Swee-Huay Heng
Multimedia University
H-index: 22
Asia-Malaysia
Top articles of Swee-Huay Heng
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Comment on “An efficient identity-based signature scheme with provable security” | Information Sciences | Syh-Yuan Tan Swee-Huay Heng | 2024/2/1 |
New Identity-Based Identification and Signature Schemes in the Standard Model | Syh-Yuan Tan Swee-Huay Heng | 2023/8/29 | |
ETHERSTWEB–An Ethereum-Based Distributed Application for User Information Trustworthiness Verification | Chong-Gee Koa Swee-Huay Heng Ji-Jian Chin | 2023/12/3 | |
Secure Data Sharing in a Cyber-Physical Cloud Environment. | Journal of Telecommunications & the Digital Economy | Jun-Wen Chan Swee-Huay Heng Syh-Yuan Tan | 2023/12/1 |
A review of cryptographic electronic voting | Yun-Xing Kho Swee-Huay Heng Ji-Jian Chin | 2022/4/21 | |
Secure file storage on cloud using hybrid cryptography | Journal of Informatics and Web Engineering | Jian-Foo Lai Swee-Huay Heng | 2022/9/15 |
ETHERST: A New Blockchain Based PKI | Chong Gee Koa Swee Huay Heng Ji Jian Chin | 2022 | |
No. 3. Authentication for 5G Mobile Wireless Networks: Manuscript Received: 5 January 2022, Accepted: 8 February 2022, Published: 15 March 2022 | Daphne Bunga Dwiputriane Swee Huay Heng | 2022/3/15 | |
Design And Analysis of Searchable Encryption | Koon Ming Chan Swee Huay Heng Shing Chiang Tan | 2022 | |
A Blockchain-Based E-Voting System | Mohammad Hadiff bin Hamidey Swee-Huay Heng | 2022/8/27 | |
Email Plugin Suite for k-Resilient Identity-Based Encryption and Searchable Encryption | Kah-Wai Chew Swee-Huay Heng | 2022/12/27 | |
Blockchain-enabled searchable encryption in clouds: A review | Haw-Bin How Swee-Huay Heng | 2022/6/1 | |
Secure Cryptographic E-Auction System | International Journal of Technology | Soo Chin Tan Swee Huay Heng | 2022/12/1 |
No. 5. Security and Privacy of Contact Tracing Protocols for COVID-19: Manuscript Received: 10 January 2022, Accepted: 13 February 2022, Published: 15 March 2022 | Journal of Engineering Technology and Applied Physics | Zhen Ang Soh Swee Huay Heng | 2022/3/15 |
Trapdoor Privacy in Public Key Encryption With Keyword Search: A Review | Koon-Ming Chan Swee-Huay Heng Wei-Chuen Yau Shing-Chiang Tan | 2022/2/14 | |
Blockchain-Based Content Sharing and Data Repository System | Kean-Wah Cheng Swee-Huay Heng | 2021 | |
ETHERST: Ethereum-Based Public Key Infrastructure Identity Management with a Reward-and-Punishment Mechanism | Symmetry | Chong-Gee Koa Swee-Huay Heng Ji-Jian Chin | 2021/9/6 |
An Implementation Suite for a Hybrid Public Key Infrastructure | Symmetry | Jason Chia Swee-Huay Heng Ji-Jian Chin Syh-Yuan Tan Wei-Chuen Yau | 2021/8/20 |
A note on the invisibility and anonymity of undeniable signature schemes | Jia-Ch’ng Loh Swee-Huay Heng Syh-Yuan Tan Kaoru Kurosawa | 2020 | |
Blockchain-Based Image Sharing Application | Zhen-Kai Wong Swee-Huay Heng | 2020 |