Swee-Huay Heng
Orcid: 0000-0003-3627-2131
According to our database1,
Swee-Huay Heng
authored at least 80 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Inf. Sci., February, 2024
Comment on "Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups".
IEEE Access, 2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
2023
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
J. Inf. Secur. Appl., 2022
IEEE Access, 2022
2021
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism.
Symmetry, 2021
2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
Proceedings of the Advances in Cyber Security - Second International Conference, 2020
2019
Symmetry, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Advances in Cyber Security - First International Conference, 2019
2018
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Commun., 2018
2017
Proceedings of the Information Science and Applications 2017, 2017
Proceedings of the Information Science and Applications 2017, 2017
2016
On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme.
Cryptogr. Commun., 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the 2016 International Wireless Communications and Mobile Computing Conference (IWCMC), 2016
2015
Secur. Commun. Networks, 2015
Int. J. Comput. Math., 2015
Int. J. Comput. Math., 2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015
Proceedings of the 2015 IEEE International Conference on Signal and Image Processing Applications, 2015
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2014
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2014
Inf. Process. Lett., 2014
Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules.
Appl. Soft Comput., 2014
2013
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks.
J. Netw. Comput. Appl., 2013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013
Inf. Process. Lett., 2013
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Secur. Commun. Networks, 2012
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics.
Secur. Commun. Networks, 2012
Knowl. Based Syst., 2012
J. Internet Serv. Appl., 2012
Proceedings of the Trust, Privacy and Security in Digital Business, 2012
2011
On the security of ownership watermarking of digital images based on singular value decomposition.
J. Electronic Imaging, 2011
Proceedings of the Advances in Image and Video Technology - 5th Pacific Rim Symposium, 2011
Proceedings of the 4th IFIP International Conference on New Technologies, 2011
Proceedings of the Future Generation Information Technology, 2011
Proceedings of the Future Generation Information Technology, 2011
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Proceedings of the Computational Science and Its Applications, 2010
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010
2009
Comput. Stand. Interfaces, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Security Technology, 2009
2008
Comput. Stand. Interfaces, 2008
Proceedings of the Intelligence and Security Informatics, 2008
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.
Proceedings of the Public Key Infrastructure, 2008
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007
Proceedings of the Computational Science and Its Applications, 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
IEEE Trans. Inf. Theory, 2006
Int. J. Knowl. Based Intell. Eng. Syst., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006
2005
Proceedings of the Computational Science and Its Applications, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004
Proceedings of the Topics in Cryptology, 2004