Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang Cryptographers’ Track at the RSA Conference, 50-67, 2013 | 86 | 2013 |
Revocable identity-based encryption from lattices J Chen, HW Lim, S Ling, H Wang, K Nguyen Australasian Conference on Information Security and Privacy, 390-403, 2012 | 73 | 2012 |
Shorter IBE and signatures via asymmetric pairings J Chen, HW Lim, S Ling, H Wang, H Wee International Conference on Pairing-Based Cryptography, 122-140, 2012 | 67 | 2012 |
On identity-based cryptography and grid computing HW Lim, MJB Robshaw International Conference on Computational Science, 474-477, 2004 | 63 | 2004 |
A Dynamic Key Infrastructure for Grid HW Lim, MJB Robshaw European Grid Conference, 255-264, 2005 | 50 | 2005 |
Identity-based cryptography for grid security HW Lim, KG Paterson First International Conference on e-Science and Grid Computing (e-Science'05 …, 2005 | 49 | 2005 |
Combined public-key schemes: The case of ABE and ABS C Chen, J Chen, HW Lim, Z Zhang, D Feng International Conference on Provable Security, 53-69, 2012 | 40 | 2012 |
What can identity-based cryptography offer to web services? J Crampton, HW Lim, KG Paterson Proceedings of the 2007 ACM workshop on Secure web services, 26-36, 2007 | 40 | 2007 |
On the application of identity-based cryptography in grid security HW Lim University of London, 2006 | 36 | 2006 |
Distributed searchable symmetric encryption C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ... 2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014 | 29 | 2014 |
User-friendly grid security architecture and protocols L Chen, HW Lim, W Mao International Workshop on Security Protocols, 139-156, 2005 | 21 | 2005 |
Privacy-preserving billing for e-ticketing systems in public transportation F Kerschbaum, HW Lim, I Gudymenko Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013 | 20 | 2013 |
Identity-based cryptography for grid security HW Lim, KG Paterson International Journal of Information Security 10 (1), 15-32, 2011 | 20 | 2011 |
A certificate-free grid security infrastructure supporting password-based user authentication J Crampton, HW Lim, KG Paterson, G Price Proceedings of the 6th Annual PKI R&D Workshop, 103-118, 2007 | 20 | 2007 |
Cross-domain password-based authenticated key exchange revisited L Chen, HW Lim, G Yang ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014 | 19 | 2014 |
Workflow signatures for business process compliance HW Lim, F Kerschbaum, H Wang IEEE Transactions on Dependable and Secure Computing 9 (5), 756-769, 2012 | 17 | 2012 |
Multi-key hierarchical identity-based signatures HW Lim, KG Paterson IMA International Conference on Cryptography and Coding, 384-402, 2007 | 15 | 2007 |
Authenticated key exchange protocols for parallel network file systems HW Lim, G Yang IEEE transactions on parallel and distributed systems 27 (1), 92-105, 2015 | 13 | 2015 |
The relation and transformation between hierarchical inner product encryption and spatial encryption J Chen, HW Lim, S Ling, H Wang Designs, codes and cryptography 71 (2), 347-364, 2014 | 12 | 2014 |
Revocable IBE systems with almost constant-size key update L Su, HW Lim, S Ling, H Wang International Conference on Pairing-Based Cryptography, 168-185, 2013 | 12 | 2013 |