Dr. Goi Bok Min |
Publication |
a) Books/Book Chapters · V.C. Koo, T.S. Lim, K.H. Koay, Y.S. Yong, E.K. Wong, B.M. Goi and W.H. Tan., “The 8051 Cook Book - A Complete Guide to Architecture Programming & Interfacing ", ISBN: 983-3205-42-9, Prentice Hall, 2005 (2nd edition, 2006). · Swee-Huay Heng, Rebecca N. Wright, Bok-Min Goi (Eds.), “Cryptology and Network Security - 9th International Conference, CANS 2010” , Lecture Notes in Computer Science, 6467, Springer-Verlag, 2010 (ISBN: 978-3-642-17618-0) · Raphael C.-W. Phan and B. M. Goi, “Subtle Interactions: Security Protocols and Cipher Modes of Operation.” In G. Radhamani & G. S. V. Radha Krishna Rao (Eds.), Web Services Security and E-Business. USA: IDEA Group Inc., 2007
|
b) Thesis and Dissertation · B. M. Goi, “Data Encryption and Compression ", Bachelor of Engineering Thesis, University of Malaya, MALAYSIA, August 1998. · B. M. Goi, "A Fast Incremental Cryptographic Hash Function ", Master of Engineering Science Thesis, Multimedia University, MALAYSIA, Feb 2002. · B. M. Goi, "Fast Public-Key Cryptosystems: Design and Cryptanalyses ", Ph.D. Thesis, Multimedia University, MALAYSIA, August 2006..
c) Invited Talk · B. M. Goi, “Design and Cryptanalysis of Provably Secure C2C-PAKE Protocols”, the 2007 Year Korean Institute of Information Security and Cryptology (KIISC) Conference Daegu Haany University, Korea, 23 February 2007 · B. M. Goi, “Cryptology and Information Security: Introduction and Future”, Remote Lecture Series using the WINDS Satellite (Asian Institute of Technology, Multimedia University, and University of Tsukuba), NMES Lab, Multimedia University, Malaysia, 17 March 2009 · B. M. Goi, “Cryptology: Past, Now and Future”, 1st MSC Malaysia R&D Exchange Forum: Knowledge Sharing in R&D on IT Security, Cyberview Lodge Resort & Spa, Cyberjaya, 19 August 2009 · B. M. Goi, “Cryptology: Past, Current and Future”, UTAR University Wide Seminar, UTAR, KL Campus, 16 June 2010 rsity, MALAYSIA, August 2006..
|
Universiti Tunku Abdul Rahman |
d) Journal Papers (ISI journal status / SCI) 1. Wei-Chuen Yau,Swee-Huay Heng, Syh-Yuan Tan, Bok-Min Goi and Raphael C.-W. Phan, “Efficient Encryption with Keyword Search in Mobile Networks”, Security and Communication Networks, John Wiley & Sons, Ltd., (ISI Thomson, ISSN: 1939-0122) (In press. DOI:10.1002/sec.505) 2. Chong Zan Kai, Tan Su Wei, Bok-Min Goi, Bryan Ng Cheng Kuan, “Outwitting Smart Selfish Nodes in Wireless Mesh Networks”, International Journal of Communication Systems, 2012 (ISI Thomson, ISSN: 1939-0122) (In press. DOI: 10.1002/dac.1388). 3. Syh-Yuan Tan, Zhe Jin, Andrew B.J Teoh, Bok-Min Goi, Swee-Huay Heng, “On the Realization of Fuzzy Identity-Based Identification Scheme Using Fingerprint Biometrics”, Security and Communication Networks, John Wiley & Sons, Ltd., 2012 (ISI Thomson, ISSN: 1939-0122) (In press. DOI: 10.1002/sec.408). 4. Chai Tong Yuen, Wai Loon Lim, ChingSeong Tan, Bok-Min Goi, Xin Wang and Jee-Hou 5. Ho, “Probabilistic Model for Dynamic Signature Verification System”, Research Journal of Applied Sciences, Engineering and Technology, Maxwell Science Publication, Volume 3, Issue 11, pp. 1320-1324, Nov 2011 (ISI Thomson, ISSN: 2040-7459) 6. C. H Widanapathirana, Y. A. Sekercioglu, Bok-Min Goi, “Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks”, KSII Transactions on Internet and Information Systems, Volume 5, Number 11, pp. 1909-1928, Nov 2011. 7. Meng-Hui Lim, Bok-Min Goi, Sang-Gon Lee, “ An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting”, KSII Transactions on Internet and Information Systems, Volume 5, Number 4, pp. 822-839, May 2011. 8. Raphael C.-W. Phan, B. M. Goi, Geong-Sen Poh and Jongsung Kim, “Analysis of a Secure Buyer-Seller Watermarking Protocol for Purchasing Digital Contents”, Wireless Personal Communications, Volume 56, Number 1, pp. 73-83, January 2011 [ISSN: 0929-6212 (Print) 1572-834X (Online), Springer, 2009] 9. Grace C.-W. Ting, B.M. Goi, Swee-Huay Heng, “Attack on a semi-blind watermarking scheme based on singular value decomposition,” Computer Standards & Interfaces, Elsevier Science, Volume 31, Issue 2 , pp. 523-525, Feb 2009. 10. Raphael C.-W. Phan, Wei-Chuen Yau, B.M. Goi, “Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)” Information Sciences, Elsevier Science, Volume 178, Issue 13, pp. 2849-2856, 2008 11. Grace C.-W. Ting, B. M. Goi and S. H. Heng, “Attacks on a Robust Watermarking Scheme based on Self-Reference Image”, Computer Standards and Interface, Elsevier Science, vol. 30, Issues 1-2 pp. 32-35, 2008 12. Raphael C.-W. Phan, B. M. Goi and K.H. Wong, “Cryptanalysis of Some Improved Password-Authenticated Key Exchange (PAKE) Schemes”, Computer Communications, Vol. 29, Issue 15, pp. 2822-2829, Elsevier Science, 2006 13. Raphael C.-W. Phan and B. M. Goi, “Further Attacks and Comments on `Security of Two Remote User Authentication Schemes Using Smart Cards,” IEEE Transactions on Consumer Electronics, vol. 50, No. 2, pp. 609-611, 2004 14. B. M. Goi, M. U. Siddiqi, and H. T. Chuah, “Computational Complexity and Implementation Aspects of the Incremental Hash Function,” IEEE Transactions on Consumer Electronics, vol. 49, No. 4, pp.1249- 1255, 2003 15. Raphael C.-W. Phan and B. M. Goi, “Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols”, Lecture Notes in Computer Science, 4329, pp. 104-117, Springer-Verlag, 2006. 16. Wun-She Yap, Swee-Huay Heng and B. M. Goi, “An Efficient Certificateless Signature Scheme,” Lecture Notes in Computer Science, 4097, pp. 322-331, Springer-Verlag, 2006. 17. Raphael C.-W. Phan and B. M. Goi, “Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords", Lecture Notes in Computer Science, 3989, pp.226-238, Springer-Verlag, 2006. 18. C. S. Leong and B. M. Goi, “Smart Home Microcontroller: Telephone Interfacing," Lecture Notes in Computer Science, 3983, pp.424-431, Springer-Verlag, 2006. 19. Raphael C.-W. Phan and B. M. Goi, “On the Security Bounds of the CMC, EME, EME+ and EME* Modes of Operation”, Lecture Notes in Computer Science, 3783, pp.136-146, Springer-Verlag, 2005 20. B. M. Goi, Jintai Ding and M.U. Siddiqi, “Cryptanalysis of PASS II and MiniPass”, Lecture Notes in Computer Science, 3783, pp.159-168, Springer-Verlag, 2005 21. B. M. Goi, Raphael C.-W. Phan and M.U. Siddiqi, “Cryptanalysis of Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004”, Lecture Notes in Computer Science, 3823, pp.936-944, Springer-Verlag, 2005. 22. Michael Coglianese and B. M. Goi, “MaTRU: A New NTRU-Based Cryptosystem”, Lecture Notes in Computer Science, 3797, pp.232-243, Springer-Verlag, 2005 23. Raphael C.-W. Phan and B. M. Goi, “Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme", Lecture Notes in Computer Science, 3531, pp.33-39, Springer-Verlag, 2005 24. Raphael C.-W. Phan and B. M. Goi, “On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards", Lecture Notes in Computer Science, 3482, pp.488-497, Springer-Verlag, 2005 25. B. M. Goi, Raphael C. -W. Phan, Yanjiang Yang, Feng Bao, Robert H. Deng and M. U. Siddiqi, “Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and An Improvement for True Anonymity,” Lecture Notes in Computer Science, 3089, pp.369-382, Springer-Verlag, 2004 26. B. M. Goi, M. U. Siddiqi, and H. T. Chuah, “Incremental hash function based on pair chaining & modular arithmetic combining,” Lecture Notes in Computer Science, 2247, pp.50-61, Springer-Verlag, 2001 |
f) Conference Papers 1. Zan-Kai Chong, Hiroyuki Ohsakiy, Bok-Min Goi, Hong-Tat Ewe and Cheng-Kuan Bryan Ngz. Performance Analysis of Fountain-based Protocol in CSMA/CA Wireless Networks. 12th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2012), Izmir,Turkey, July 16-20, 2012. 2. Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, Bok-Min Goi. Keyword Guessing Attacks on Secure Searchable Public Key Encryption Schemes with a Designated Tester. The 2012 Summer FTRA International Symposium on Advances in Cryptography, Security and Applications for Future Computing (ACSA-Summer 2012), Vancouver, Canada, June 26-28, 2012. 3. Zan-Kai Chong, Bok-Min Goi, Hong-Tat Ewe, Su-Wei Tan and Cheng-Kuan Bryan Ngz. Impact of Fountain-based Protocol in the Uncongested and Congested Network. International Conference on Computer & Information Sciences. (ICCIS 2012), KL, Malaysia, June 12-14, 2012. 4. Yar-Ling Tan, Bok-Min Goi, Ryoichi Komiya, and Raphael C.-W. Phan. Implementation of Key-Policy Attribute-Based Encryption in Body Sensor Network. The 3rd International Conference on Cryptology and Computer Security 2012 (Cryptology 2012). Langkawi, Malaysia, Jun 4-6, 2012. 5. Yar-Ling Tan, Bok-Min Goi, Ryoichi Komiya, and Syh-Yuan Tan. A Study of Attribute-Based Encryption for Body Sensor Networks. International Conference on Informatics Engineering & Information Science (ICIEIS 2011), Kuala Lumpur, Malaysia, Nov 14-16, 2011. 6. Yi Qian Low, Sze Wei Lee, Bok-Min Goi, Mow Song Ng. A New SIFT-based Camera Calibration Method for Hybrid Dual-Camera. International Conference on Informatics Engineering & Information Science (ICIEIS 2011), Kuala Lumpur, Malaysia, Nov 14-16, 2011. 7. Yea Dat Chuah, Ryoichi Komiya, Bok-Min Goi. Abnormal Walking Styles Definition. The First International Conference on Engineering and Technology Innovation 2011 (ICETI2011), Kenting, Taiwan, Nov 11-15, 2011. 8. Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee. Cryptanalysis of a Combined Fragile Watermark for H.264/AVC Video Authentication. The First International Conference on Engineering and Technology Innovation 2011 (ICETI2011), Kenting, Taiwan, Nov 11-15, 2011. 9. Yea Dat Chuah, Ryoichi Komiya, Bok-Min Goi. A Proposal for Fall Reduction System. the 3rd CUTSE International Conference, Miri, Malaysia, Nov 8-9, 2011. 10. Matthew Tan Beow Aun, Bok-Min Goi, Victor Tan Hock Kim. Cloud Enabling Spam Filtering Services: Challenges and Opportunities. 2011 IEEE Conference on Sustainable Utilization and Development in EngiNeering and Technology (2011 IEEE STUDENT), the University of Nottingham, Malaysia Campus, 20 – 21 Oct 2011, Malaysia. 11. Syh-Yuan Tan, Swee-Huay Heng and Bok-Min Goi. On the Security of Two Fuzzy Identity-Based Signature Schemes. 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS 2011), 7 - 10 February 2011, Paris, France. 12. Wei-Chuen Yau, Raphael C.-W. Phan, Swee-Huay Heng, and Bok-Min Goi, Proxy Re-encryption with Keyword Search: New Definitions and Algorithms. Security Technology, Disaster Recovery and Business Continuity, International Conferences, SecTech and DRBC 2010, Communications in Computer and Information Science (CCIS) 122, pp. 149-160, Springer-Verlag, Jeju Island, Korea. December 13 -15, 2010. 13. Ishmael Sameen, Chang Yoong Choon, Ng Mow Song, Bok-Min Goi and Chee Siong Lee, High-Level Synthesis of a Unified 2-D DWT System Architecture for JPEG2000 using FPGAs, The Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT2010), Singapore. 14 - 17 November 2010. 14. Jennifer Chin and B.M. Goi, “FPGA Implementation of Hough Transform for Line Detection”, Conference on Engineering and Technology Education, World Engineering Congress 2010 (WEC 2010), Kuching, Sarawak, Malaysia, August 2-5, 2010 15. N. S. Chong, M. L. D. Wong, K. Y. Sim, B. M. Goi, H. C. Ling, "Hardware Accelerated Sobel Edge Detection Using Common GPU Parallel Computing Platform", Conference on Engineering and Technology Education, World Engineering Congress 2010 (WEC 2010), Kuching, Sarawak, Malaysia, August 2-5, 2010 16. S. I. J. Law, M. L. D. Wong, K. Y. Sim, B. M. Goi, H. C. Ling, "Evaluation of Automatic ROI Selection Schemes for a Digital Mammogram Authentication Using Reversible Watermarking", Conference on Engineering and Technology Education, World Engineering Congress 2010 (WEC 2010), Kuching, Sarawak, Malaysia, August 2-5, 2010 17. Y.Y. Feng and B.M. Goi, “FPGA Implementation of Duo- Key- Dependent AES”, Proceedings of the Second International Cryptology Workshop and Conference (Cryptology2010), Melaka, Malaysia, June 29 – July 1, 2010. 18. Ishmael Sameen, Chang Yoong Choon, Ng Mow Song, Bok-Min Goi and Chee Siong Lee, Design Space Exploration of a 2-D DWT system architecture on FPGA, Proceedings of the IEEE International Conference on Cybernetics and Intelligent Systems (CIS 2010), Singapore. 28 - 30 June 2010. 19. Syh-Yuan Tan, Swee-Huay Heng and Bok-Min Goi. On the Security of an Attribute-Based Signature Scheme. Proceedings of the 2nd International Conference on u- and e- Service, Science and Technology (UNESST 2009), Communications in Computer and Information Science (CCIS) 62, pp. 161-168, Springer-Verlag, December 10-12, 2009, Jeju Island, Korea. 20. Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi and SangJae Moon. Fuzzy Identity-Based Identification Scheme. Proceedings of the 2nd International Conference on u- and e- Service, Science and Technology (UNESST 2009), Communications in Computer and Information Science (CCIS) 62, pp. 123-130, Springer-Verlag, December 10-12, 2009, Jeju Island, Korea. 21. Ji-Jian Chin, Swee-Huay Heng and Bok-Min Goi. Hierarchical Identity-Based Identification Schemes. Proceedings of the 2009 International Conference on Security Technology (UNESST 2009), Communications in Computer and Information Science (CCIS) 58, pp. 93-99, Springer-Verlag, December 10-12, 2009, Jeju Island, Korea. 22. John Hong Kok Han, Mohamad Yusoff Alias and B.M. Goi, “Simulating Denial of Service Attack Using WiMAX Experimental Setup”, International Conference on Recent and Emerging Advanced Technologies in Engineering (iCREATE 2009), Selangor, Malaysia, 23-24 November, 2009. 23. Raphael C.-W. Phan, Wei-Chuen Yau, B.M. Goi, “Analysis of Two Pairing-based Three-party Password Authenticated Key Exchange Protocols”, 3rd International Conference on Network & System Security (NSS 2009), Gold Coast, Australia, 19-21 October, 2009. 24. John Hong Kok Han, Mohamad Yusoff Alias and B.M. Goi, “Potential Denial of Service Attacks in IEEE802.16e-2005 Networks”, 9th International Symposium on Communication and Information Technology 2009 (ISCIT 2009), Incheon, Korea, 28-30 September, 2009. 25. C. H Widanapathirana, Bok-Min Goi and Sim Moh Lim, ” MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks”, Conference on Innovative Technologies in Intelligent Systems & Industrial Applications (CITISIA 2009), Kuala Lumpur, 1-2 August, 2009. 26. B.M. Goi and Y.Y. Feng, “Duo-Key Dependent Advanced Encryption Standard (DKD-AES)”, 6th International Conference on Information Technology in Asia 2009 (CITA 2009), Hilton Kuching Hotel, Sarawak, 6-9 July, 2009. 27. H. C. Ling, S. H. Heng, B.M. Goi, “Attacks on a Block Based SVD Watermarking Scheme”, 6th International Conference on Information Technology: New Generations, (ITNG 2009), Las Vegas, Nevada, USA. April 27-29, 2009 28. Raphael C.-W Phan and Bok-Min Goi, "(In) Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map", The 4th International Symposium on Security fo Ubiquitous Computing (SECUBIQ 2008), in conjunction with EUC 2008, Shanghai, China, 17-20 December, 2008. 29. Raphael C.-W Phan and Bok-Min Goi, "Attacks on Improved Key Distribution Protocols with Perfect Reparability", The 3rd International Workshop on Trustwortiness, reliability and service in ubiquitous and sensor networks (TRUST 2008), in conjunction with EUC 2008, Shanghai, China, 17-20 December, 2008. 30. Yiqi Tew, B.M. Goi, “Qscilloscope: A PC-based Real Time Oscilloscope” Proceedings of IEEE Conference on: Innovative Technologies in Intelligent Systems and Industrial Applications, 2008 (CITISIA 2008), pg 92-97, Cyberjaya, Malaysia, 12-13 July 2008. 31. Ji-Jian Chin, S. H. Heng, B.M. Goi, “Developments in Identity-based Identification Schemes”, Proceedings of International Cryptology Workshop and Conference 2008 (Cryptology2008), KL, Malaysia, Jun 9-12, 2008 32. Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi, Ji-Jian Chin, SangJae Moon, “Java Implementation for Identity-Based Identification”, Proceedings of International Cryptology Workshop and Conference 2008 (cryptology2008), KL, Malaysia, Jun 9-12, 2008 33. W.S. Yap, S.H. Heng, B.M. Goi, “On the Security of an Identity-Based Aggregate Signature Scheme”, 3rd International Symposium on Ubiquitous Application and Security Service (UASS 2008), Okinawa, Japan, March 25-28, 2008 34. Meng-Hui Lim, B. M. Goi, SangGon Lee and HoonJaeLee “Hierarchical Dawson’s Summation Generator,” International Conference on Convergence Information Technology (2nd ICCIT 2007), Gyeongju, Republic of Korea, November 21-23, 2007 35. W. S. Yap, S. H. Heng and B. M. Goi, “Certificateless Encryption Schemes Revisited”, Proceedings of the MMU International Symposium on Information & Communications Technologies 2006 (M2USIC 2006), Petaling Jaya, Malaysia, November 16-17, 2006, pp. 465-470. 36. Grace C.-W. Ting, B. M. Goi and S. H. Heng, “Analysis of an SVD-based Watermarking Scheme”, Proceedings of the MMU International Symposium on Information & Communications Technologies 2006 (M2USIC 2006), Petaling Jaya, Malaysia, November 16-17, 2006, pp. 471-474. 37. Meng-Hui Lim and B. M. Goi, “Survey on Summation Generators,” Regional Computer Science Postgraduate Conference 2006, Ferringhi Beach Hotel, Penang, Malaysia, 27-28 June 2006. 38. Cheng-Khoon Lim, Siew-Theng Toh and B. M. Goi, "Implementation of RSA Cryptosystem in Embedded Systems", International Conference on Computational Sciences & Its Applications (ICCSA 2006), Proceedings Part V, pp. 10-12, Glasgow, Scotland, 8-11 May 2006. 39. Raphael C.-W Phan and Bok-Min Goi, " Flaw in Online Manuscript Submission System for IEEE Transactions on Consumer Electronics ", International Conference on Cryptology in Malaysia (Mycrypt 2005), Malaysia, Rump session, September 28-30, 2005 40. Raphael C.-W Phan and Bok-Min Goi, "Exploiting Block Cipher Modes of Operation to Attack Security Protocols", International Conference on Computational Sciences & Its Applications (ICCSA 2005), Proceedings Part V, pp. 88-89, Suntec City, Singapore, 9-12 May 2005 41. Raphael C.-W Phan and Bok-Min Goi, "Attacks on Efficient Tree-Based Group Key Agreement Using Bilinear Map", International Conference on Computational Sciences & Its Applications (ICCSA 2005), Proceedings Part V, pp. 87, Suntec City, Singapore, 9-12 May 2005 42. B. M. Goi, M. U. Siddiqi, and H. T. Chuah, “An Attack Strategy for Incremental Hash Function based on Pair Chaining & XOR Combining,” Technical Track Proceedings for 1st MiAn International Conference on Applied Cryptography and Network Security, ACNS 2003, Kunming , China, 16-19 Oct. 2003, pp. 149-158, ICISA press, 2003 43. B. M. Goi and Raphael C.-W. Phan, “Attacks on Authentication Protocols for Wireless Networks proposed at M2USIC 2001, and Some Countermeasures,” Proceedings for M2USIC2003, 2-3 Oct. 2003, pp. 49-52, 2003 . |
e) Journal Papers / LNCS 1. Yea Dat Chuah, Ryoichi Komiya, Bok-Min Goi. Abnormal Walking Styles Definition. Applied Mechanics and Materials, Volume 147-147, pp. 374-378, 2012 (ISSN: 1660-9336). In Press. 2. Grace C.-W. Ting, Bok-Min Goi, Sze Wei Lee. Cryptanalysis of a Combined Fragile Watermark for H.264/AVC Video Authentication. Applied Mechanics and Materials, Volume 147-147, pp. 552-556, 2012 (ISSN: 1660-9336). In Press. 3. Wei-Chuen Yau, Raphael C.-W. Phan, B.M. Goi and S.H. Heng, “Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password Authenticated Key Agreement Protocol of CANS '09”, Lecture Notes in Computer Science, 7092, pp. 172-184, Springer-Verlag, Dec 2011. 4. Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan, Bok-Min Goi, A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction, Lecture Notes in Computer Science, 7105, pp. 361-370, Springer-Verlag, Dec 2011. 5. Wei-Chuen Yau, Raphael C.-W. Phan, S.H. Heng and B.M. Goi, “Proxy Re-encryption with Keyword Search: New Definitions and Algorithms with Proofs”, International Journal of Security and its applications, Volume 5, Number 2, pp. 75-90, May 2011. 6. John Hong Kok Han, Mohamad Yusoff Alias and B.M. Goi "Simulating Denial of Service Attack Using WiMAX Experimental Setup”, International Journal of Network and Mobile Technologies (IJNMT), Vol. 2, No. 1, pp. 30-35, ISSN 2229-9114, 2011. 7. Y.Y. Feng and B.M. Goi, “FPGA Implementation of Duo- Key- Dependent AES”, International Journal of Cryptology Research, Vol. 2 Number 1, pp. 101-109., ISSN 1985-5753, Jun 2010. 8. Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi, “Java Implementation for Pairing-Based Cryptosystems”, Lecture Notes in Computer Science, 6019, pp. 188-198, Springer-Verlag, 2010. 9. Syh-Yuan Tan, Swee-Huay Heng, Bok-Min Goi, Ji-Jian Chin, SangJae Moon, “Java Implementation for Identity-Based Identification”, International Journal of Cryptology Research, Vol. 1 Number 1, pp. 21-32., ISSN 1985-5753, January 2009. 10. Raphael C.-W. Phan and B. M. Goi, “Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW2005”, Lecture Notes in Computer Science, 5041, pp. 34-44, Springer-Verlag, 2008 11. Ji-Jian Chin, S. H. Heng, B.M. Goi, “An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model", Lecture Notes in Computer Science, 5057, pp. 60–73, Springer-Verlag, 2008 12. Wei-Chuen Yau, S.H. Heng, B.M. Goi, “Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes ", Lecture Notes in Computer Science, 5060, pp. 100–105, Springer-Verlag, 2008 13. Swee-Won Lo, Raphael C.-W. Phan, and B. M. Goi, “On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences”, Lecture Notes in Computer Science, 4867, pp. 245–265, Springer-Verlag, 2007 14. B. M. Goi, Raphael C.-W. Phan and H.T. Chuah, “Cryptanalysis of Two Non-Anonymous Buyer-Seller Watermarking Protocols for Content Protection", Lecture Notes in Computer Science, 4705, pp. 951-960, Springer-Verlag, 2007 15. Grace C.-W. Ting, B. M. Goi and S. H. Heng, “A Fragile Watermarking Scheme Protecting Originator’s Rights for Multimedia Service", Lecture Notes in Computer Science, 4705, pp. 644-654, Springer-Verlag, 2007 16. Raphael C.-W. Phan and B. M. Goi, “Improved Cryptanalysis of Three Remote User Authentication Schemes Using Smart Cards”, Lecture Notes in Computer Science, 4611, pp. 1213-1221, Springer-Verlag, 2007 17. W. S. Yap, Sherman S. M. Chow, S. H. Heng and B. M. Goi, “Security Mediated Certificateless Signatures”, Lecture Notes in Computer Science, 4329, pp. 459-477, Springer-Verlag, 2007 18. W. S. Yap, S. H. Heng and B. M. Goi, “Cryptanalysis of Some Proxy Signature Schemes without Certificates”, Lecture Notes in Computer Science, 4462, pp. 115-126, Springer-Verlag, 2007 |