Revocable identity-based encryption from lattices J Chen, HW Lim, S Ling, H Wang, K Nguyen
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
130 2012 Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
110 2013 Shorter IBE and signatures via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
91 2013 Identity-based cryptography for grid security HW Lim, KG Paterson
International Journal of Information Security 10, 15-32, 2011
79 2011 On Identity-Based Cryptography and Grid Computing HW Lim, MJB Robshaw
Computational Science-ICCS 2004: 4th International Conference, Kraków …, 2004
69 2004 HAtt: Hybrid remote attestation for the Internet of Things with high availability MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar
IEEE Internet of Things Journal 7 (8), 7220-7233, 2020
65 2020 A Dynamic Key Infrastructure for Grid HW Lim, MJB Robshaw
Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005
55 2005 Combined public-key schemes: The case of ABE and ABS C Chen, J Chen, HW Lim, Z Zhang, D Feng
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
51 2012 On the application of identity-based cryptography in grid security HW Lim
University of London, 2006
43 2006 What can identity-based cryptography offer to web services? J Crampton, HW Lim, KG Paterson
Proceedings of the 2007 ACM workshop on Secure web services, 26-36, 2007
42 2007 Distributed searchable symmetric encryption C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
39 2014 Cross-domain password-based authenticated key exchange revisited L Chen, HW Lim, G Yang
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014
30 2014 User-friendly grid security architecture and protocols L Chen, HW Lim, W Mao
Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007
27 2007 Privacy-preserving billing for e-ticketing systems in public transportation F Kerschbaum, HW Lim, I Gudymenko
Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013
25 2013 Data integrity threats and countermeasures in railway spot transmission systems HW Lim, WG Temple, BAN Tran, B Chen, Z Kalbarczyk, J Zhou
ACM Transactions on Cyber-Physical Systems 4 (1), 1-26, 2019
23 2019 Workflow signatures for business process compliance HW Lim, F Kerschbaum, H Wang
IEEE Transactions on Dependable and Secure Computing 9 (5), 756-769, 2012
22 2012 A certificate-free grid security infrastructure supporting password-based user authentication J Crampton, HW Lim, KG Paterson, G Price
Proceedings of the 6th Annual PKI R&D Workshop, 103-118, 2007
22 2007 : Privacy-Preserving Integration and Sharing of DatasetsHW Lim, GS Poh, J Xu, V Chittawar
IEEE Transactions on Information Forensics and Security 15, 564-577, 2019
20 2019 Authenticated key exchange protocols for parallel network file systems HW Lim, G Yang
IEEE transactions on parallel and distributed systems 27 (1), 92-105, 2015
17 2015 Shorter identity-based encryption via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee
Designs, codes and cryptography 73, 911-947, 2014
17 2014