Syh Yuan Tan
Syh Yuan Tan
Verified email at newcastle.ac.uk
Title
Cited by
Cited by
Year
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
482010
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
452015
A study of attribute-based encryption for body sensor networks
YL Tan, BM Goi, R Komiya, SY Tan
International Conference on Informatics Engineering and Information Science†…, 2011
202011
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things
SY Tan, KW Yeow, SO Hwang
IEEE Internet of Things Journal 6 (4), 6384-6395, 2019
182019
On the security of a certificateless short signature scheme
R Behnia, SH Heng, SY Tan
Malays. J. Math. Sci 9, 103-113, 2015
142015
On the security of an attribute-based signature scheme
SY Tan, SH Heng, BM Goi
International Conference on U-and E-Service, Science and Technology, 161-168, 2009
122009
A java implementation of paillier homomorphic encryption scheme
R Harerimana, SY Tan, WC Yau
2017 5th International Conference on Information and Communication†…, 2017
82017
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
82013
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network
WS Yap, JK Liu, SY Tan, BM Goi
Security and Communication Networks 8 (17), 3094-3098, 2015
72015
Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
72015
A variant of Schnorr identity-based identification scheme with tight reduction
SY Tan, SH Heng, RCW Phan, BM Goi
International Conference on Future Generation Information Technology, 361-370, 2011
72011
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern
PS Teh, N Zhang, SY Tan, Q Shi, WH Khoh, R Nawaz
Journal of Ambient Intelligence and Humanized Computing, 1-21, 2019
52019
Cryptanalysis of a CP-ABE scheme with policy in normal forms
SY Tan, WS Yap
Information Processing Letters 116 (7), 492-495, 2016
52016
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
L Guo, Z Li, WC Yau, SY Tan
IEEE Access 8, 26107-26118, 2020
42020
Comment on “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”
SY Tan
IEEE Access 6, 22464-22465, 2018
42018
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
42013
On the realization of fuzzy identity‐based identification scheme using fingerprint biometrics
SY Tan, Z Jin, ABJ Teoh, BM Goi, SH Heng
Security and Communication Networks 5 (12), 1312-1324, 2012
42012
Fuzzy identity-based identification scheme
SY Tan, SH Heng, BM Goi, SJ Moon
International Conference on U-and E-Service, Science and Technology, 123-130, 2009
42009
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme
R Behnia, SY Tan, SH Heng
International Conference on Cryptology in Malaysia, 474-477, 2016
32016
An optimized pairing-based cryptography library for Android
SY Tan, CS Wong, HH Ng
Int. J. Cryptol. Res. 6 (1), 16-30, 2016
32016
The system can't perform the operation now. Try again later.
Articles 1–20