Enhancement of a lightweight attribute-based encryption scheme for the Internet of Things SY Tan, KW Yeow, SO Hwang IEEE Internet of Things Journal 6 (4), 6384-6395, 2019 | 72 | 2019 |
Java implementation for pairing-based cryptosystems SY Tan, SH Heng, BM Goi International Conference on Computational Science and Its Applications, 188-198, 2010 | 66 | 2010 |
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ... Human-centric Computing and Information Sciences 5, 1-16, 2015 | 65 | 2015 |
Strengthen user authentication on mobile devices by using user’s touch dynamics pattern PS Teh, N Zhang, SY Tan, Q Shi, WH Khoh, R Nawaz Journal of Ambient Intelligence and Humanized Computing 11, 4019-4039, 2020 | 47 | 2020 |
A study of attribute-based encryption for body sensor networks YL Tan, BM Goi, R Komiya, SY Tan Informatics Engineering and Information Science: International Conference …, 2011 | 29 | 2011 |
A decryptable attribute-based keyword search scheme on ehealth cloud in Internet of Things platforms L Guo, Z Li, WC Yau, SY Tan IEEE Access 8, 26107-26118, 2020 | 24 | 2020 |
On the security of an attribute-based signature scheme SY Tan, SH Heng, BM Goi U-and E-Service, Science and Technology: International Conference, UNESST …, 2009 | 21 | 2009 |
MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System SY Tan, T Groß International Conference on the Theory and Application of Cryptology and …, 2020 | 20 | 2020 |
A variant of Schnorr identity-based identification scheme with tight reduction SY Tan, SH Heng, RCW Phan, BM Goi Future Generation Information Technology: Third International Conference …, 2011 | 17 | 2011 |
Twin‐Schnorr: A Security Upgrade for the Schnorr Identity‐Based Identification Scheme JJ Chin, SY Tan, SH Heng, RCW Phan The Scientific World Journal 2015 (1), 237514, 2015 | 16 | 2015 |
A Java implementation of paillier homomorphic encryption scheme R Harerimana, SY Tan, WC Yau 2017 5th International Conference on Information and Communication …, 2017 | 11 | 2017 |
ECQV-IBI: Identity-based identification with implicit certification A Braeken, JJ Chin, SY Tan Journal of Information Security and Applications 63, 103027, 2021 | 9 | 2021 |
On the invisibility and anonymity of undeniable signature schemes JC Loh, SH Heng, SY Tan, K Kurosawa Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2020 | 8 | 2020 |
Correction to “improving privacy and security in decentralizing multi-authority attribute-based encryption in cloud computing” SY Tan IEEE Access 7, 17045-17049, 2019 | 8 | 2019 |
Comment on “Secure data access control with ciphertext update and computation outsourcing in fog computing for internet of things” SY Tan IEEE Access 6, 22464-22465, 2018 | 7 | 2018 |
A variant of BLS signature scheme with tight security reduction TS Ng, SY Tan, JJ Chin International Conference on Mobile Networks and Management, 150-163, 2017 | 7 | 2017 |
An authentication framework for peer-to-peer cloud GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin Proceedings of the 6th international conference on security of information …, 2013 | 7 | 2013 |
On the security of a modified Beth identity-based identification scheme JJ Chin, SY Tan, SH Heng, RCW Phan Information Processing Letters 113 (14-16), 580-583, 2013 | 7 | 2013 |
A q-SDH-based graph signature scheme on full-domain messages with efficient protocols SY Tan, I Sfyrakis, T Groß Cryptology ePrint Archive, 2020 | 6 | 2020 |
A variant of Schnorr signature scheme with tight security reduction TS Ng, SY Tan, JJ Chin 2017 International Conference on Information and Communication Technology …, 2017 | 6 | 2017 |