Search Results - "Lim, Hoon Wei"
-
1
HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability
Published in IEEE internet of things journal (01-08-2020)“…The critical and sensitive nature of data that the Internet-of-Things (IoT) devices produce makes them an attractive target for cyber attacks. Among the…”
Get full text
Journal Article -
2
Authenticated Key Exchange Protocols for Parallel Network File Systems
Published in IEEE transactions on parallel and distributed systems (01-01-2016)“…We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file…”
Get full text
Journal Article -
3
Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces
Published in IEEE internet of things journal (15-10-2022)“…The advent of 4G and 5G mobile networks has made the Internet of Things (IoT) devices an essential part of smart nation drives. Firmware integrity is crucial…”
Get full text
Journal Article -
4
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices
Published in IEEE systems journal (01-03-2022)“…This article focuses on developing a hybrid attestation technique for multicore Internet of Things (IoT) devices and introduces passive remote attestation…”
Get full text
Journal Article -
5
Workflow Signatures for Business Process Compliance
Published in IEEE transactions on dependable and secure computing (01-09-2012)“…Interorganizational workflow systems play a fundamental role in business partnerships. We introduce and investigate the concept of workflow signatures. Not…”
Get full text
Journal Article -
6
The relation and transformation between hierarchical inner product encryption and spatial encryption
Published in Designs, codes, and cryptography (01-05-2014)“…Hierarchical inner product encryption (HIPE) and spatial encryption (SE) are two important classes of functional encryption that have numerous applications…”
Get full text
Journal Article -
7
Spatial encryption supporting non-monotone access structure
Published in Designs, codes, and cryptography (01-12-2014)“…We investigate a variant of spatial encryption (SE) we call ciphertext-policy SE (CP-SE), which combines the properties of SE and those from ciphertext-policy…”
Get full text
Journal Article -
8
Cross-domain password-based authenticated key exchange revisited
Published in 2013 Proceedings IEEE INFOCOM (01-04-2013)“…We revisit the problem of cross-domain secure communication between two users belonging to different security domains within an open and distributed…”
Get full text
Conference Proceeding -
9
Shorter identity-based encryption via asymmetric pairings
Published in Designs, codes, and cryptography (01-12-2014)Get full text
Journal Article -
10
Graph-Based Attack Path Discovery for Network Security
Published in 2023 7th Cyber Security in Networking Conference (CSNet) (16-10-2023)“…Enterprise network systems are confronted with an escalating threat landscape, requiring timely and effective attack detection and mitigation of the risk of…”
Get full text
Conference Proceeding -
11
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
Published 14-09-2022“…ACM Transactions on Cyber-Physical Systems, 2024 Today's RKE systems implement disposable rolling codes, making every key fob button press unique, effectively…”
Get full text
Journal Article -
12
mathsf : Privacy-Preserving Integration and Sharing of Datasets
Published in IEEE transactions on information forensics and security (2020)“…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
Get full text
Journal Article -
13
[Formula Omitted]: Privacy-Preserving Integration and Sharing of Datasets
Published in IEEE transactions on information forensics and security (01-01-2020)“…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
Get full text
Journal Article -
14
Distributed Searchable Symmetric Encryption
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01-07-2014)“…Searchable Symmetric Encryption (SSE) allows a client to store encrypted data on a storage provider in such a way, that the client is able to search and…”
Get full text
Conference Proceeding -
15
Shorter identity-based encryption via asymmetric pairings
Published in Designs, codes, and cryptography (01-12-2014)“…We present efficient identity-based encryption (IBE) under the symmetric external Diffie–Hellman (SXDH) assumption in bilinear groups; our scheme also achieves…”
Get full text
Journal Article -
16
Privacy-Preserving Techniques and System for Streaming Databases
Published in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing (01-09-2012)“…Streaming databases and other distributed, event-based systems are very useful tools for business and security applications. When event sources and event…”
Get full text
Conference Proceeding -
17
Identity-based cryptography for grid security
Published in International journal of information security (01-02-2011)“…The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure…”
Get full text
Journal Article -
18
Identity-based cryptography for grid security
Published in First International Conference on e-Science and Grid Computing (e-Science'05) (2005)“…The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure…”
Get full text
Conference Proceeding -
19
Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients
Published in 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) (01-05-2007)“…We propose a four-party password authenticated inter-domain key exchange protocol which makes use of properties of identity-based cryptography and secret…”
Get full text
Conference Proceeding -
20
User-friendly and certificate-free grid security infrastructure
Published in International journal of information security (01-06-2011)“…Certificate-based public key infrastructures are currently widely used in computational grids to support security services. From a user’s perspective, however,…”
Get full text
Journal Article