dblp.uni-trier.dewww.uni-trier.de

Swee-Huay Heng

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
23EEWun-She Yap, Swee-Huay Heng, Bok-Min Goi: On the Security of an Identity-Based Aggregate Signature Scheme. AINA Workshops 2008: 1523-1528
22EEWei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi: Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. ATC 2008: 100-105
21EEJi-Jian Chin, Swee-Huay Heng, Bok-Min Goi: An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. EuroPKI 2008: 60-73
20EEHuo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng: Attacks on SVD-Based Watermarking Schemes. ISI Workshops 2008: 83-91
19EEKaoru Kurosawa, Swee-Huay Heng: The power of identification schemes. IJACT 1(1): 60-69 (2008)
2007
18EEWun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi: Security Mediated Certificateless Signatures. ACNS 2007: 459-477
17EEGrace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng: A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. ICCSA (1) 2007: 644-654
16EERaphael C.-W. Phan, Kim-Kwang Raymond Choo, Swee-Huay Heng: Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication. ProvSec 2007: 169-177
15EEWun-She Yap, Swee-Huay Heng, Bok-Min Goi: Cryptanalysis of Some Proxy Signature Schemes Without Certificates. WISTP 2007: 115-126
14EESwee-Huay Heng, Wun-She Yap, Khoongming Khoo: Linkability of Some Blind Signature Schemes. WISTP 2007: 80-89
2006
13EEWun-She Yap, Swee-Huay Heng, Bok-Min Goi: An Efficient Certificateless Signature Scheme. EUC Workshops 2006: 322-331
12EEKhoongming Khoo, Swee-Huay Heng: New Constructions of Universal Hash Functions Based on Function Sums. ICCSA (3) 2006: 416-425
11EEKaoru Kurosawa, Swee-Huay Heng: The Power of Identification Schemes. Public Key Cryptography 2006: 364-377
10EEKaoru Kurosawa, Swee-Huay Heng: Relations Among Security Notions for Undeniable Signature Schemes. SCN 2006: 34-48
9EEWakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng: The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Transactions on Information Theory 52(5): 2006-2017 (2006)
8EESwee-Huay Heng, Kaoru Kurosawa: k-Resilient Identity-Based Encryption in the Standard Model. IEICE Transactions 89-A(1): 39-46 (2006)
2005
7EEKaoru Kurosawa, Swee-Huay Heng: 3-Move Undeniable Signature Scheme. EUROCRYPT 2005: 181-197
6EEKaoru Kurosawa, Swee-Huay Heng: Identity-Based Identification Without Random Oracles. ICCSA (2) 2005: 603-613
5EEWakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng: The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. Public Key Cryptography 2005: 328-345
2004
4EESwee-Huay Heng, Kaoru Kurosawa: k-Resilient Identity-Based Encryption in the Standard Model. CT-RSA 2004: 67-80
3EEKaoru Kurosawa, Swee-Huay Heng: From Digital Signature to ID-based Identification/Signature. Public Key Cryptography 2004: 248-261
2EESwee-Huay Heng, Kaoru Kurosawa: Square Hash with a Small Key Size. IEICE Transactions 87-A(1): 54-59 (2004)
2003
1EESwee-Huay Heng, Kaoru Kurosawa: Square Hash with a Small Key Size. ACISP 2003: 522-531

Coauthor Index

1Ji-Jian Chin [21]
2Kim-Kwang Raymond Choo [16]
3Sherman S. M. Chow [18]
4Bok-Min Goi [13] [15] [17] [18] [21] [22] [23]
5Khoongming Khoo [12] [14]
6Kaoru Kurosawa [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [19]
7Huo-Chong Ling [20]
8Wakaha Ogata [5] [9]
9Raphael Chung-Wei Phan (Raphael C.-W. Phan) [16] [20]
10Grace C.-W. Ting [17]
11Wun-She Yap [13] [14] [15] [18] [23]
12Wei-Chuen Yau [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)