User profiles for "author:S H Heng"

Swee-Huay Heng

Multimedia University
Verified email at mmu.edu.my
Cited by 1830

[HTML][HTML] A review of cryptographic electronic voting

YX Kho, SH Heng, JJ Chin - Symmetry, 2022 - mdpi.com
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-
voting, blind signature-based e-voting, blockchain-based e-voting, post-quantum e-voting …

Off-line keyword guessing attacks on recent public key encryption with keyword search schemes

WC Yau, SH Heng, BM Goi - … Conference, ATC 2008, Oslo, Norway, June …, 2008 - Springer
Abstract The Public Key Encryption with Keyword Search Scheme (PEKS) was first
proposed by Boneh et al. in 2004. This scheme solves the problem of searching on data that …

Blockchain-enabled searchable encryption in clouds: A review

HB How, SH Heng - Journal of Information Security and Applications, 2022 - Elsevier
Nowadays, the demand of storage and computational resources is increasing. As a result,
the number of organisations and individuals that outsource their data to cloud is also …

An efficient certificateless signature scheme

WS Yap, SH Heng, BM Goi - … EUC 2006 Workshops: NCUS, SecUbiq, USN …, 2006 - Springer
Certificateless public key cryptography (CLPKC) is a paradi-gm to solve the inherent key
escrow problem suffered by identity-based cryptography (IBC). While certificateless …

From digital signature to ID-based identification/signature

K Kurosawa, SH Heng - Public Key Cryptography–PKC 2004: 7th …, 2004 - Springer
In this paper, we first formalize the concept of ID-based identification scheme. Secondly, we
show a transformation from any digital signature scheme satisfying certain condition to an ID …

[HTML][HTML] Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage

MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling… - … -centric Computing and …, 2015 - Springer
Ensuring the cloud data security is a major concern for corporate cloud subscribers and in
some cases for the private cloud users. Confidentiality of the stored data can be managed by …

Cryptanalysis of a new image alternate encryption algorithm based on chaotic map

WS Yap, RCW Phan, WC Yau, SH Heng - Nonlinear Dynamics, 2015 - Springer
Abstract Wang and Guo (Nonlinear Dyn 76 (4): 1943–1950, 2014) proposed a new image
alternate encryption algorithm based on chaotic map. The image alternate encryption can be …

Failed induction of labour

S Arulkumaran, DMF Gibb… - Australian and New …, 1985 - Wiley Online Library
Editorial Comment: There is an important take away message in this paper–namely that
65% of nulliparas with an unfavourable cervix who had induction of labour performed by …

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester

WC Yau, RCW Phan, SH Heng… - International Journal of …, 2013 - Taylor & Francis
The first searchable public key encryption scheme with designated testers (dPEKS) known
to be secure against keyword guessing attacks was due to Rhee et al.[HS Rhee, W. Susilo …

Java implementation for pairing-based cryptosystems

SY Tan, SH Heng, BM Goi - … Conference on Computational Science and Its …, 2010 - Springer
We present a Java implementation for Tate pairing over the supersingular curve y 2= x 3+ x
in F_p. We show some available optimisations for group operations by manipulating the …