Bok-Min Goi

Orcid: 0000-0002-9854-7121

According to our database1, Bok-Min Goi authored at least 119 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improving Uncertainty Sampling with Bell Curve Weight Function.
CoRR, 2024

2023
Visually meaningful image encryption algorithm based on digital signature.
Digit. Commun. Networks, February, 2023

Breaking Free From Entropy's Shackles: Cosine Distance-Sensitive Error Correction for Reliable Biometric Cryptography.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Implementation of ACORN and AEGIS-128 Authenticated Encryption on GPU for Internet of Things.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
High Performance Integer Multiplier on FPGA with Radix-4 Number Theoretic Transform.
KSII Trans. Internet Inf. Syst., 2022

Robustness attack on copyright protection scheme for H.264/AVC and SVC.
Int. J. Inf. Comput. Secur., 2022

A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2.
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022

Key Exchange Protocol Based on Permuted Goppa Syndrome Decoding Problem.
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022

Iriscode Matching Comparator to Improve Decidability of Human Iris Recognition.
Proceedings of the ICDSP 2022: 6th International Conference on Digital Signal Processing, Chengdu, China, February 25, 2022

2021
Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA.
J. Supercomput., 2021

Accelerating number theoretic transform in GPU platform for fully homomorphic encryption.
J. Supercomput., 2021

Towards Better Performance for Protected Iris Biometric System with Confidence Matrix.
Symmetry, 2021

Variant of Niederreiter-Based Signature Scheme for Blockchain Technology.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Area-Time-Efficient Code-Based Postquantum Key Encapsulation Mechanism on FPGA.
IEEE Trans. Very Large Scale Integr. Syst., 2020

Special issue on "Green and Human Information Technology 2019".
Neural Comput. Appl., 2020

Cryptanalysis of genetic algorithm-based encryption scheme.
Multim. Tools Appl., 2020

Optimized IoT Cryptoprocessor Based on QC-MPDC Key Encapsulation Mechanism.
IEEE Internet Things J., 2020

A New Genetic-Based Hyper-Heuristic Algorithm for Clustering Problem.
Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020), 2020

2019
A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme.
Symmetry, 2019

Pedestrian gender classification using combined global and local parts-based convolutional neural networks.
Pattern Anal. Appl., 2019

Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification.
Neural Networks, 2019

Signature Gateway: Offloading Signature Generation to IoT Gateway Accelerated by GPU.
IEEE Internet Things J., 2019

Terabit encryption in a second: Performance evaluation of block ciphers in GPU with Kepler, Maxwell, and Pascal architectures.
Concurr. Comput. Pract. Exp., 2019

Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme.
Proceedings of the Information Security Practice and Experience, 2019

Performance Analysis of an Fuzzy Logic Based LEACH Protocol.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Robustness Attacks on Video Watermarking Using Singular Value Decomposition.
Proceedings of the 2019 3rd International Conference on Digital Signal Processing, 2019

Vote-based Iris Detection System.
Proceedings of the 2019 3rd International Conference on Digital Signal Processing, 2019

2018
Cancellable speech template via random binary orthogonal matrices projection hashing.
Pattern Recognit., 2018

An alignment-free cancelable fingerprint template for bio-cryptosystems.
J. Netw. Comput. Appl., 2018

Security analysis of M-DES and key-based coded permutation ciphers in wireless channels.
IET Commun., 2018

SearchaStore: fast and secure searchable cloud services.
Clust. Comput., 2018

Parallel and High Speed Hashing in GPU for Telemedicine Applications.
IEEE Access, 2018

Fast NTRU Encryption in GPU for Secure IoP Communication in Post-Quantum Era.
Proceedings of the 2018 IEEE SmartWorld, 2018

Document level polarity classification with attention gated recurrent unit.
Proceedings of the 2018 International Conference on Information Networking, 2018

Study the Effect of Commonly Used Video Compression Techniques on Sound Recovery via Negligible Object Vibrations for Visual Surveillance System.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

Multimodal Biometrics System Using Feature-Level Fusion of Iris and Fingerprint.
Proceedings of the 2nd International Conference on Advances in Image Processing, 2018

2017
Cancellable iris template generation based on Indexing-First-One hashing.
Pattern Recognit., 2017

A Trainable Method For Iris Recognition Using Random Feature Points.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2017

Alignment-free indexing-first-one hashing with bloom filter integration.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Security of a robust transcoding-resistant watermarking for H.264 standard.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017

Analysis framework for H.264/AVC authentication.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2017

CUDA-SSL: SSL/TLS accelerated by GPU.
Proceedings of the International Carnahan Conference on Security Technology, 2017

Two-dimensional winner-takes-all hashing in template protection based on fingerprint and voice feature level fusion.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Cryptanalysis of a High-Definition Image Encryption Based on AES Modification.
Wirel. Pers. Commun., 2016

Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication.
IEEE Trans. Syst. Man Cybern. Syst., 2016

Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation.
Pattern Recognit., 2016

On the effective subkey space of some image encryption algorithms using external key.
J. Vis. Commun. Image Represent., 2016

Forgery attacks of an identity-based multi-proxy signature scheme.
Int. J. Commun. Syst., 2016

Fast implementation of block ciphers and PRNGs in Maxwell GPU architecture.
Clust. Comput., 2016

Iris Cancellable Template Generation Based on Indexing-First-One Hashing.
Proceedings of the Network and System Security - 10th International Conference, 2016

Improving Reliable Transmission Throughput with Systematic Random Code.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016

Bi-local region based iris segmentation framework for less- constrained visible wavelength images.
Proceedings of the 7th International Conference on Imaging for Crime Detection and Prevention, 2016

Accelerating Multiple Precision Multiplication in GPU with Kepler Architecture.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
On the security of a lightweight authentication and encryption scheme for mobile ad hoc network.
Secur. Commun. Networks, 2015

A review of facial gender recognition.
Pattern Anal. Appl., 2015

Improving the probability of complete decoding of random code by trading-off computational complexity.
IET Commun., 2015

Systematic rateless erasure code for short messages transmission.
Comput. Electr. Eng., 2015

Local Chan-Vese segmentation for non-ideal visible wavelength iris images.
Proceedings of the Conference on Technologies and Applications of Artificial Intelligence, 2015

Small-angle approximation attack on angle-based many-to-one functions for biometric templates.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
A two-dimensional random projected minutiae vicinity decomposition-based cancellable fingerprint template.
Secur. Commun. Networks, 2014

A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template.
Pattern Recognit. Lett., 2014

High speed implementation of symmetric block cipher on GPU.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

Non-invertible analysis on Graph-based Hamming Embedding Transform for protecting fingerprint minutiae.
Proceedings of the International Conference on Electronics, Information and Communications, 2014

2013
A Unified FPGA-Based System Architecture for 2-D Discrete Wavelet Transform.
J. Signal Process. Syst., 2013

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model.
KSII Trans. Internet Inf. Syst., 2013

Outwitting smart selfish nodes in wireless mesh networks.
Int. J. Commun. Syst., 2013

Keyword guessing attacks on secure searchable public key encryption schemes with a designated tester.
Int. J. Comput. Math., 2013

Stepping-Random Code: A Rateless Erasure Code for Short-Length Messages.
IEICE Trans. Commun., 2013

An authentication framework for peer-to-peer cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

A Convolutional Neural Network for Pedestrian Gender Recognition.
Proceedings of the Advances in Neural Networks - ISNN 2013, 2013

2012
Efficient encryption with keyword search in mobile networks.
Secur. Commun. Networks, 2012

On the realization of fuzzy identity-based identification scheme using fingerprint biometrics.
Secur. Commun. Networks, 2012

Security models for delegated keyword searching within encrypted contents.
J. Internet Serv. Appl., 2012

MPIFA: A Modified Protocol Independent Fairness Algorithm for Community Wireless Mesh Networks
CoRR, 2012

Vision-based Human Gender Recognition: A Survey
CoRR, 2012

Performance Analysis of Fountain-Based Protocol in CSMA/CA Wireless Networks.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Recognizing Human Gender in Computer Vision: A Survey.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

Email Encryption System Using Certificateless Public Key Encryption Scheme.
Proceedings of the Information Technology Convergence, Secure and Trust Computing, and Data Management, 2012

2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011

Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks.
KSII Trans. Internet Inf. Syst., 2011

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting.
KSII Trans. Internet Inf. Syst., 2011

On the Security of Two Fuzzy Identity-Based Signature Schemes.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

A Variant of Schnorr Identity-Based Identification Scheme with Tight Reduction.
Proceedings of the Future Generation Information Technology, 2011

Cryptanalysis of a Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol of CANS '09.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Java Implementation for Pairing-Based Cryptosystems.
Proceedings of the Computational Science and Its Applications, 2010

Proxy Re-encryption with Keyword Search: New Definitions and Algorithms.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
Attack on a semi-blind watermarking scheme based on singular value decomposition.
Comput. Stand. Interfaces, 2009

Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols.
Proceedings of the Third International Conference on Network and System Security, 2009

Attacks on a Block Based SVD Watermarking Scheme.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Hierarchical Identity-Based Identification Schemes.
Proceedings of the Security Technology, 2009

2008
Cryptanalysis of simple three-party key exchange protocol (S-3PAKE).
Inf. Sci., 2008

Attacks on a robust watermarking scheme based on self-reference image.
Comput. Stand. Interfaces, 2008

An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model.
Proceedings of the Public Key Infrastructure, 2008

Attacks on Improved Key Distribution Protocols with Perfect Reparability.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

(In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear Map.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes.
Proceedings of the Autonomic and Trusted Computing, 5th International Conference, 2008

On the Security of an Identity-Based Aggregate Signature Scheme.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Cryptanalysis of Some Proxy Signature Schemes Without Certificates.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

On the Security of a Popular Web Submission and Review Software (WSaR) for Cryptology Conferences.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

(In)Security of an Efficient Fingerprinting Scheme with Symmetric and Commutative Encryption of IWDW 2005.
Proceedings of the Digital Watermarking, 6th International Workshop, 2007

A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service.
Proceedings of the Computational Science and Its Applications, 2007

Cryptanalysis of Two Non-anonymous Buyer-Seller Watermarking Protocols for Content Protection.
Proceedings of the Computational Science and Its Applications, 2007

Security Mediated Certificateless Signatures.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Cryptanalysis of some improved password-authenticated key exchange schemes.
Comput. Commun., 2006

Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols.
Proceedings of the Progress in Cryptology, 2006

Smart Home Microcontroller: Telephone Interfacing.
Proceedings of the Computational Science and Its Applications, 2006

An Efficient Certificateless Signature Scheme.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
MaTRU: A New NTRU-Based Cryptosystem.
Proceedings of the Progress in Cryptology, 2005

On the Security Bounds of CMC, EME, EME<sup>+</sup> and EME<sup>*</sup> Modes of Operation.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Cryptanalysis of PASS II and MiniPass.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards.
Proceedings of the Computational Science and Its Applications, 2005

Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Further attacks and comments on 'security of two remote user authentication schemes using smart cards'.
IEEE Trans. Consumer Electron., 2004

Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity.
Proceedings of the Applied Cryptography and Network Security, 2004

2003
Computational complexity and implementation aspects of the incremental hash function.
IEEE Trans. Consumer Electron., 2003

2001
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining.
Proceedings of the Progress in Cryptology, 2001


  Loading...