default search action
Syh-Yuan Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan:
Comment on "Expressive Public-Key Encryption With Keyword Search: Generic Construction From KP-ABE and an Efficient Scheme Over Prime-Order Groups". IEEE Access 12: 91551-91555 (2024) - [j23]Syh-Yuan Tan, Swee-Huay Heng:
Comment on "An efficient identity-based signature scheme with provable security". Inf. Sci. 659: 120079 (2024) - [c22]Koon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan:
K-Resilient Public Key Authenticated Encryption with Keyword Search. SECRYPT 2024: 381-388 - 2023
- [j22]Hui Zhang, Xuejun Li, Syh-Yuan Tan, Ming Jie Lee, Zhe Jin:
Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures. IEEE Trans. Dependable Secur. Comput. 20(6): 5056-5069 (2023) - [c21]Syh-Yuan Tan, Swee-Huay Heng:
New Identity-Based Identification and Signature Schemes in the Standard Model. ARES 2023: 147:1-147:8 - [i3]Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Groß:
A Relational Credential System from q-SDH-based Graph Signatures. IACR Cryptol. ePrint Arch. 2023: 1181 (2023) - 2021
- [j21]An Braeken, Ji-Jian Chin, Syh-Yuan Tan:
ECQV-IBI: Identity-based identification with implicit certification. J. Inf. Secur. Appl. 63: 103027 (2021) - [j20]Jason Chia, Swee-Huay Heng, Ji-Jian Chin, Syh-Yuan Tan, Wei-Chuen Yau:
An Implementation Suite for a Hybrid Public Key Infrastructure. Symmetry 13(8): 1535 (2021) - 2020
- [j19]Lifeng Guo, Zhihao Li, Wei-Chuen Yau, Syh-Yuan Tan:
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms. IEEE Access 8: 26107-26118 (2020) - [j18]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Wee-How Khoh, Raheel Nawaz:
Strengthen user authentication on mobile devices by using user's touch dynamics pattern. J. Ambient Intell. Humaniz. Comput. 11(10): 4019-4039 (2020) - [j17]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
On the Invisibility and Anonymity of Undeniable Signature Schemes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1): 18-34 (2020) - [c20]Syh-Yuan Tan, Thomas Groß:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. ASIACRYPT (3) 2020: 498-526 - [i2]Syh-Yuan Tan, Thomas Gross:
MoniPoly - An Expressive q-SDH-Based Anonymous Attribute-Based Credential System. IACR Cryptol. ePrint Arch. 2020: 587 (2020) - [i1]Syh-Yuan Tan, Ioannis Sfyrakis, Thomas Gross:
A q-SDH-based Graph Signature Scheme on Full-Domain Messages with Efficient Protocols. IACR Cryptol. ePrint Arch. 2020: 1403 (2020)
2010 – 2019
- 2019
- [j16]Syh-Yuan Tan:
Correction to "Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing". IEEE Access 7: 17045-17049 (2019) - [j15]Syh-Yuan Tan, Kin-Woon Yeow, Seong Oun Hwang:
Enhancement of a Lightweight Attribute-Based Encryption Scheme for the Internet of Things. IEEE Internet Things J. 6(4): 6384-6395 (2019) - [j14]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. Symmetry 11(2): 285 (2019) - [c19]Pin Shen Teh, Ning Zhang, Syh-Yuan Tan, Qi Shi, Raheel Nawaz, Wee-How Khoh:
Sensing Your Touch: Strengthen User Authentication via Touch Dynamic Biometrics. ICTC 2019: 289-294 - [c18]Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
Improving Signature Schemes with Tight Security Reductions. ISPEC 2019: 273-292 - [c17]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. WISA 2019: 112-125 - 2018
- [j13]Syh-Yuan Tan:
Comment on "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things". IEEE Access 6: 22464-22465 (2018) - [j12]Nicholas Lee, Shih Yin Ooi, Ying-Han Pang, Seong Oun Hwang, Syh-Yuan Tan:
Study of long short-term memory in flow-based network intrusion detection system. J. Intell. Fuzzy Syst. 35(6): 5947-5957 (2018) - [c16]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan:
A Generic Framework for Accountable Optimistic Fair Exchange Protocol. ISPEC 2018: 299-309 - 2017
- [c15]Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan:
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme. ICISA 2017: 306-314 - [c14]Kin-Woon Yeow, Swee-Huay Heng, Syh-Yuan Tan:
From Sealed-Bid Electronic Auction to Electronic Cheque. ICISA 2017: 366-376 - [c13]Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
A variant of Schnorr signature scheme with tight security reduction. ICTC 2017: 411-415 - [c12]Tiong-Sik Ng, Syh-Yuan Tan, Ji-Jian Chin:
A Variant of BLS Signature Scheme with Tight Security Reduction. MONAMI 2017: 150-163 - 2016
- [j11]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. Cryptogr. Commun. 8(4): 579-591 (2016) - [j10]Syh-Yuan Tan, Wun-She Yap:
Cryptanalysis of a CP-ABE scheme with policy in normal forms. Inf. Process. Lett. 116(7): 492-495 (2016) - [c11]Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng:
Cryptanalysis of an Identity-Based Convertible Undeniable Signature Scheme. Mycrypt 2016: 474-477 - 2015
- [j9]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [j8]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Rouzbeh Behnia:
A provable secure pairing-free certificateless identification scheme. Int. J. Comput. Math. 92(8): 1520-1535 (2015) - [j7]Syh-Yuan Tan, Wei-Chuen Yau, Boon-Hock Lim:
An implementation of enhanced public key infrastructure. Multim. Tools Appl. 74(16): 6481-6495 (2015) - [j6]Wun-She Yap, Joseph K. Liu, Syh-Yuan Tan, Bok-Min Goi:
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network. Secur. Commun. Networks 8(17): 3094-3098 (2015) - [c10]Rouzbeh Behnia, Syh-Yuan Tan, Swee-Huay Heng:
On the Security of Two Pairing-Based Signature Schemes. ICITCS 2015: 1-4 - [c9]Syh-Yuan Tan, Ji-Jian Chin, Geong Sen Poh, Yvonne H. S. Kam, Wei-Chuen Yau:
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications. ICITCS 2015: 1-5 - [c8]Kin-Woon Yeow, Syh-Yuan Tan, Swee-Huay Heng, Rouzbeh Behnia:
Applications of undeniable signature schemes. ICSIPA 2015: 133-138 - [c7]Ji-Jian Chin, Hiroaki Anada, Syh-Yuan Tan:
Reset-Secure Identity-Based Identification Schemes Without Pairings. ProvSec 2015: 227-246 - 2013
- [j5]Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
On the security of a modified Beth identity-based identification scheme. Inf. Process. Lett. 113(14-16): 580-583 (2013) - [j4]Syh-Yuan Tan, Ji-Jian Chin, Swee-Huay Heng, Bok-Min Goi:
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model. KSII Trans. Internet Inf. Syst. 7(4): 910-922 (2013) - [j3]Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh:
Argument on biometrics identity-based encryption schemes. Secur. Commun. Networks 6(11): 1344-1352 (2013) - [c6]Boon-Hock Lim, Syh-Yuan Tan, Wei-Chuen Yau:
An Enhanced Public Key Infrastructure. ICITCS 2013: 1-4 - [c5]Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin:
An authentication framework for peer-to-peer cloud. SIN 2013: 94-101 - 2012
- [j2]Syh-Yuan Tan, Zhe Jin, Andrew Beng Jin Teoh, Bok-Min Goi, Swee-Huay Heng:
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics. Secur. Commun. Networks 5(12): 1312-1324 (2012) - [j1]Wei-Chuen Yau, Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi, Raphael C.-W. Phan:
Efficient encryption with keyword search in mobile networks. Secur. Commun. Networks 5(12): 1412-1422 (2012) - [c4]Yee-Lee Er, Wei-Chuen Yau, Syh-Yuan Tan, Bok-Min Goi:
Email Encryption System Using Certificateless Public Key Encryption Scheme. ITCS 2012: 179-186 - 2011
- [c3]Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Bok-Min Goi:
A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction. FGIT 2011: 361-370 - [c2]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
On the Security of Two Fuzzy Identity-Based Signature Schemes. NTMS 2011: 1-5 - 2010
- [c1]Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi:
Java Implementation for Pairing-Based Cryptosystems. ICCSA (4) 2010: 188-198
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint