Searchable symmetric encryption: Designs and challenges GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017 | 165 | 2017 |
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ... Human-centric Computing and Information Sciences 5, 1-16, 2015 | 67 | 2015 |
A review of cryptographic electronic voting YX Kho, SH Heng, JJ Chin Symmetry 14 (5), 858, 2022 | 26 | 2022 |
Simple and scalable blockchain with privacy WK Chan, JJ Chin, VT Goh Journal of Information Security and Applications 58, 102700, 2021 | 24 | 2021 |
An efficient and provable secure identity-based identification scheme in the standard model JJ Chin, SH Heng, BM Goi Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008 | 21 | 2008 |
Searchable Symmetric Encryption Over Multiple Servers P Geong-Sen, M Soeheila Moesfa, C Ji-Jian ArcticCrypt 2016, 2016 | 16* | 2016 |
Twin‐Schnorr: A Security Upgrade for the Schnorr Identity‐Based Identification Scheme JJ Chin, SY Tan, SH Heng, RCW Phan The Scientific World Journal 2015 (1), 237514, 2015 | 16 | 2015 |
Digital signature schemes with strong existential unforgeability J Chia, JJ Chin, SC Yip F1000Research 10, 2021 | 14 | 2021 |
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices TY Teh, YS Lee, ZY Cheah, JJ Chin Wireless Personal Communications 94, 127-144, 2017 | 13 | 2017 |
Hierarchical identity-based identification schemes JJ Chin, SH Heng, BM Goi Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009 | 13 | 2009 |
ECQV-IBI: Identity-based identification with implicit certification A Braeken, JJ Chin, SY Tan Journal of Information Security and Applications 63, 103027, 2021 | 11 | 2021 |
Comparison of label encoding and evidence counting for malware classification MX Low, TTV Yap, WK Soo, H Ng, VT Goh, JJ Chin, TY Kuek Journal of System and Management Sciences 12 (6), 17-30, 2022 | 8 | 2022 |
An identity based-identification scheme with tight security against active and concurrent adversaries J Chia, JJ Chin IEEE Access 8, 61711-61725, 2020 | 8 | 2020 |
Driving simulator for drivers education with artificial intelligence traffic and virtual reality: a review YQ Cheng, S Mansor, JJ Chin, HA Karim Proceedings of the 8th International Conference on Computational Science and …, 2022 | 7 | 2022 |
A variant of BLS signature scheme with tight security reduction TS Ng, SY Tan, JJ Chin International Conference on Mobile Networks and Management, 150-163, 2017 | 7 | 2017 |
Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model C Ji-Jian, H Swee-Huay Malaysian Journal of Mathematical Science 7, 73-85, 2013 | 7* | 2013 |
On the security of a modified Beth identity-based identification scheme JJ Chin, SY Tan, SH Heng, RCW Phan Information Processing Letters 113 (14-16), 580-583, 2013 | 7 | 2013 |
Evolution of Bitcoin addresses from security perspectives WK Chan, JJ Chin, VT Goh 2020 15th International Conference for Internet Technology and Secured …, 2020 | 6 | 2020 |
A variant of Schnorr signature scheme with tight security reduction TS Ng, SY Tan, JJ Chin 2017 International Conference on Information and Communication Technology …, 2017 | 6 | 2017 |
Reset-secure identity-based identification schemes without pairings JJ Chin, H Anada, SY Tan International Conference on Provable Security, 227-246, 2015 | 6 | 2015 |