dblp.uni-trier.dewww.uni-trier.de

Alwyn Goh

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
17EEYip Wai Kuan, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin: Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures. ICB 2006: 509-515
16EEDavid Ngo Chek Ling, Andrew Teoh Beng Jin, Alwyn Goh: Biometric hash: high-confidence face recognition. IEEE Trans. Circuits Syst. Video Techn. 16(6): 771-775 (2006)
15EEAndrew Teoh Beng Jin, Alwyn Goh, David Ngo Chek Ling: Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs. IEEE Trans. Pattern Anal. Mach. Intell. 28(12): 1892-1901 (2006)
2005
14EEYip Wai Kuan, Alwyn Goh, David Ngo Chek Ling, Andrew Teoh Beng Jin: Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability. AutoID 2005: 27-32
2004
13EEAndrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh: An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number. ICBA 2004: 117-123
12EEDavid Ngo Chek Ling, Andrew Teoh Beng Jin, Alwyn Goh: Eigenspace-Based Face Hashing. ICBA 2004: 195-199
11EEAndrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh: Personalised cryptographic key generation based on FaceHashing. Computers & Security 23(7): 606-614 (2004)
10EEAndrew Teoh Beng Jin, David Ngo Chek Ling, Alwyn Goh: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recognition 37(11): 2245-2255 (2004)
2003
9EEAlwyn Goh, David Ngo Chek Ling: Computation of Cryptographic Keys from Face Biometrics. Communications and Multimedia Security 2003: 1-13
8EEAlwyn Goh, Yip Wai Kuan, David Ngo Chek Ling: Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage. Communications and Multimedia Security 2003: 181-193
7EEAlwyn Goh, G. S. Poh, David Ngo Chek Ling: Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. Communications and Multimedia Security 2003: 239-251
6EEAlwyn Goh, David Ngo Chek Ling: Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. Communications and Multimedia Security 2003: 27-39
2002
5EEWai Han Soo, Azman Samsudin, Alwyn Goh: Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network. ISC 2002: 446-458
2001
4 Syed Sibte Raza Abidi, Alwyn Goh: A Web-Enabled Exam Preparation and Evaluation Service: Providing Real-Time Personalized Tests for Academic Enhancement. ICALT 2001: 441-442
3EESyed Sibte Raza Abidi, Kok Meng Hoe, Alwyn Goh: Analyzing Data Clusters: A Rough Sets Approach to Extract Cluster-Defining Symbolic Rules. IDA 2001: 248-257
1999
2 Alwyn Goh, Syed Sibte Raza Abidi: Re-Visiting Backpropagation Network Optimization: Towards Maximally Pruned Networks. IC-AI 1999: 565-570
1998
1 Syed Sibte Raza Abidi, Alwyn Goh: Applying Knowledge Discovery to Predict Infectious Disease Epidemics. PRICAI 1998: 170-181

Coauthor Index

1Syed Sibte Raza Abidi [1] [2] [3] [4]
2Kok Meng Hoe [3]
3Yip Wai Kuan [8] [14] [17]
4David Chek Ling Ngo (David Ngo Chek Ling) [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17]
5G. S. Poh [7]
6Azman Samsudin [5]
7Wai Han Soo [5]
8Andrew Beng Jin Teoh (Andrew Teoh Beng Jin) [10] [11] [12] [13] [14] [15] [16] [17]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)