks, 2012

Policy-enhanced ANFIS model to counter SOAP-related attacks.
Knowl. Based Syst., 2012

Security models for delegated keyword searching within encrypted contents.
J. Internet Serv. Appl., 2012

Short and Efficient Identity-Based Undeniable Signature Scheme.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

2011
On the security of ownership watermarking of digital images based on singular value decomposition.
J. Electronic Imaging, 2011

On the Security of a Hybrid SVD-DCT Watermarking Method Based on LPSNR.
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011

On the Security of Two Fuzzy Identity-Based Signature Schemes.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction.
Proceedings of the Future Generation Information Technology, 2011

On the Security of a Robust Watermarking Scheme Based on RDWT-SVD.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Analysis on the Improved SVD-Based Watermarking Scheme.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Java Implementation for Pairing-Based Cryptosystems.
Proceedings of the Computational Science and Its Applications, 2010

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Attack on a semi-blind watermarking scheme based on singular value decomposition.
Comput. Stand. Interfaces, 2009

Mobile and ubiquitous malware.
Proceedings of the MoMM'2009, 2009

Attacks on a Block Based SVD Watermarking Scheme.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Hierarchical Identity-Based Identification Schemes.
Proceedings of the Security Technology, 2009

2008
The power of identification schemes.
Int. J. Appl. Cryptogr., 2008

Attacks on a robust watermarking scheme based on self-reference image.
Comput. Stand. Interfaces, 2008

Attacks on SVD-Based Watermarking Schemes.
Proceedings of the Intelligence and Security Informatics, 2008

An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.
Proceedings of the Public Key Infrastructure, 2008

Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

On the Security of an Identity-Based Aggregate Signature Scheme.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Cryptanalysis of Some Proxy Signature Schemes Without Certificates.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Linkability of Some Blind Signature Schemes.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007

A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service.
Proceedings of the Computational Science and Its Applications, 2007

Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
The security of the FDH variant of Chaum's undeniable signature scheme.
IEEE Trans. Inf. Theory, 2006

Simplified fuzzy ARTMAP classification of individuals using optimal VEP channels.
Int. J. Knowl. Based Intell. Eng. Syst., 2006

<i>k</i>-Resilient Identity-Based Encryption in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Relations Among Security Notions for Undeniable Signature Schemes.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

New Constructions of Universal Hash Functions Based on Function Sums.
Proceedings of the Computational Science and Its Applications, 2006

An Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
Identity-Based Identification Without Random Oracles.
Proceedings of the Computational Science and Its Applications, 2005

3-Move Undeniable Signature Scheme.
Proceedings of the Advances in Cryptology, 2005

2004
Square Hash with a Small Key Size.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

From Digital Signature to ID-based Identification/Signature.
Proceedings of the Public Key Cryptography, 2004

Universal hash functions over GF(2<sup>n</sup>).
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

k-Resilient Identity-Based Encryption in the Standard Model.
Proceedings of the Topics in Cryptology, 2004


  Loading...