Ji-Jian Chin
Ji-Jian Chin
Verified email at mmu.edu.my
Title
Cited by
Cited by
Year
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
712017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
452015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
162008
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
International Conference on Security Technology, 93-99, 2009
122009
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
102018
IBI-Mobile Authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94 (1), 127-144, 2017
82017
Twin-schnorr: a security upgrade for the schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
62015
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
52015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 International Conference on Security and Cryptography (SECRYPT), 1-8, 2013
52013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
42013
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
International Journal of Cryptology Research 2 (1), 15-25, 2010
42010
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
Cryptology 2010, 9-15, 2010
42010
On the security advantages of block-based multiserver searchable symmetric encryption
MS Mohamad, JJ Chin, GS Poh
2016 14th Annual Conference on Privacy, Security and Trust (PST), 349-352, 2016
32016
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
SY Tan, JJ Chin, SH Heng, BM Goi
TIIS 7 (4), 910-922, 2013
32013
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
22017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
22015
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications
SY Tan, JJ Chin, GS Poh, YHS Kam, WC Yau
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
22015
A provable secure pairing-free certificateless identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan, R Behnia
International Journal of Computer Mathematics 92 (8), 1520-1535, 2015
22015
Security Upgrade for a k-Resilient Identity-Based Identification Scheme in the Standard Model
JJ Chin, SH Heng
Cryptology 2012, 136-142, 2012
22012
Security Upgrade for a k-Resilient Identity-Based Identification Scheme in the Standard Model
JJCSH Heng
Malaysian Journal of Mathematical Sciences 7 (S), 73-85, 0
2*
The system can't perform the operation now. Try again later.
Articles 1–20