Alwyn Goh

According to our database1, Alwyn Goh authored at least 26 papers between 1998 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Transaction signing on multiple channels.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
Challenge response interaction for biometric liveness establishment and template protection.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Generation of one-time keys for single line authentication.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Remote website authentication using dynamic multi-scale code visualization.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Cancellability for local binary pattern biometric authentication.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

2014
Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

2006
Biometric hash: high-confidence face recognition.
IEEE Trans. Circuits Syst. Video Technol., 2006

Random Multispace Quantization as an Analytic Mechanism for BioHashing of Biometric and Random Identity Inputs.
IEEE Trans. Pattern Anal. Mach. Intell., 2006

Generation of Replaceable Cryptographic Keys from Dynamic Handwritten Signatures.
Proceedings of the Advances in Biometrics, International Conference, 2006

2005
Recognition using robust bit extraction.
J. Electronic Imaging, 2005

Cryptographic Keys from Dynamic Hand-Signatures with Biometric Secrecy Preservation and Replaceability.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005

2004
Biohashing: two factor authentication featuring fingerprint data and tokenised random number.
Pattern Recognit., 2004

Personalised cryptographic key generation based on FaceHashing.
Comput. Secur., 2004

An Integrated Dual Factor Authenticator Based on the Face Data and Tokenised Random Number.
Proceedings of the Biometric Authentication, First International Conference, 2004

Eigenspace-Based Face Hashing.
Proceedings of the Biometric Authentication, First International Conference, 2004

2003
Flexibly Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage.
Proceedings of the Communications and Multimedia Security, 2003

Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Proceedings of the Communications and Multimedia Security, 2003

Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection.
Proceedings of the Communications and Multimedia Security, 2003

Computation of Cryptographic Keys from Face Biometrics.
Proceedings of the Communications and Multimedia Security, 2003

2002
Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.
Proceedings of the Information Security, 5th International Conference, 2002

2001
Analyzing Data Clusters: A Rough Sets Approach to Extract Cluster-Defining Symbolic Rules.
Proceedings of the Advances in Intelligent Data Analysis, 4th International Conference, 2001

A Web-Enabled Exam Preparation and Evaluation Service: Providing Real-Time Personalized Tests for Academic Enhancement.
Proceedings of the Proceedings IEEE International Conference on Advanced Learning Technology: Issues, 2001

1999
Java-based Framework for the Secure Distribution of Electronic Medical Records.
Proceedings of the Medical Informatics Europe '99, Proceedings, Ljubljana, Slovenia, 1999

Re-Visiting Backpropagation Network Optimization: Towards Maximally Pruned Networks.
Proceedings of the International Conference on Artificial Intelligence, 1999

1998
Applying Knowledge Discovery to Predict Infectious Disease Epidemics.
Proceedings of the PRICAI'98, 1998

Telemedicine and Medical Informatics in the Multimedia Super Corridor: The Malaysian Vision.
Proceedings of the MEDINFO '98, 1998


  Loading...