Search For:

Displaying 1-7 out of 7 total
A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode
Found in: IEEE Transactions on Pattern Analysis and Machine Intelligence
By Meng-Hui Lim,A. B. J. Teoh
Issue Date:February 2013
pp. 300-313
Separability in a code is crucial in guaranteeing a decent Hamming-distance separation among the codewords. In multibit biometric discretization where a code is used for quantization-intervals labeling, separability is necessary for preserving distance dis...
 
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network
Found in: Information Assurance and Security, International Symposium on
By Shu Yun Lim, Meng-Hui Lim, Sang Gon Lee, Hoon Jae Lee
Issue Date:September 2008
pp. 43-49
Key management is deemed as the fundamental essential part of any secure communication. A secure sensor network communication protocol relies on the substantial secure, robust and efficient key management system. We put forward a new hybrid group key manag...
 
An Efficient Multi-server Password Authenticated Key Agreement Scheme Revisited
Found in: Convergence Information Technology, International Conference on
By Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Issue Date:November 2008
pp. 396-400
In 2007, Hu-Niu-Yang put forward an improved efficient password authenticated key agreement scheme for multi-server architecture based on Chang-Lee's scheme proposed in 2004. This scheme is claimed to be more efficient and is able to overcome a few existin...
 
Insider Impersonation Attack on a Tripartite ID-Based Authenticated Key Agreement Protocol with Bilinear Pairings
Found in: Next Generation Web Services Practices, International Conference on
By Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Issue Date:October 2008
pp. 123-128
A key agreement protocol is designed for two or more entities to agree upon a shared secret key, which can subsequently be used to preserve confidentiality and data integrity over an open network. Since Joux has pioneered the notion of pairing-based tripar...
 
On the Deniability of Some Deniable Authentication Protocols
Found in: Mobile Ubiquitous Computing, Systems, Services and Technologies, International Conference on
By Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Issue Date:October 2008
pp. 257-262
A deniable authentication protocol enables the protocol participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical applications such as o...
 
Cryptanalysis on Improved Chou et al.?s ID-Based Deniable Authentication Protocol
Found in: Information Science and Security, International Conference on
By Meng-Hui Lim, Sanggon Lee, Hoonjae Lee
Issue Date:January 2008
pp. 87-93
A deniable authentication protocol enables the proto- col participants to authenticate their respective peers, while able to deny their participation after the protocol execution. This protocol can be extremely useful in some practical ap- plications such ...
 
Hierarchical Dawson's Summation Generator
Found in: Convergence Information Technology, International Conference on
By Meng-Hui Lim,Bok-Min Goi,SangGon Lee,HoonJae Lee
Issue Date:November 2007
pp. 1395-1401
In 1986, Rueppel has pioneered the notion of summation generator and shown that the proposed summation generator obtained maximum correlation immunity as well as nonlinearity by adding 1 bit of memory to the memoryless nonlinear combiner. Since then, vario...
 
 1