Search Results - "Lim, Hoon Wei"

Refine Results
  1. 1

    HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability by Aman, Muhammad Naveed, Basheer, Mohamed Haroon, Dash, Siddhant, Wong, Jun Wen, Xu, Jia, Lim, Hoon Wei, Sikdar, Biplab

    Published in IEEE internet of things journal (01-08-2020)
    “…The critical and sensitive nature of data that the Internet-of-Things (IoT) devices produce makes them an attractive target for cyber attacks. Among the…”
    Get full text
    Journal Article
  2. 2

    Authenticated Key Exchange Protocols for Parallel Network File Systems by Lim, Hoon Wei, Yang, Guomin

    “…We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file…”
    Get full text
    Journal Article
  3. 3

    Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces by Aman, Muhammad Naveed, Basheer, Haroon, Wong, Jun Wen, Xu, Jia, Lim, Hoon Wei, Sikdar, Biplab

    Published in IEEE internet of things journal (15-10-2022)
    “…The advent of 4G and 5G mobile networks has made the Internet of Things (IoT) devices an essential part of smart nation drives. Firmware integrity is crucial…”
    Get full text
    Journal Article
  4. 4

    PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices by Aman, Muhammad Naveed, Basheer, Mohamed Haroon, Dash, Siddhant, Sancheti, Ashutosh, Wong, Jun Wen, Xu, Jia, Lim, Hoon Wei, Sikdar, Biplab

    Published in IEEE systems journal (01-03-2022)
    “…This article focuses on developing a hybrid attestation technique for multicore Internet of Things (IoT) devices and introduces passive remote attestation…”
    Get full text
    Journal Article
  5. 5

    Workflow Signatures for Business Process Compliance by Hoon Wei Lim, Kerschbaum, F., Huaxiong Wang

    “…Interorganizational workflow systems play a fundamental role in business partnerships. We introduce and investigate the concept of workflow signatures. Not…”
    Get full text
    Journal Article
  6. 6

    The relation and transformation between hierarchical inner product encryption and spatial encryption by Chen, Jie, Lim, Hoon Wei, Ling, San, Wang, Huaxiong

    Published in Designs, codes, and cryptography (01-05-2014)
    “…Hierarchical inner product encryption (HIPE) and spatial encryption (SE) are two important classes of functional encryption that have numerous applications…”
    Get full text
    Journal Article
  7. 7

    Spatial encryption supporting non-monotone access structure by Chen, Jie, Lim, Hoon Wei, Ling, San, Su, Le, Wang, Huaxiong

    Published in Designs, codes, and cryptography (01-12-2014)
    “…We investigate a variant of spatial encryption (SE) we call ciphertext-policy SE (CP-SE), which combines the properties of SE and those from ciphertext-policy…”
    Get full text
    Journal Article
  8. 8

    Cross-domain password-based authenticated key exchange revisited by Liqun Chen, Hoon Wei Lim, Guomin Yang

    Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)
    “…We revisit the problem of cross-domain secure communication between two users belonging to different security domains within an open and distributed…”
    Get full text
    Conference Proceeding
  9. 9
  10. 10

    Graph-Based Attack Path Discovery for Network Security by Meng, Qiaoran, Wang, Huilin, Oo, Nay, Lim, Hoon Wei, Johannes Schatz, Benedikt, Sikdar, Biplab

    “…Enterprise network systems are confronted with an escalating threat landscape, requiring timely and effective attack detection and mitigation of the risk of…”
    Get full text
    Conference Proceeding
  11. 11

    RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems by Csikor, Levente, Lim, Hoon Wei, Wong, Jun Wen, Ramesh, Soundarya, Parameswarath, Rohini Poolat, Chan, Mun Choon

    Published 14-09-2022
    “…ACM Transactions on Cyber-Physical Systems, 2024 Today's RKE systems implement disposable rolling codes, making every key fob button press unique, effectively…”
    Get full text
    Journal Article
  12. 12

    mathsf : Privacy-Preserving Integration and Sharing of Datasets by Lim, Hoon Wei, Poh, Geong Sen, Xu, Jia, Chittawar, Varsha

    “…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
    Get full text
    Journal Article
  13. 13

    [Formula Omitted]: Privacy-Preserving Integration and Sharing of Datasets by Hoon Wei Lim, Geong Sen Poh, Xu, Jia, Chittawar, Varsha

    “…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
    Get full text
    Journal Article
  14. 14

    Distributed Searchable Symmetric Encryption by Bosch, Christoph, Peter, Andreas, Leenders, Bram, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Hartel, Pieter, Jonker, Willem

    “…Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and…”
    Get full text
    Conference Proceeding
  15. 15

    Shorter identity-based encryption via asymmetric pairings by Chen, Jie, Lim, Hoon Wei, Ling, San, Wang, Huaxiong, Wee, Hoeteck

    Published in Designs, codes, and cryptography (01-12-2014)
    “…We present efficient identity-based encryption (IBE) under the symmetric external Diffie–Hellman (SXDH) assumption in bilinear groups; our scheme also achieves…”
    Get full text
    Journal Article
  16. 16

    Privacy-Preserving Techniques and System for Streaming Databases by Santana de Oliveira, Anderson, Kerschbaum, F., Hoon Wei Lim, Su-Yang Yu

    “…Streaming databases and other distributed, event-based systems are very useful tools for business and security applications. When event sources and event…”
    Get full text
    Conference Proceeding
  17. 17

    Identity-based cryptography for grid security by Lim, Hoon Wei, Paterson, Kenneth G.

    “…The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure…”
    Get full text
    Journal Article
  18. 18

    Identity-based cryptography for grid security by Hoon Wei Lim, Paterson, K.G.

    “…The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure…”
    Get full text
    Conference Proceeding
  19. 19

    Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients by Wong, F.L., Hoon Wei Lim

    “…We propose a four-party password authenticated inter-domain key exchange protocol which makes use of properties of identity-based cryptography and secret…”
    Get full text
    Conference Proceeding
  20. 20

    User-friendly and certificate-free grid security infrastructure by Crampton, Jason, Lim, Hoon Wei, Paterson, Kenneth G., Price, Geraint

    “…Certificate-based public key infrastructures are currently widely used in computational grids to support security services. From a user’s perspective, however,…”
    Get full text
    Journal Article