Bok-Min Goi
Bok-Min Goi
Senior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Adresă de e-mail confirmată pe utar.edu.my - Pagina de pornire
Citat de
Citat de
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
Cancellable iris template generation based on indexing-first-one hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18, 739-755, 2015
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
International Conference on Computational Science and Its Applications, 188-198, 2010
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear dynamics 92 (2), 575-593, 2018
Proxy re-encryption with keyword search: New definitions and algorithms
WC Yau, RCW Phan, SH Heng, BM Goi
Security Technology, Disaster Recovery and Business Continuity …, 2010
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
Applied Cryptography and Network Security: Third International Conference …, 2005
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
Applied Cryptography and Network Security: 5th International Conference …, 2007
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
RCW Phan, BM Goi
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
An alignment-free cancelable fingerprint template for bio-cryptosystems
B Alam, Z Jin, WS Yap, BM Goi
Journal of Network and Computer Applications 115, 20-32, 2018
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20