Follow
Ji-Jian Chin
Ji-Jian Chin
Verified email at plymouth.ac.uk - Homepage
Title
Cited by
Cited by
Year
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
1482017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
652015
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008
222008
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
202021
A review of cryptographic electronic voting
YX Kho, SH Heng, JJ Chin
Symmetry 14 (5), 858, 2022
162022
Searchable Symmetric Encryption Over Multiple Servers
P Geong-Sen, M Soeheila Moesfa, C Ji-Jian
ArcticCrypt 2016, 2016
16*2016
Twin-Schnorr: a security upgrade for the Schnorr identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015, 2015
162015
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009
132009
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94, 127-144, 2017
122017
An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin
IEEE Access 8, 61711-61725, 2020
82020
Digital signature schemes with strong existential unforgeability
J Chia, JJ Chin, SC Yip
F1000Research 10, 2021
72021
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
72017
Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model
C Ji-Jian, H Swee-Huay
Malaysian Journal of Mathematical Science 7, 73-85, 2013
7*2013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
72013
ECQV-IBI: Identity-based identification with implicit certification
A Braeken, JJ Chin, SY Tan
Journal of Information Security and Applications 63, 103027, 2021
62021
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
62017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
62015
Cryptanalysis of a certificateless identification scheme
JJ Chin, R Behnia, SH Heng, RCW Phan
Security and Communication Networks 8 (2), 122-125, 2015
62015
An efficient and provably secure certificateless identification scheme
JJ Chin, RCW Phan, R Behnia, SH Heng
2013 international conference on security and cryptography (SECRYPT), 1-8, 2013
62013
Evolution of Bitcoin addresses from security perspectives
WK Chan, JJ Chin, VT Goh
2020 15th International Conference for Internet Technology and Secured …, 2020
52020
The system can't perform the operation now. Try again later.
Articles 1–20