Ji-Jian Chin
Ji-Jian Chin
Verified email at mmu.edu.my
Title
Cited by
Cited by
Year
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
862017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
492015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
European Public Key Infrastructure Workshop, 60-73, 2008
182008
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
International Conference on Security Technology, 93-99, 2009
132009
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
122018
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94 (1), 127-144, 2017
92017
Twin-schnorr: a security upgrade for the schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
92015
Public Key Infrastructure
SF MjÝlsnes, S Mauw, SK Katsikas
Springer, 2008
92008
Security technology
T Kim, MK Khan, W Fang, H Adeli, JG Villalba, KP Arnett
Springer Berlin Heidelberg, 2011
62011
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
52015
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
52013
On the security advantages of block-based multiserver searchable symmetric encryption
MS Mohamad, JJ Chin, GS Poh
2016 14th Annual Conference on Privacy, Security and Trust (PST), 349-352, 2016
42016
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
42015
An efficient and provably secure certificateless identification scheme
B Rouzbeh, SH Heng, JJ Chin, RCW Phan
SECRYPT 2013-Proceedings of the 10th International Conference on Security†…, 2013
42013
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
International Journal of Cryptology Research 2 (1), 15-25, 2010
42010
A k-Resilient Identity-Based Identification Scheme in the Standard Model
SH Heng, JJ Chin
Cryptology 2010, 9-15, 2010
42010
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
32017
On the Hastad’s Attack to LUC4, 6 Cryptosystem and compared with Other RSA-Type Cryptosystem
WT Jin, H Kamarulhali, MRM Said
Malaysian Journal of Mathematical Science 7, 1-17, 2013
32013
An improved efficient provable secure identity-Based identification scheme in the standard model
SY Tan, JJ Chin, SH Heng, BM Goi
KSII Transactions on Internet and Information Systems (TIIS) 7 (4), 910-922, 2013
32013
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology†…, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20