Authenticated Key Exchange Protocols for Parallel Network File Systems
Lim, Hoon Wei, Yang, Guomin
Published in IEEE transactions on parallel and distributed systems (01.01.2016)
Published in IEEE transactions on parallel and distributed systems (01.01.2016)
Get full text
Journal Article
Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces
Aman, Muhammad Naveed, Basheer, Haroon, Wong, Jun Wen, Xu, Jia, Lim, Hoon Wei, Sikdar, Biplab
Published in IEEE internet of things journal (15.10.2022)
Published in IEEE internet of things journal (15.10.2022)
Get full text
Journal Article
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices
Aman, Muhammad Naveed, Basheer, Mohamed Haroon, Dash, Siddhant, Sancheti, Ashutosh, Wong, Jun Wen, Xu, Jia, Lim, Hoon Wei, Sikdar, Biplab
Published in IEEE systems journal (01.03.2022)
Published in IEEE systems journal (01.03.2022)
Get full text
Journal Article
Workflow Signatures for Business Process Compliance
Hoon Wei Lim, Kerschbaum, F., Huaxiong Wang
Published in IEEE transactions on dependable and secure computing (01.09.2012)
Published in IEEE transactions on dependable and secure computing (01.09.2012)
Get full text
Journal Article
The relation and transformation between hierarchical inner product encryption and spatial encryption
Chen, Jie, Lim, Hoon Wei, Ling, San, Wang, Huaxiong
Published in Designs, codes, and cryptography (01.05.2014)
Published in Designs, codes, and cryptography (01.05.2014)
Get full text
Journal Article
Spatial encryption supporting non-monotone access structure
Chen, Jie, Lim, Hoon Wei, Ling, San, Su, Le, Wang, Huaxiong
Published in Designs, codes, and cryptography (01.12.2014)
Published in Designs, codes, and cryptography (01.12.2014)
Get full text
Journal Article
Cross-domain password-based authenticated key exchange revisited
Get full text
Conference Proceeding
Shorter identity-based encryption via asymmetric pairings
JIE CHEN, HOON WEI LIM, SAN LING, HUAXIONG WANG, WEE, Hoeteck
Published in Designs, codes, and cryptography (01.12.2014)
Published in Designs, codes, and cryptography (01.12.2014)
Get full text
Journal Article
Graph-Based Attack Path Discovery for Network Security
Meng, Qiaoran, Wang, Huilin, Oo, Nay, Lim, Hoon Wei, Johannes Schatz, Benedikt, Sikdar, Biplab
Published in 2023 7th Cyber Security in Networking Conference (CSNet) (16.10.2023)
Published in 2023 7th Cyber Security in Networking Conference (CSNet) (16.10.2023)
Get full text
Conference Proceeding
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems
Csikor, Levente, Hoon Wei Lim, Jun Wen Wong, Soundarya Ramesh, Parameswarath, Rohini Poolat, Mun Choon Chan
Published in arXiv.org (14.09.2022)
Published in arXiv.org (14.09.2022)
Get full text
Paper
Journal Article
[Formula Omitted]: Privacy-Preserving Integration and Sharing of Datasets
Hoon Wei Lim, Geong Sen Poh, Xu, Jia, Chittawar, Varsha
Published in IEEE transactions on information forensics and security (01.01.2020)
Published in IEEE transactions on information forensics and security (01.01.2020)
Get full text
Journal Article
Distributed Searchable Symmetric Encryption
Bosch, Christoph, Peter, Andreas, Leenders, Bram, Hoon Wei Lim, Qiang Tang, Huaxiong Wang, Hartel, Pieter, Jonker, Willem
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01.07.2014)
Published in 2014 Twelfth Annual International Conference on Privacy, Security and Trust (01.07.2014)
Get full text
Conference Proceeding
Shorter identity-based encryption via asymmetric pairings
Chen, Jie, Lim, Hoon Wei, Ling, San, Wang, Huaxiong, Wee, Hoeteck
Published in Designs, codes, and cryptography (01.12.2014)
Published in Designs, codes, and cryptography (01.12.2014)
Get full text
Journal Article
Privacy-Preserving Techniques and System for Streaming Databases
Santana de Oliveira, Anderson, Kerschbaum, F., Hoon Wei Lim, Su-Yang Yu
Published in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing (01.09.2012)
Published in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing (01.09.2012)
Get full text
Conference Proceeding
Identity-based cryptography for grid security
Lim, Hoon Wei, Paterson, Kenneth G.
Published in International journal of information security (01.02.2011)
Published in International journal of information security (01.02.2011)
Get full text
Journal Article
Identity-based cryptography for grid security
Hoon Wei Lim, Paterson, K.G.
Published in First International Conference on e-Science and Grid Computing (e-Science'05) (2005)
Published in First International Conference on e-Science and Grid Computing (e-Science'05) (2005)
Get full text
Conference Proceeding