Seguir
Bok-Min Goi
Bok-Min Goi
Senior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Dirección de correo verificada de utar.edu.my - Página principal
Título
Citado por
Citado por
Año
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008
1822008
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
1742006
Cancellable iris template generation based on indexing-first-one hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
1222017
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
1222012
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
1192014
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012
1172012
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
1112016
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
1032005
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
962016
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
902008
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18, 739-755, 2015
822015
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
782013
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
662010
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear dynamics 92 (2), 575-593, 2018
652018
Proxy re-encryption with keyword search: New definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity …, 2010
582010
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
572004
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
Applied Cryptography and Network Security: Third International Conference …, 2005
552005
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
Applied Cryptography and Network Security: 5th International Conference …, 2007
542007
An image encryption scheme based on public key cryptosystem and quantum logistic map
G Ye, K Jiao, X Huang, BM Goi, WS Yap
Scientific Reports 10 (1), 21044, 2020
422020
An alignment-free cancelable fingerprint template for bio-cryptosystems
B Alam, Z Jin, WS Yap, BM Goi
Journal of Network and Computer Applications 115, 20-32, 2018
412018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20