Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Hoon Wei Lim"'
Publikováno v:
IEEE Internet of Things Journal. 9:20431-20443
Autor:
Haroon Basheer, Siddhant Dash, Jun Wen Wong, Xu Jia, Biplab Sikdar, Ashutosh Sancheti, Hoon Wei Lim, Muhammad Naveed Aman
Publikováno v:
IEEE Systems Journal. 16:789-800
Autor:
Muhammad Naveed Aman, Biplab Sikdar, Mohamed Haroon Basheer, Hoon Wei Lim, Jia Xu, Siddhant Dash, Jun Wen Wong
Publikováno v:
IEEE Internet of Things Journal. 7:7220-7233
The critical and sensitive nature of data that the Internet-of-Things (IoT) devices produce makes them an attractive target for cyber attacks. Among the various types of attacks, malware is becoming a major concern for the IoT device. This article pr
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:564-577
In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To this, we propose a highly practical solution for the privacy-preserving integration and sharin
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dcad04345c993bf3e6179a77f0b5c785
https://doi.org/10.1007/978-3-031-09234-3_29
https://doi.org/10.1007/978-3-031-09234-3_29
Autor:
Hoon Wei Lim, Guomin Yang
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 27:92-105
We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of large-scale distributed file systems supporting parallel access to multiple storage devices. Our work focuses on the cur
Autor:
William G. Temple, Bao Anh N. Tran, Hoon Wei Lim, Jianying Zhou, Zbigniew Kalbarczyk, Binbin Chen
Modern trains rely on balises (communication beacons) located on the track to provide location information as they traverse a rail network. Balises, such as those conforming to the Eurobalise standard, were not designed with security in mind and are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::c635c43e98709786fa9f9e96f8ea8d32
Publikováno v:
Designs, Codes and Cryptography. 73:911-947
We present efficient identity-based encryption (IBE) under the symmetric external Diffie---Hellman (SXDH) assumption in bilinear groups; our scheme also achieves anonymity. In our IBE scheme, all parameters have constant numbers of group elements, an
Publikováno v:
Designs, Codes and Cryptography. 73:731-746
We investigate a variant of spatial encryption (SE) we call ciphertext-policy SE (CP-SE), which combines the properties of SE and those from ciphertext-policy attribute-based encryption (CP-ABE). The resulting primitive supports non-monotone access s
Publikováno v:
International Journal of Information Security. 10:137-153
Certificate-based public key infrastructures are currently widely used in computational grids to support security services. From a user’s perspective, however, certificate acquisition is time-consuming and public/private key management is non-trivi