Follow
Bok-Min Goi
Bok-Min Goi
Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Verified email at utar.edu.my - Homepage
Title
Cited by
Cited by
Year
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
1772006
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008
1722008
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
1202012
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
1132014
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012
1112012
Cancellable iris template generation based on indexing-first-one hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
1102017
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
1022016
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
952005
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
892008
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
812016
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18, 739-755, 2015
752015
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
672013
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
662010
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
562004
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
Applied Cryptography and Network Security: Third International Conference …, 2005
552005
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear Dynamics 92 (2), 575-593, 2018
542018
Proxy re-encryption with keyword search: new definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity …, 2010
542010
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
Applied Cryptography and Network Security: 5th International Conference …, 2007
532007
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
RCW Phan, BM Goi
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
402006
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture
WK Lee, HS Cheong, RCW Phan, BM Goi
Cluster Computing 19, 335-347, 2016
382016
The system can't perform the operation now. Try again later.
Articles 1–20