Hoon Wei Lim
Hoon Wei Lim
Verified email at
Cited by
Cited by
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
Shorter IBE and signatures via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
Identity-based cryptography for grid security
HW Lim, KG Paterson
International Journal of Information Security 10, 15-32, 2011
On Identity-Based Cryptography and Grid Computing
HW Lim, MJB Robshaw
Computational Science-ICCS 2004: 4th International Conference, Kraków …, 2004
HAtt: Hybrid remote attestation for the Internet of Things with high availability
MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal 7 (8), 7220-7233, 2020
A Dynamic Key Infrastructure for Grid
HW Lim, MJB Robshaw
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
Combined public-key schemes: The case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
On the application of identity-based cryptography in grid security
HW Lim
University of London, 2006
What can identity-based cryptography offer to web services?
J Crampton, HW Lim, KG Paterson
Proceedings of the 2007 ACM workshop on Secure web services, 26-36, 2007
Distributed searchable symmetric encryption
C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
Cross-domain password-based authenticated key exchange revisited
L Chen, HW Lim, G Yang
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014
User-friendly grid security architecture and protocols
L Chen, HW Lim, W Mao
Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007
Privacy-preserving billing for e-ticketing systems in public transportation
F Kerschbaum, HW Lim, I Gudymenko
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
Data integrity threats and countermeasures in railway spot transmission systems
HW Lim, WG Temple, BAN Tran, B Chen, Z Kalbarczyk, J Zhou
ACM Transactions on Cyber-Physical Systems 4 (1), 1-26, 2019
Workflow signatures for business process compliance
HW Lim, F Kerschbaum, H Wang
IEEE Transactions on Dependable and Secure Computing 9 (5), 756-769, 2012
A certificate-free grid security infrastructure supporting password-based user authentication
J Crampton, HW Lim, KG Paterson, G Price
Proceedings of the 6th Annual PKI R&D Workshop, 103-118, 2007
: Privacy-Preserving Integration and Sharing of Datasets
HW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
A survey of privacy-preserving techniques for encrypted traffic inspection over network middleboxes
GS Poh, DM Divakaran, HW Lim, J Ning, A Desai
arXiv preprint arXiv:2101.04338, 2021
Authenticated key exchange protocols for parallel network file systems
HW Lim, G Yang
IEEE transactions on parallel and distributed systems 27 (1), 92-105, 2015
The system can't perform the operation now. Try again later.
Articles 1–20