Name
Affiliation
Papers
SWEE-HUAY HENG
Centre for Cryptography and Information Security, Faculty of Information Science and Technology, Multimedia University, Malaysia
67
Collaborators
Citations 
PageRank 
39
384
47.50
Referers 
Referees 
References 
629
952
856
Search Limit
100952
Title
Citations
PageRank
Year
An Implementation Suite For A Hybrid Public Key Infrastructure00.342021
On the Invisibility and Anonymity of Undeniable Signature Schemes.00.342020
A Note On The Invisibility And Anonymity Of Undeniable Signature Schemes00.342019
A Generic Framework for Accountable Optimistic Fair Exchange Protocol.00.342018
Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.00.342018
From Sealed-Bid Electronic Auction to Electronic Cheque00.342017
Known Bid Attack on an Electronic Sealed-Bid Auction Scheme00.342017
On the effective subkey space of some image encryption algorithms using external key.20.382016
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme00.342016
Cryptanalysis Of An Identity-Based Convertible Undeniable Signature Scheme00.342016
An efficient certificateless undeniable signature scheme00.342015
Applications of undeniable signature schemes10.392015
Cryptanalysis of a certificateless identification scheme20.382015
A provable secure pairing-free certificateless identification scheme00.342015
On the Security of Two Pairing-Based Signature Schemes00.342015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage50.572015
An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model.85.732014
Security analysis of GCM for communication20.372014
Parallelizable MAC revisited00.342014
Defending against XML-related attacks in e-commerce applications with predictive fuzzy associative rules.10.352014
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester120.572013
On the security of a modified Beth identity-based identification scheme10.362013
Discovering fuzzy association rule patterns and increasing sensitivity analysis of XML-related attacks70.462013
An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.88.732013
Notes on Two Flawed Attacks on Undeniable Signature Schemes00.342013
An Efficient and Provable Secure Security-Mediated Identity-Based Identification Scheme00.342013
Policy-enhanced ANFIS model to counter SOAP-related attacks90.562012
Security models for delegated keyword searching within encrypted contents.30.392012
Efficient encryption with keyword search in mobile networks10.382012
On the realization of fuzzy identity-based identification scheme using fingerprint biometrics20.372012
Short and Efficient Identity-Based Undeniable Signature Scheme.00.342012
A variant of schnorr identity-based identification scheme with tight reduction10.362011
Cryptanalysis of a provably secure cross-realm client-to-client password-authenticated key agreement protocol of CANS '0920.402011
On the Security of Two Fuzzy Identity-Based Signature Schemes10.362011
On the security of a robust watermarking scheme based on RDWT-SVD00.342011
On the security of a hybrid SVD-DCT watermarking method based on LPSNR10.352011
On the security of ownership watermarking of digital images based on singular value decomposition30.442011
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings180.902010
Cryptology and Network Security - 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings231.312010
Analysis on the improved SVD-based watermarking scheme20.432010
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.100.542010
Java implementation for pairing-based cryptosystems100.672010
Attacks on a Block Based SVD Watermarking Scheme20.402009
Mobile and ubiquitous malware10.352009
Hierarchical Identity-Based Identification Schemes.50.552009
Attack on a semi-blind watermarking scheme based on singular value decomposition10.352009
Differential a1ttack on five rounds of the SC2000 block cipher60.542009
Attacks on SVD-Based Watermarking Schemes40.432008
On the Security of an Identity-Based Aggregate Signature Scheme00.342008
An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model40.432008
  • 1
  • 2