default search action
Siaw-Lynn Ng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j24]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. J. Inf. Secur. Appl. 64: 103047 (2022) - [j23]Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso:
Anonymity and rewards in peer rating systems. J. Comput. Secur. 30(1): 109-165 (2022) - 2021
- [i11]Liqun Chen, Siaw-Lynn Ng:
Securing emergent behaviour in swarm robotics. CoRR abs/2102.03148 (2021) - 2020
- [c3]Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso:
Anonymity and Rewards in Peer Rating Systems. SCN 2020: 277-297 - [i10]Lydia Garms, Siaw-Lynn Ng, Elizabeth A. Quaglia, Giulia Traverso:
Anonymity and Rewards in Peer Rating Systems. IACR Cryptol. ePrint Arch. 2020: 790 (2020)
2010 – 2019
- 2019
- [j22]Siaw-Lynn Ng, Maura B. Paterson:
Functional repair codes: a view from projective geometry. Des. Codes Cryptogr. 87(11): 2701-2722 (2019) - 2018
- [i9]Chatdanai Dorkson, Siaw-Lynn Ng:
Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes. CoRR abs/1805.07190 (2018) - [i8]Chatdanai Dorkson, Siaw-Lynn Ng:
Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes. CoRR abs/1808.02023 (2018) - [i7]Siaw-Lynn Ng, Maura B. Paterson:
Functional repair codes: a view from projective geometry. CoRR abs/1809.08138 (2018) - 2017
- [j21]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. IET Inf. Secur. 11(4): 204-210 (2017) - [c2]Lydia Garms, Keith M. Martin, Siaw-Lynn Ng:
Reputation Schemes for Pervasive Social Networks with Anonymity (Short Paper). PST 2017: 311-316 - 2016
- [j20]Siaw-Lynn Ng, Maura Beth Paterson:
Disjoint difference families and their applications. Des. Codes Cryptogr. 78(1): 103-127 (2016) - 2015
- [j19]Siaw-Lynn Ng, S. Owen:
A note on an upper bound of traceability codes. Australas. J Comb. 62: 140-146 (2015) - [i6]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs. CoRR abs/1506.03588 (2015) - [i5]Mwawi M. Nyirenda, Siaw-Lynn Ng, Keith M. Martin:
A Combinatorial Model of Interference in Frequency Hopping Schemes. CoRR abs/1508.02570 (2015) - [i4]Siaw-Lynn Ng, Maura B. Paterson:
Disjoint difference families and their applications. CoRR abs/1509.05255 (2015) - 2014
- [j18]Amizah Malip, Siaw-Lynn Ng, Qin Li:
A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks. Secur. Commun. Networks 7(3): 588-601 (2014) - [j17]Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-Enhanced Key Predistribution Schemes. ACM Trans. Sens. Networks 11(1): 6:1-6:33 (2014) - 2013
- [c1]Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng:
A privacy-aware reputation-based announcement scheme for VANETs. WiVeC 2013: 1-5 - 2012
- [j16]Qin Li, Amizah Malip, Keith M. Martin, Siaw-Lynn Ng, Jie Zhang:
A Reputation-Based Announcement Scheme for VANETs. IEEE Trans. Veh. Technol. 61(9): 4095-4108 (2012) - [i3]Michelle Kendall, Keith M. Martin, Siaw-Lynn Ng, Maura B. Paterson, Douglas R. Stinson:
Broadcast-enhanced Key Predistribution Schemes. IACR Cryptol. ePrint Arch. 2012: 295 (2012) - 2011
- [j15]Liqun Chen, Siaw-Lynn Ng, Guilin Wang:
Threshold Anonymous Announcement in VANETs. IEEE J. Sel. Areas Commun. 29(3): 605-615 (2011) - 2010
- [j14]Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng:
Traceability codes. J. Comb. Theory A 117(8): 1049-1057 (2010) - [j13]Liqun Chen, Siaw-Lynn Ng:
Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga. IEEE Trans. Veh. Technol. 59(3): 1503-1505 (2010)
2000 – 2009
- 2009
- [i2]Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng:
Traceability Codes. IACR Cryptol. ePrint Arch. 2009: 46 (2009) - 2008
- [j12]Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng:
Prolific Codes with the Identifiable Parent Property. SIAM J. Discret. Math. 22(4): 1393-1410 (2008) - 2007
- [j11]Keith M. Martin, Siaw-Lynn Ng:
The combinatorics of generalised cumulative arrays. J. Math. Cryptol. 1(1): 13-32 (2007) - [i1]Simon R. Blackburn, Tuvi Etzion, Siaw-Lynn Ng:
Prolific Codes with the Identifiable Parent Property. IACR Cryptol. ePrint Arch. 2007: 276 (2007) - 2004
- [j10]Siaw-Lynn Ng, Chris J. Mitchell:
Comments on mutual authentication and key exchange protocols for low power wireless communications. IEEE Commun. Lett. 8(4): 262-263 (2004) - [j9]Siaw-Lynn Ng:
A Characterisation of Posets that Are nearly Antichains. Order 21(1): 1-5 (2004) - 2003
- [j8]Siaw-Lynn Ng:
A Representation of a Family of Secret Sharing Matroids. Des. Codes Cryptogr. 30(1): 5-19 (2003) - [j7]Siaw-Lynn Ng:
Posets and protocols-picking the right three-party protocol. IEEE J. Sel. Areas Commun. 21(1): 55-61 (2003) - 2002
- [j6]Siaw-Lynn Ng:
Some Properties of the Yoshiara Family of Planes. Eur. J. Comb. 23(1): 77-81 (2002) - 2001
- [j5]Siaw-Lynn Ng, Peter R. Wild:
On k-arcs Covering a Line in Finite Projective Planes. Ars Comb. 58 (2001) - [j4]Siaw-Lynn Ng, Michael Walker:
On the Composition of Matroids and Ideal Secret Sharing Schemes. Des. Codes Cryptogr. 24(1): 49-67 (2001) - [j3]Siaw-Lynn Ng:
Comments on "Dynamic participation in a secure conference scheme for mobile communications". IEEE Trans. Veh. Technol. 50(1): 334-335 (2001) - 2000
- [j2]Siaw-Lynn Ng, Peter R. Wild:
A New Family of Extended Generalized Quadrangles of Order (q + 1, q - 1). Eur. J. Comb. 21(3): 395-406 (2000)
1990 – 1999
- 1999
- [j1]Siaw-Lynn Ng:
Comments on "On the Security of Three-Party Cryptographic Protocs" by Xu, Zhang and Zhu. ACM SIGOPS Oper. Syst. Rev. 33(3): 5-6 (1999)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 20:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint