Hoon Wei Lim
Hoon Wei Lim
Singtel
Verified email at singtel.com
TitleCited byYear
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling, H Wang
Cryptographers’ Track at the RSA Conference, 50-67, 2013
752013
Shorter IBE and signatures via asymmetric pairings
J Chen, HW Lim, S Ling, H Wang, H Wee
International Conference on Pairing-Based Cryptography, 122-140, 2012
642012
On identity-based cryptography and grid computing
HW Lim, MJB Robshaw
International Conference on Computational Science, 474-477, 2004
642004
Revocable identity-based encryption from lattices
J Chen, HW Lim, S Ling, H Wang, K Nguyen
Australasian Conference on Information Security and Privacy, 390-403, 2012
632012
Identity-based cryptography for grid security
HW Lim, KG Paterson
First International Conference on e-Science and Grid Computing (e-Science'05 …, 2005
482005
A Dynamic Key Infrastructure for Grid
HW Lim, MJB Robshaw
European Grid Conference, 255-264, 2005
472005
What can identity-based cryptography offer to web services?
J Crampton, HW Lim, KG Paterson
Proceedings of the 2007 ACM workshop on Secure web services, 26-36, 2007
362007
Combined public-key schemes: the case of ABE and ABS
C Chen, J Chen, HW Lim, Z Zhang, D Feng
International Conference on Provable Security, 53-69, 2012
342012
On the application of identity-based cryptography in grid security
HW Lim
University of London, 2006
322006
Distributed searchable symmetric encryption
C Bösch, A Peter, B Leenders, HW Lim, Q Tang, H Wang, P Hartel, ...
2014 Twelfth Annual International Conference on Privacy, Security and Trust …, 2014
222014
Identity-based cryptography for grid security
HW Lim, KG Paterson
International Journal of Information Security 10 (1), 15-32, 2011
212011
User-friendly grid security architecture and protocols
L Chen, HW Lim, W Mao
International Workshop on Security Protocols, 139-156, 2005
212005
A certificate-free grid security infrastructure supporting password-based user authentication
J Crampton, HW Lim, KG Paterson, G Price
Proceedings of the 6th Annual PKI R&D Workshop, 103-118, 2007
202007
Cross-domain password-based authenticated key exchange revisited
L Chen, HW Lim, G Yang
ACM Transactions on Information and System Security (TISSEC) 16 (4), 15, 2014
182014
Privacy-preserving billing for e-ticketing systems in public transportation
F Kerschbaum, HW Lim, I Gudymenko
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
172013
Workflow signatures for business process compliance
HW Lim, F Kerschbaum, H Wang
IEEE Transactions on Dependable and Secure Computing 9 (5), 756-769, 2012
152012
Multi-key hierarchical identity-based signatures
HW Lim, KG Paterson
IMA International Conference on Cryptography and Coding, 384-402, 2007
152007
The relation and transformation between hierarchical inner product encryption and spatial encryption
J Chen, HW Lim, S Ling, H Wang
Designs, codes and cryptography 71 (2), 347-364, 2014
122014
Revocable IBE systems with almost constant-size key update
L Su, HW Lim, S Ling, H Wang
International Conference on Pairing-Based Cryptography, 168-185, 2013
122013
A multi-hop reputation announcement scheme for VANETs
Z Cao, Q Li, HW Lim, J Zhang
Proceedings of 2014 IEEE International Conference on Service Operations and …, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20