Follow
Bok-Min Goi
Bok-Min Goi
Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul Rahman
Verified email at utar.edu.my - Homepage
Title
Cited by
Cited by
Year
An efficient certificateless signature scheme
WS Yap, SH Heng, BM Goi
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
1752006
Off-line keyword guessing attacks on recent public key encryption with keyword search schemes
WC Yau, SH Heng, BM Goi
Autonomic and Trusted Computing: 5th International Conference, ATC 2008 …, 2008
1612008
Vision-based human gender recognition: A survey
CB Ng, YH Tay, BM Goi
arXiv preprint arXiv:1204.1611, 2012
1152012
A non-invertible randomized graph-based hamming embedding for generating cancelable fingerprint template
Z Jin, MH Lim, ABJ Teoh, BM Goi
Pattern Recognition Letters 42, 137-147, 2014
1102014
Recognizing human gender in computer vision: a survey
CB Ng, YH Tay, BM Goi
PRICAI 2012: Trends in Artificial Intelligence: 12th Pacific Rim …, 2012
1052012
Cancellable iris template generation based on indexing-first-one hashing
YL Lai, Z Jin, ABJ Teoh, BM Goi, WS Yap, TY Chai, C Rathgeb
Pattern Recognition 64, 105-117, 2017
1022017
Biometric cryptosystems: a new biometric key binding and its implementation for fingerprint minutiae-based representation
Z Jin, ABJ Teoh, BM Goi, YH Tay
Pattern Recognition 56, 50-62, 2016
922016
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE)
RCW Phan, WC Yau, BM Goi
Information sciences 178 (13), 2849-2856, 2008
892008
MaTRU: A new NTRU-based cryptosystem
M Coglianese, BM Goi
Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on …, 2005
892005
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication
Z Jin, MH Lim, ABJ Teoh, BM Goi, YH Tay
IEEE Transactions on Systems, Man, and Cybernetics: Systems 46 (10), 1415 – 1428, 2016
812016
A review of facial gender recognition
CB Ng, YH Tay, BM Goi
Pattern Analysis and Applications 18, 739-755, 2015
692015
Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester
WC Yau, RCW Phan, SH Heng, BM Goi
International Journal of Computer Mathematics 90 (12), 2581-2587, 2013
672013
Java implementation for pairing-based cryptosystems
SY Tan, SH Heng, BM Goi
Computational Science and Its Applications–ICCSA 2010: International …, 2010
652010
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
BM Goi, RCW Phan, Y Yang, F Bao, RH Deng, MU Siddiqi
Applied Cryptography and Network Security: Second International Conference …, 2004
572004
Security mediated certificateless signatures
WS Yap, SSM Chow, SH Heng, BM Goi
Applied Cryptography and Network Security: 5th International Conference …, 2007
542007
Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
WC Yau, RCW Phan, SH Heng, BM Goi
FGIT-SecTech/DRBC, 149-160, 2010
532010
SPRING: a novel parallel chaos-based image encryption scheme
WK Lee, RCW Phan, WS Yap, BM Goi
Nonlinear Dynamics 92 (2), 575-593, 2018
522018
Cryptanalysis of an improved client-to-client password-authenticated key exchange (C2C-PAKE) scheme
RCW Phan, BM Goi
Applied Cryptography and Network Security: Third International Conference …, 2005
522005
Cryptanalysis of two provably secure cross-realm C2C-PAKE protocols
RCW Phan, BM Goi
Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006
392006
Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture
WK Lee, HS Cheong, RCW Phan, BM Goi
Cluster Computing 19, 335-347, 2016
372016
The system can't perform the operation now. Try again later.
Articles 1–20