Syh Yuan Tan
Syh Yuan Tan
Verified email at newcastle.ac.uk
Title
Cited by
Cited by
Year
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
532010
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
472015
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
SY Tan, KW Yeow, SO Hwang
IEEE Internet of Things Journal 6 (4), 6384-6395, 2019
232019
A study of attribute-based encryption for body sensor networks
YL Tan, BM Goi, R Komiya, SY Tan
International Conference on Informatics Engineering and Information Science†…, 2011
222011
On the security of a certificateless short signature scheme
R Behnia, SH Heng, SY Tan
Malaysian Journal of Mathematical Sciences 9, 103-113, 2015
142015
On the security of an attribute-based signature scheme
SY Tan, SH Heng, BM Goi
International Conference on U-and E-Service, Science and Technology, 161-168, 2009
122009
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
PS Teh, N Zhang, SY Tan, Q Shi, WH Khoh, R Nawaz
Journal of Ambient Intelligence and Humanized Computing, 1-21, 2019
102019
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
L Guo, Z Li, WC Yau, SY Tan
IEEE Access 8, 26107-26118, 2020
82020
A java implementation of paillier homomorphic encryption scheme
R Harerimana, SY Tan, WC Yau
2017 5th International Conference on Information and Communication†…, 2017
82017
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
82015
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
82013
A variant of Schnorr identity-based identification scheme with tight reduction
SY Tan, SH Heng, RCW Phan, BM Goi
International Conference on Future Generation Information Technology, 361-370, 2011
82011
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
WS Yap, JK Liu, SY Tan, BM Goi
Security and Communication Networks 8 (17), 3094-3098, 2015
72015
Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”
SY Tan
IEEE Access 6, 22464-22465, 2018
62018
Cryptanalysis of a CP-ABE scheme with policy in normal forms
SY Tan, WS Yap
Information Processing Letters 116 (7), 492-495, 2016
52016
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
42013
On the realization of fuzzy identity‐based identification scheme using fingerprint biometrics
SY Tan, Z Jin, ABJ Teoh, BM Goi, SH Heng
Security and Communication Networks 5 (12), 1312-1324, 2012
42012
Fuzzy identity-based identification scheme
SY Tan, SH Heng, BM Goi, SJ Moon
International Conference on U-and E-Service, Science and Technology, 123-130, 2009
42009
Correction to “Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing”
SY Tan
IEEE Access 7, 17045-17049, 2019
32019
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
R Behnia, SY Tan, SH Heng
International Conference on Cryptology in Malaysia, 474-477, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20