default search action
Bok-Min Goi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j53]Jia-Lin Chan, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Boon-Yaik Ooi, Bok-Min Goi:
High throughput acceleration of NIST lightweight authenticated encryption schemes on GPU platform. Clust. Comput. 27(8): 11213-11235 (2024) - [j52]Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong, Guodong Ye:
Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map. J. Inf. Secur. Appl. 81: 103692 (2024) - [i4]Zan-Kai Chong, Hiroyuki Ohsaki, Bok-Min Goi:
Improving Uncertainty Sampling with Bell Curve Weight Function. CoRR abs/2403.01352 (2024) - 2023
- [j51]Xiaoling Huang, Youxia Dong, Guodong Ye, Wun-She Yap, Bok-Min Goi:
Visually meaningful image encryption algorithm based on digital signature. Digit. Commun. Networks 9(1): 159-165 (2023) - [j50]Yen-Lung Lai, Xingbo Dong, Zhe Jin, Massimo Tistarelli, Wun-She Yap, Bok-Min Goi:
Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography. IEEE Trans. Inf. Forensics Secur. 18: 3101-3115 (2023) - [c66]Jia-Lin Chan, Bok-Min Goi, Wun-She Yap, Wai-Kong Lee, Seong Oun Hwang:
Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things. ICCT 2023: 1275-1279 - 2022
- [j49]Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee:
Robustness attack on copyright protection scheme for H.264/AVC and SVC. Int. J. Inf. Comput. Secur. 18(1/2): 193-203 (2022) - [j48]Boon-Chiao Chang, Wai-Kong Lee, Bok-Min Goi, Seong Oun Hwang:
High Performance Integer Multiplier on FPGA with Radix-4 Number Theoretic Transform. KSII Trans. Internet Inf. Syst. 16(8): 2816-2830 (2022) - [c65]Feng-Wei Lee, Denis Chee-Keong Wong, Bok-Min Goi, Wun-She Yap:
Key Exchange Protocol Based on Permuted Goppa Syndrome Decoding Problem. ICDSP 2022: 6-10 - [c64]Yen-Lung Lai, Tong-Yuen Chai, Ming Jie Lee, Bok-Min Goi:
Iriscode Matching Comparator to Improve Decidability of Human Iris Recognition. ICDSP 2022: 120-126 - [c63]Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong:
A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2. ICDSP 2022: 140-145 - 2021
- [j47]Tong-Yuen Chai, Bok-Min Goi, Wun-She Yap:
Towards Better Performance for Protected Iris Biometric System with Confidence Matrix. Symmetry 13(5): 910 (2021) - [j46]Jia-Zheng Goey, Wai-Kong Lee, Bok-Min Goi, Wun-She Yap:
Accelerating number theoretic transform in GPU platform for fully homomorphic encryption. J. Supercomput. 77(2): 1455-1474 (2021) - [j45]Wai-Kong Lee, Sedat Akleylek, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi, Seong Oun Hwang:
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA. J. Supercomput. 77(4): 3289-3314 (2021) - [c62]Feng-Wei Lee, Denis Chee-Keong Wong, Bok-Min Goi, Wai-Kong Lee:
Variant of Niederreiter-Based Signature Scheme for Blockchain Technology. ICMC 2021: 187-200 - 2020
- [j44]Jun-Hoe Phoon, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi, Raphaël C.-W. Phan:
Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism. IEEE Internet Things J. 7(9): 8513-8524 (2020) - [j43]Kuan-Wai Wong, Wun-She Yap, Denis Chee-Keong Wong, Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of genetic algorithm-based encryption scheme. Multim. Tools Appl. 79(35-36): 25259-25276 (2020) - [j42]Seong Oun Hwang, Sansanee Auephanwiriyakul, Muhammad Usman Akram, Bok-Min Goi, Chee Seng Chan:
Special issue on "Green and Human Information Technology 2019". Neural Comput. Appl. 32(17): 13077-13078 (2020) - [j41]Jun-Hoe Phoon, Wai-Kong Lee, Denis Chee-Keong Wong, Wun-She Yap, Bok-Min Goi:
Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA. IEEE Trans. Very Large Scale Integr. Syst. 28(12): 2672-2684 (2020) - [c61]Mohammad Babrdel Bonab, Bok-Min Goi, Madhavan Balan Nair, Chua Kein Huat, Wong Chim Chwee:
A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem. SoCPaR 2020: 145-155
2010 – 2019
- 2019
- [j40]Wai-Kong Lee, Bok-Min Goi, Raphael C.-W. Phan:
Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures. Concurr. Comput. Pract. Exp. 31(11) (2019) - [j39]Chin-Chen Chang, Wai-Kong Lee, Yanjun Liu, Bok-Min Goi, Raphael C.-W. Phan:
Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU. IEEE Internet Things J. 6(3): 4448-4461 (2019) - [j38]Hoon-Keng Poon, Wun-She Yap, Yee-Kai Tee, Wai-Kong Lee, Bok-Min Goi:
Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification. Neural Networks 119: 299-312 (2019) - [j37]Choon Boon Ng, Yong Haur Tay, Bok-Min Goi:
Pedestrian gender classification using combined global and local parts-based convolutional neural networks. Pattern Anal. Appl. 22(4): 1469-1480 (2019) - [j36]Tong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, Zhe Jin:
A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme. Symmetry 11(2): 164 (2019) - [c60]Tong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, Yik-Herng Khoo:
Vote-based Iris Detection System. ICDSP 2019: 114-118 - [c59]Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee:
Robustness Attacks on Video Watermarking Using Singular Value Decomposition. ICDSP 2019: 157-162 - [c58]Hong-Yi Tan, Wun-She Yap, Bok-Min Goi:
Performance Analysis of an Fuzzy Logic Based LEACH Protocol. ICSCA 2019: 33-37 - [c57]Wai-Kong Lee, Sedat Akleylek, Wun-She Yap, Bok-Min Goi:
Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme. ISPEC 2019: 41-55 - 2018
- [j35]Wai-Kong Lee, Raphael C.-W. Phan, Bok-Min Goi, Lanxiang Chen, Xiujun Zhang, Naixue Xiong:
Parallel and High Speed Hashing in GPU for Telemedicine Applications. IEEE Access 6: 37991-38002 (2018) - [j34]Wai-Kong Lee, Raphael C.-W. Phan, Geong Sen Poh, Bok-Min Goi:
SearchaStore: fast and secure searchable cloud services. Clust. Comput. 21(2): 1189-1202 (2018) - [j33]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Commun. 12(10): 1230-1235 (2018) - [j32]Badiul Alam, Zhe Jin, Wun-She Yap, Bok-Min Goi:
An alignment-free cancelable fingerprint template for bio-cryptosystems. J. Netw. Comput. Appl. 115: 20-32 (2018) - [j31]Kong-Yik Chee, Zhe Jin, Danwei Cai, Ming Li, Wun-She Yap, Yen-Lung Lai, Bok-Min Goi:
Cancellable speech template via random binary orthogonal matrices projection hashing. Pattern Recognit. 76: 273-287 (2018) - [c56]Yik-Herng Khoo, Bok-Min Goi, Tong-Yuen Chai, Yen-Lung Lai, Zhe Jin:
Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint. ICAIP 2018: 6-10 - [c55]S. Y. Lee, Wun-She Yap, Yan Chai Hum, Ban-Hoe Kwan, Bok-Min Goi, Yee-Kai Tee, Zhe Jin:
Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System. ICAIP 2018: 111-115 - [c54]Hoon-Keng Poon, Wun-She Yap, Yee-Kai Tee, Bok-Min Goi, Wai-Kong Lee:
Document level polarity classification with attention gated recurrent unit. ICOIN 2018: 7-12 - [c53]Sedat Akleylek, Bok-Min Goi, Wun-She Yap, Denis Chee-Keong Wong, Wai-Kong Lee:
Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1923-1928 - 2017
- [j30]Yen-Lung Lai, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Wun-She Yap, Tong-Yuen Chai, Christian Rathgeb:
Cancellable iris template generation based on Indexing-First-One hashing. Pattern Recognit. 64: 105-117 (2017) - [c52]Kong-Yik Chee, Zhe Jin, Wun-She Yap, Bok-Min Goi:
Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion. APSIPA 2017: 1411-1419 - [c51]Wai-Kong Lee, Xian-Fu Wong, Bok-Min Goi, Raphael C.-W. Phan:
CUDA-SSL: SSL/TLS accelerated by GPU. ICCST 2017: 1-6 - [c50]Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee:
Analysis framework for H.264/AVC authentication. ISCE 2017: 19-21 - [c49]Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee:
Security of a robust transcoding-resistant watermarking for H.264 standard. ISCE 2017: 41-44 - [c48]Yen-Lung Lai, Bok-Min Goi, Tong-Yuen Chai:
Alignment-free indexing-first-one hashing with bloom filter integration. ISI 2017: 78-82 - [c47]Tong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, Wen-Jet Nyee:
A Trainable Method For Iris Recognition Using Random Feature Points. TAAI 2017: 142-147 - 2016
- [j29]Wai-Kong Lee, Hon-Sang Cheong, Raphael C.-W. Phan, Bok-Min Goi:
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture. Clust. Comput. 19(1): 335-347 (2016) - [j28]Wun-She Yap, Bok-Min Goi:
Forgery attacks of an identity-based multi-proxy signature scheme. Int. J. Commun. Syst. 29(2): 283-289 (2016) - [j27]Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi, Wei-Chuen Yau, Swee-Huay Heng:
On the effective subkey space of some image encryption algorithms using external key. J. Vis. Commun. Image Represent. 40: 51-57 (2016) - [j26]Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Yong Haur Tay:
Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation. Pattern Recognit. 56: 50-62 (2016) - [j25]Zhe Jin, Meng-Hui Lim, Andrew Beng Jin Teoh, Bok-Min Goi, Yong Haur Tay:
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication. IEEE Trans. Syst. Man Cybern. Syst. 46(10): 1415-1428 (2016) - [j24]Wun-She Yap, Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification. Wirel. Pers. Commun. 88(3): 685-699 (2016) - [c46]Boon-Chiao Chang, Bok-Min Goi, Raphael C.-W. Phan, Wai-Kong Lee:
Accelerating Multiple Precision Multiplication in GPU with Kepler Architecture. HPCC/SmartCity/DSS 2016: 844-851 - [c45]Tong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, K. S. Teng, I. Yeo:
Bi-local region based iris segmentation framework for less- constrained visible wavelength images. ICDP 2016: 1-6 - [c44]Zan-Kai Chong, Hiroyuki Ohsaki, Cheng-Kuan Bryan Ng, Bok-Min Goi, Hong-Tat Ewe, Sin-Ran Chong:
Improving Reliable Transmission Throughput with Systematic Random Code. LCN 2016: 539-542 - [c43]Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap:
Iris Cancellable Template Generation Based on Indexing-First-One Hashing. NSS 2016: 450-463 - 2015
- [j23]Zan-Kai Chong, Bok-Min Goi, Hiroyuki Ohsaki, Cheng-Kuan Bryan Ng, Hong-Tat Ewe:
Systematic rateless erasure code for short messages transmission. Comput. Electr. Eng. 45: 55-67 (2015) - [j22]Zan-Kai Chong, Bok-Min Goi, Hiroyuki Ohsaki, Cheng-Kuan Bryan Ng, Hong-Tat Ewe:
Improving the probability of complete decoding of random code by trading-off computational complexity. IET Commun. 9(18): 2281-2286 (2015) - [j21]Choon Boon Ng, Yong Haur Tay, Bok-Min Goi:
A review of facial gender recognition. Pattern Anal. Appl. 18(4): 739-755 (2015) - [j20]Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan, Bok-Min Goi:
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. Secur. Commun. Networks 8(17): 3094-3098 (2015) - [c42]Zhe Jin, Bok-Min Goi, Andrew Beng Jin Teoh, Yong Haur Tay, Pan Zheng:
Small-angle approximation attack on angle-based many-to-one functions for biometric templates. ICCE-TW 2015: 98-99 - [c41]Tong-Yuen Chai, Bok-Min Goi, Yong Haur Tay, Wai-Kiat Chin, Yen-Lung Lai:
Local Chan-Vese segmentation for non-ideal visible wavelength iris images. TAAI 2015: 506-511 - 2014
- [j19]Zhe Jin, Meng-Hui Lim, Andrew Beng Jin Teoh, Bok-Min Goi:
A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template. Pattern Recognit. Lett. 42: 137-147 (2014) - [j18]Zhe Jin, Bok-Min Goi, Andrew Beng Jin Teoh, Yong Haur Tay:
A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template. Secur. Commun. Networks 7(11): 1691-1701 (2014) - [c40]Zhe Jin, Bok-Min Goi, Andrew Beng Jin Teoh, Yong Haur Tay:
Non-invertible analysis on Graph-based Hamming Embedding Transform for protecting fingerprint minutiae. ICEIC 2014: 1-2 - [c39]Wai-Kong Lee, Bok-Min Goi, Raphael C.-W. Phan, Geong Sen Poh:
High speed implementation of symmetric block cipher on GPU. ISPACS 2014: 102-107 - 2013
- [j17]Zan-Kai Chong, Bok-Min Goi, Hiroyuki Ohsaki, Cheng-Kuan Bryan Ng, Hong-Tat Ewe:
Stepping-Random Code: A Rateless Erasure Code for Short-Length Messages. IEICE Trans. Commun. 96-B(7): 1764-1771 (2013) - [j16]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester. Int. J. Comput. Math. 90(12): 2581-2587 (2013) - [j15]Zan-Kai Chong, Su-Wei Tan, Bok-Min Goi, Cheng-Kuan Bryan Ng:
Outwitting smart selfish nodes in wireless mesh networks. Int. J. Commun. Syst. 26(9): 1163-1175 (2013) - [j14]Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 7(4): 910-922 (2013) - [j13]Ishmael Sameen, Yoong Choon Chang, Mow Song Ng, Bok-Min Goi, Chee-Pun Ooi:
A Unified FPGA-Based System Architecture for 2-D Discrete Wavelet Transform. J. Signal Process. Syst. 71(2): 123-142 (2013) - [c38]Choon Boon Ng, Yong Haur Tay, Bok-Min Goi:
A Convolutional Neural Network for Pedestrian Gender Recognition. ISNN (1) 2013: 558-564 - [c37]Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin:
An authentication framework for peer-to-peer cloud. SIN 2013: 94-101 - 2012
- [j12]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Security models for delegated keyword searching within encrypted contents. J. Internet Serv. Appl. 3(2): 233-241 (2012) - [j11]Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Swee-Huay Heng:
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Secur. Commun. Networks 5(12): 1312-1324 (2012) - [j10]Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi, Raphael C.-W. Phan:
Efficient encryption with keyword search in mobile networks. Secur. Commun. Networks 5(12): 1412-1422 (2012) - [c36]Yee-Lee Er, Wei-Chuen Yau, Syh-Yuan Tan, Bok-Min Goi:
Email Encryption System Using Certificateless Public Key Encryption Scheme. ITCS 2012: 179-186 - [c35]Choon Boon Ng, Yong Haur Tay, Bok-Min Goi:
Recognizing Human Gender in Computer Vision: A Survey. PRICAI 2012: 335-346 - [c34]Zan-Kai Chong, Hiroyuki Ohsaki, Bok-Min Goi, Hong-Tat Ewe, Cheng-Kuan Bryan Ng:
Performance Analysis of Fountain-Based Protocol in CSMA/CA Wireless Networks. SAINT 2012: 184-189 - [i3]Choon Boon Ng, Yong Haur Tay, Bok-Min Goi:
Vision-based Human Gender Recognition: A Survey. CoRR abs/1204.1611 (2012) - [i2]Chathuranga Widanapathirana, Bok-Min Goi, Moh Lim Sim:
MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks. CoRR abs/1204.4951 (2012) - [i1]Chathuranga Widanapathirana, Y. Ahmet Sekercioglu, Bok-Min Goi:
Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks. CoRR abs/1204.5791 (2012) - 2011
- [j9]Meng-Hui Lim, Bok-Min Goi, Sanggon Lee:
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting. KSII Trans. Internet Inf. Syst. 5(4): 822-839 (2011) - [j8]Chathuranga Widanapathirana, Y. Ahmet Sekercioglu, Bok-Min Goi:
Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks. KSII Trans. Internet Inf. Syst. 5(11): 1909-1928 (2011) - [j7]Raphael C.-W. Phan, Bok-Min Goi, Geong Sen Poh, Jongsung Kim:
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents. Wirel. Pers. Commun. 56(1): 73-83 (2011) - [c33]Wei-Chuen Yau, Raphael C.-W. Phan, Bok-Min Goi, Swee-Huay Heng:
Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09. CANS 2011: 172-184 - [c32]Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Bok-Min Goi:
A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction. FGIT 2011: 361-370 - [c31]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
On the Security of Two Fuzzy Identity-Based Signature Schemes. NTMS 2011: 1-5 - 2010
- [c30]Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi:
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. FGIT-SecTech/DRBC 2010: 149-160 - [c29]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
Java Implementation for Pairing-Based Cryptosystems. ICCSA (4) 2010: 188-198 - [e1]Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi:
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings. Lecture Notes in Computer Science 6467, Springer 2010, ISBN 978-3-642-17618-0 [contents]
2000 – 2009
- 2009
- [j6]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attack on a semi-blind watermarking scheme based on singular value decomposition. Comput. Stand. Interfaces 31(2): 523-525 (2009) - [c28]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
Hierarchical Identity-Based Identification Schemes. FGIT-SecTech 2009: 93-99 - [c27]Huo-Chong Ling, Swee-Huay Heng, Bok-Min Goi:
Attacks on a Block Based SVD Watermarking Scheme. ITNG 2009: 371-375 - [c26]Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi:
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. NSS 2009: 102-106 - 2008
- [j5]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attacks on a robust watermarking scheme based on self-reference image. Comput. Stand. Interfaces 30(1-2): 32-35 (2008) - [j4]Raphael Chung-Wei Phan, Wei-Chuen Yau, Bok-Min Goi:
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE). Inf. Sci. 178(13): 2849-2856 (2008) - [c25]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
On the Security of an Identity-Based Aggregate Signature Scheme. AINA Workshops 2008: 1523-1528 - [c24]Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi:
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. ATC 2008: 100-105 - [c23]Raphael C.-W. Phan, Bok-Min Goi:
(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map. EUC (2) 2008: 443-446 - [c22]Raphael C.-W. Phan, Bok-Min Goi:
Attacks on Improved Key Distribution Protocols with Perfect Reparability. EUC (2) 2008: 595-599 - [c21]Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model. EuroPKI 2008: 60-73 - 2007
- [c20]Wun-She Yap, Sherman S. M. Chow, Swee-Huay Heng, Bok-Min Goi:
Security Mediated Certificateless Signatures. ACNS 2007: 459-477 - [c19]Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. ICCSA (1) 2007: 644-654 - [c18]Bok-Min Goi, Raphael C.-W. Phan, Hean-Teik Chuah:
Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection. ICCSA (1) 2007: 951-960 - [c17]Raphael Chung-Wei Phan, Bok-Min Goi:
(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005. IWDW 2007: 34-44 - [c16]Raphael C.-W. Phan, Bok-Min Goi:
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes. UIC 2007: 1213-1221 - [c15]Swee-Won Lo, Raphael C.-W. Phan, Bok-Min Goi:
On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences. WISA 2007: 245-265 - [c14]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
Cryptanalysis of Some Proxy Signature Schemes Without Certificates. WISTP 2007: 115-126 - 2006
- [j3]Raphael Chung-Wei Phan, Bok-Min Goi, Kah-Hoong Wong:
Cryptanalysis of some improved password-authenticated key exchange schemes. Comput. Commun. 29(15): 2822-2829 (2006) - [c13]Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. ACNS 2006: 226-238 - [c12]Wun-She Yap, Swee-Huay Heng, Bok-Min Goi:
An Efficient Certificateless Signature Scheme. EUC Workshops 2006: 322-331 - [c11]Chee-Seng Leong, Bok-Min Goi:
Smart Home Microcontroller: Telephone Interfacing. ICCSA (4) 2006: 424-431 - [c10]Raphael C.-W. Phan, Bok-Min Goi:
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. INDOCRYPT 2006: 104-117 - 2005
- [c9]Raphael Chung-Wei Phan, Bok-Min Goi:
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. ACNS 2005: 33-39 - [c8]Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi:
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. EUC Workshops 2005: 936-944 - [c7]Raphael Chung-Wei Phan, Bok-Min Goi:
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ICCSA (1) 2005: 488-497 - [c6]Raphael Chung-Wei Phan, Bok-Min Goi:
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. ICCSA (4) 2005: 1065-1074 - [c5]Raphael Chung-Wei Phan, Bok-Min Goi:
On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. ICICS 2005: 136-146 - [c4]Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi:
Cryptanalysis of PASS II and MiniPass. ICICS 2005: 159-168 - [c3]Michael Coglianese, Bok-Min Goi:
MaTRU: A New NTRU-Based Cryptosystem. INDOCRYPT 2005: 232-243 - 2004
- [j2]Raphael Chung-Wei Phan, Bok-Min Goi:
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'. IEEE Trans. Consumer Electron. 50(2): 609-611 (2004) - [c2]Bok-Min Goi, Raphael Chung-Wei Phan, Yanjiang Yang, Feng Bao, Robert H. Deng, M. U. Siddiqi:
Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity. ACNS 2004: 369-382 - 2003
- [j1]Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah:
Computational complexity and implementation aspects of the incremental hash function. IEEE Trans. Consumer Electron. 49(4): 1249-1255 (2003) - 2001
- [c1]Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah:
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining. INDOCRYPT 2001: 50-61
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint