2006 |
17 | EE | Yip Wai Kuan,
Alwyn Goh,
David Ngo Chek Ling,
Andrew Teoh Beng Jin:
Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures.
ICB 2006: 509-515 |
16 | EE | David Ngo Chek Ling,
Andrew Teoh Beng Jin,
Alwyn Goh:
Biometric hash: high-confidence face recognition.
IEEE Trans. Circuits Syst. Video Techn. 16(6): 771-775 (2006) |
15 | EE | Andrew Teoh Beng Jin,
Alwyn Goh,
David Ngo Chek Ling:
Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs.
IEEE Trans. Pattern Anal. Mach. Intell. 28(12): 1892-1901 (2006) |
2005 |
14 | EE | Yip Wai Kuan,
Alwyn Goh,
David Ngo Chek Ling,
Andrew Teoh Beng Jin:
Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability.
AutoID 2005: 27-32 |
2004 |
13 | EE | Andrew Teoh Beng Jin,
David Ngo Chek Ling,
Alwyn Goh:
An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.
ICBA 2004: 117-123 |
12 | EE | David Ngo Chek Ling,
Andrew Teoh Beng Jin,
Alwyn Goh:
Eigenspace-Based Face Hashing.
ICBA 2004: 195-199 |
11 | EE | Andrew Teoh Beng Jin,
David Ngo Chek Ling,
Alwyn Goh:
Personalised cryptographic key generation based on FaceHashing.
Computers & Security 23(7): 606-614 (2004) |
10 | EE | Andrew Teoh Beng Jin,
David Ngo Chek Ling,
Alwyn Goh:
Biohashing: two factor authentication featuring fingerprint data and tokenised random number.
Pattern Recognition 37(11): 2245-2255 (2004) |
2003 |
9 | EE | Alwyn Goh,
David Ngo Chek Ling:
Computation of Cryptographic Keys from Face Biometrics.
Communications and Multimedia Security 2003: 1-13 |
8 | EE | Alwyn Goh,
Yip Wai Kuan,
David Ngo Chek Ling:
Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.
Communications and Multimedia Security 2003: 181-193 |
7 | EE | Alwyn Goh,
G. S. Poh,
David Ngo Chek Ling:
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Communications and Multimedia Security 2003: 239-251 |
6 | EE | Alwyn Goh,
David Ngo Chek Ling:
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.
Communications and Multimedia Security 2003: 27-39 |
2002 |
5 | EE | Wai Han Soo,
Azman Samsudin,
Alwyn Goh:
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.
ISC 2002: 446-458 |
2001 |
4 | | Syed Sibte Raza Abidi,
Alwyn Goh:
A Web-Enabled Exam Preparation and Evaluation Service: Providing Real-Time Personalized Tests for Academic Enhancement.
ICALT 2001: 441-442 |
3 | EE | Syed Sibte Raza Abidi,
Kok Meng Hoe,
Alwyn Goh:
Analyzing Data Clusters: A Rough Sets Approach to Extract Cluster-Defining Symbolic Rules.
IDA 2001: 248-257 |
1999 |
2 | | Alwyn Goh,
Syed Sibte Raza Abidi:
Re-Visiting Backpropagation Network Optimization: Towards Maximally Pruned Networks.
IC-AI 1999: 565-570 |
1998 |
1 | | Syed Sibte Raza Abidi,
Alwyn Goh:
Applying Knowledge Discovery to Predict Infectious Disease Epidemics.
PRICAI 1998: 170-181 |