Name
Affiliation
Papers
MENG-HUI LIM
Department of Computer ScienceHong Kong Baptist UniversityKowloon TongKowloonHong Kong
33
Collaborators
Citations 
PageRank 
30
188
22.66
Referers 
Referees 
References 
417
599
449
Search Limit
100599
Title
Citations
PageRank
Year
On the guessability of binary biometric templates: A practical guessing entropy based approach10.352017
Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection30.432016
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication.130.562016
Biometric Feature-Type Transformation: Making templates compatible for secret protection70.482015
Fusing binary templates for multi-biometric cryptosystems40.382015
A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template.270.982014
Identifying Recurrent and Unknown Performance Issues80.452014
Masquerade attack on transform-based binary-template protection based on perceptron learning.70.492014
Dynamic detection-rate-based bit allocation with genuine interval concealment for binary biometric representation.40.412013
Image Set-Based Face Recognition: A Local Multi-keypoint Descriptor-Based Approach10.362013
A novel encoding scheme for effective biometric discretization: Linearly Separable Subcode.150.662013
Discriminant Spectral Hashing for Compact Palmprint Representation.10.362013
An efficient dynamic reliability-dependent bit allocation for biometric discretization240.812012
Distance entropy as an information measure for binary biometric representation00.342012
An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding30.392012
Non-user-specific multivariate biometric discretization with medoid-based segmentation20.372011
An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation.60.372011
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting.98.052011
Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network.30.422011
Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization.20.372011
An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances.90.412011
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card.00.342009
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol00.342008
A secure and efficient three-pass authenticated key agreement protocol based on elliptic curves30.422008
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network10.392008
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol10.362008
An enhanced one-round pairing-based tripartite authenticated key agreement protocol60.462007
Secure Deniable Authenticated Key Establishment for Internet Protocols10.362007
Cryptanalysis Of Improved One-Round Lin-Li'S Tripartite Key Agreement Protocol20.372007
Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol50.452007
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol.50.432007
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol50.502007
An enhanced ID-based deniable authentication protocol on pairings100.812007