Revocable identity-based encryption from lattices J Chen, HW Lim, S Ling, H Wang, K Nguyen Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 113 | 2012 |
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures. C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang CT-RSA 7779, 50-67, 2013 | 100 | 2013 |
Shorter IBE and signatures via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 81 | 2013 |
On Identity-Based Cryptography and Grid Computing HW Lim, MJB Robshaw Computational Science-ICCS 2004: 4th International Conference, Kraków …, 2004 | 70 | 2004 |
A Dynamic Key Infrastructure for Grid HW Lim, MJB Robshaw Advances in Grid Computing-EGC 2005: European Grid Conference, Amsterdam …, 2005 | 55 | 2005 |
Identity-based cryptography for grid security HW Lim, KG Paterson First International Conference on e-Science and Grid Computing (e-Science'05 …, 2005 | 53 | 2005 |
Combined public-key schemes: The case of ABE and ABS C Chen, J Chen, HW Lim, Z Zhang, D Feng Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012 | 47 | 2012 |
On the application of identity-based cryptography in grid security HW Lim University of London, 2006 | 43 | 2006 |
What can identity-based cryptography offer to web services? J Crampton, HW Lim, KG Paterson Proceedings of the 2007 ACM workshop on Secure web services, 26-36, 2007 | 41 | 2007 |
HAtt: Hybrid remote attestation for the Internet of Things with high availability MN Aman, MH Basheer, S Dash, JW Wong, J Xu, HW Lim, B Sikdar IEEE Internet of Things Journal 7 (8), 7220-7233, 2020 | 39 | 2020 |
Distributed searchable symmetric encryption C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ... 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 34 | 2014 |
User-friendly grid security architecture and protocols L Chen, HW Lim, W Mao Security Protocols: 13th International Workshop, Cambridge, UK, April 20-22 …, 2007 | 27 | 2007 |
Cross-domain password-based authenticated key exchange revisited L Chen, HW Lim, G Yang ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014 | 26 | 2014 |
Identity-based cryptography for grid security HW Lim, KG Paterson International Journal of Information Security 10, 15-32, 2011 | 26 | 2011 |
Privacy-preserving billing for e-ticketing systems in public transportation F Kerschbaum, HW Lim, I Gudymenko Proceedings of the 12th ACM Workshop on Workshop on Privacy in the …, 2013 | 25 | 2013 |
Workflow signatures for business process compliance HW Lim, F Kerschbaum, H Wang IEEE Transactions on Dependable and Secure Computing 9 (5), 756-769, 2012 | 22 | 2012 |
A certificate-free grid security infrastructure supporting password-based user authentication J Crampton, HW Lim, KG Paterson, G Price Proceedings of the 6th Annual PKI R&D Workshop, 103-118, 2007 | 20 | 2007 |
Data integrity threats and countermeasures in railway spot transmission systems HW Lim, WG Temple, BAN Tran, B Chen, Z Kalbarczyk, J Zhou ACM Transactions on Cyber-Physical Systems 4 (1), 1-26, 2019 | 16 | 2019 |
Authenticated key exchange protocols for parallel network file systems HW Lim, G Yang IEEE transactions on parallel and distributed systems 27 (1), 92-105, 2015 | 16 | 2015 |
Multi-key hierarchical identity-based signatures HW Lim, KG Paterson Cryptography and Coding: 11th IMA International Conference, Cirencester, UK …, 2007 | 16 | 2007 |