Hoon Wei Lim

Orcid: 0000-0002-7830-3007

Affiliations:
  • Royal Holloway, University of London, UK


According to our database1, Hoon Wei Lim authored at least 49 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RollBack: A New Time-Agnostic Replay Attack Against the Automotive Remote Keyless Entry Systems.
ACM Trans. Cyber Phys. Syst., January, 2024

KnowPhish: Large Language Models Meet Multimodal Knowledge Graphs for Enhancing Reference-Based Phishing Detection.
CoRR, 2024

2023
POSTER: Security Logs Graph Analytics for Industry Network System.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
PRoM: Passive Remote Attestation Against Roving Malware in Multicore IoT Devices.
IEEE Syst. J., 2022

Machine-Learning-Based Attestation for the Internet of Things Using Memory Traces.
IEEE Internet Things J., 2022

2021
Stateful KEM: Towards Optimal Robust Combiner for Key Encapsulation Mechanism.
IACR Cryptol. ePrint Arch., 2021

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021

2020
<i>PrivateLink</i>: Privacy-Preserving Integration and Sharing of Datasets.
IEEE Trans. Inf. Forensics Secur., 2020

Data Integrity Threats and Countermeasures in Railway Spot Transmission Systems.
ACM Trans. Cyber Phys. Syst., 2020

HAtt: Hybrid Remote Attestation for the Internet of Things With High Availability.
IEEE Internet Things J., 2020

PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
IACR Cryptol. ePrint Arch., 2020

Practical Quantum-Safe Stateful Hybrid Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2020

PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates.
IACR Cryptol. ePrint Arch., 2020

2016
Authenticated Key Exchange Protocols for Parallel Network File Systems.
IEEE Trans. Parallel Distributed Syst., 2016

2015
Privacy-Preserving Observation in Public Spaces.
Proceedings of the Computer Security - ESORICS 2015, 2015

2014
Cross-Domain Password-Based Authenticated Key Exchange Revisited.
ACM Trans. Inf. Syst. Secur., 2014

Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2014

Shorter identity-based encryption via asymmetric pairings.
Des. Codes Cryptogr., 2014

The relation and transformation between hierarchical inner product encryption and spatial encryption.
Des. Codes Cryptogr., 2014

Spatial encryption supporting non-monotone access structure.
Des. Codes Cryptogr., 2014

A multi-hop reputation announcement scheme for VANETs.
Proceedings of 2014 IEEE International Conference on Service Operations and Logistics, 2014

Distributed Searchable Symmetric Encryption.
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

2013
Revocable IBE Systems with Almost Constant-size Key Update.
IACR Cryptol. ePrint Arch., 2013

Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation.
IACR Cryptol. ePrint Arch., 2013

Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
Workflow Signatures for Business Process Compliance.
IEEE Trans. Dependable Secur. Comput., 2012

Multi-receiver Homomorphic Authentication Codes for Network Coding.
IACR Cryptol. ePrint Arch., 2012

Shorter IBE and Signatures via Asymmetric Pairings.
IACR Cryptol. ePrint Arch., 2012

Anonymous and Adaptively Secure Revocable IBE with Constant Size Public Parameters
CoRR, 2012

Privacy-Preserving Techniques and System for Streaming Databases.
Proceedings of the 2012 International Conference on Privacy, 2012

Revisiting a Secret Sharing Approach to Network Codes.
Proceedings of the Provable Security - 6th International Conference, 2012

Combined Public-Key Schemes: The Case of ABE and ABS.
Proceedings of the Provable Security - 6th International Conference, 2012

2011
Identity-based cryptography for grid security.
Int. J. Inf. Sec., 2011

User-friendly and certificate-free grid security infrastructure.
Int. J. Inf. Sec., 2011

Revocable Identity-Based Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2011

Fully Secure Spatial Encryption under Simple Assumptions with Constant-Size Ciphertexts.
IACR Cryptol. ePrint Arch., 2011

An Efficient Cacheable Secure Scalar Product Protocol for Privacy-Preserving Data Mining.
Proceedings of the Data Warehousing and Knowledge Discovery, 2011

2009
Key Management for Large-Scale Distributed Storage Systems.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Role Signatures for Access Control in Open Distributed Systems.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

2007
What can identity-based cryptography offer to web services?
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Multi-key Hierarchical Identity-Based Signatures.
Proceedings of the Cryptography and Coding, 2007

Identity-Based and Inter-Domain Password Authenticated Key Exchange for Lightweight Clients.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
On the application of identity-based cryptography in grid security.
PhD thesis, 2006

Secret Public Key Protocols Revisited.
Proceedings of the Security Protocols, 2006

Secret Public Key Protocols Revisited.
Proceedings of the Security Protocols, 2006

2005
User-Friendly Grid Security Architecture and Protocols.
Proceedings of the Security Protocols, 2005

User-Friendly Grid Security Architecture and Protocols.
Proceedings of the Security Protocols, 2005

A Dynamic Key Infrastructure for Grid.
Proceedings of the Advances in Grid Computing, 2005

2004
On Identity-Based Cryptography and Grid Computing.
Proceedings of the Computational Science, 2004


  Loading...