Follow
Ji-Jian Chin
Ji-Jian Chin
Verified email at plymouth.ac.uk - Homepage
Title
Cited by
Cited by
Year
Searchable symmetric encryption: Designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
1652017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5, 1-16, 2015
672015
A review of cryptographic electronic voting
YX Kho, SH Heng, JJ Chin
Symmetry 14 (5), 858, 2022
262022
Simple and scalable blockchain with privacy
WK Chan, JJ Chin, VT Goh
Journal of Information Security and Applications 58, 102700, 2021
242021
An efficient and provable secure identity-based identification scheme in the standard model
JJ Chin, SH Heng, BM Goi
Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008
212008
Searchable Symmetric Encryption Over Multiple Servers
P Geong-Sen, M Soeheila Moesfa, C Ji-Jian
ArcticCrypt 2016, 2016
16*2016
Twin‐Schnorr: A Security Upgrade for the Schnorr Identity‐Based Identification Scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
The Scientific World Journal 2015 (1), 237514, 2015
162015
Digital signature schemes with strong existential unforgeability
J Chia, JJ Chin, SC Yip
F1000Research 10, 2021
142021
IBI-mobile authentication: a prototype to facilitate access control using identity-based identification on mobile smart devices
TY Teh, YS Lee, ZY Cheah, JJ Chin
Wireless Personal Communications 94, 127-144, 2017
132017
Hierarchical identity-based identification schemes
JJ Chin, SH Heng, BM Goi
Security Technology: International Conference, SecTech 2009, Held as Part of …, 2009
132009
ECQV-IBI: Identity-based identification with implicit certification
A Braeken, JJ Chin, SY Tan
Journal of Information Security and Applications 63, 103027, 2021
112021
Comparison of label encoding and evidence counting for malware classification
MX Low, TTV Yap, WK Soo, H Ng, VT Goh, JJ Chin, TY Kuek
Journal of System and Management Sciences 12 (6), 17-30, 2022
82022
An identity based-identification scheme with tight security against active and concurrent adversaries
J Chia, JJ Chin
IEEE Access 8, 61711-61725, 2020
82020
Driving simulator for drivers education with artificial intelligence traffic and virtual reality: a review
YQ Cheng, S Mansor, JJ Chin, HA Karim
Proceedings of the 8th International Conference on Computational Science and …, 2022
72022
A variant of BLS signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
International Conference on Mobile Networks and Management, 150-163, 2017
72017
Security Upgrade for a K-Resilient Identity-Based Identification Scheme in the Standard Model
C Ji-Jian, H Swee-Huay
Malaysian Journal of Mathematical Science 7, 73-85, 2013
7*2013
On the security of a modified Beth identity-based identification scheme
JJ Chin, SY Tan, SH Heng, RCW Phan
Information Processing Letters 113 (14-16), 580-583, 2013
72013
Evolution of Bitcoin addresses from security perspectives
WK Chan, JJ Chin, VT Goh
2020 15th International Conference for Internet Technology and Secured …, 2020
62020
A variant of Schnorr signature scheme with tight security reduction
TS Ng, SY Tan, JJ Chin
2017 International Conference on Information and Communication Technology …, 2017
62017
Reset-secure identity-based identification schemes without pairings
JJ Chin, H Anada, SY Tan
International Conference on Provable Security, 227-246, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20