Meng-Hui Lim

According to our database1, Meng-Hui Lim authored at least 38 papers between 2007 and 2017.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Binary feature fusion for discriminative and secure multi-biometric cryptosystems.
Image Vis. Comput., 2017

On the guessability of binary biometric templates: A practical guessing entropy based approach.
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017

2016
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication.
IEEE Trans. Syst. Man Cybern. Syst., 2016

Entropy Measurement for Biometric Verification Systems.
IEEE Trans. Cybern., 2016

Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection.
Pattern Recognit., 2016

2015
Biometric Template Binarization.
Proceedings of the Encyclopedia of Biometrics, Second Edition, 2015

Biometric Feature-Type Transformation: Making templates compatible for secret protection.
IEEE Signal Process. Mag., 2015

Fusing binary templates for multi-biometric cryptosystems.
Proceedings of the IEEE 7th International Conference on Biometrics Theory, 2015

2014
A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template.
Pattern Recognit. Lett., 2014

Masquerade attack on transform-based binary-template protection based on perceptron learning.
Pattern Recognit., 2014

Identifying Recurrent and Unknown Performance Issues.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

2013
Dynamic Detection-Rate-Based Bit Allocation With Genuine Interval Concealment for Binary Biometric Representation.
IEEE Trans. Cybern., 2013

A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode.
IEEE Trans. Pattern Anal. Mach. Intell., 2013

Image Set-Based Face Recognition: A Local Multi-keypoint Descriptor-Based Approach.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2013

Discriminant Spectral Hashing for Compact Palmprint Representation.
Proceedings of the Biometric Recognition - 8th Chinese Conference, 2013

2012
An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding.
IEEE Trans. Inf. Forensics Secur., 2012

An efficient dynamic reliability-dependent bit allocation for biometric discretization.
Pattern Recognit., 2012

Distance Entropy as an Information Measure for Binary Biometric Representation.
Proceedings of the Biometric Recognition - 7th Chinese Conference, 2012

2011
Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network.
J. Ubiquitous Syst. Pervasive Networks, 2011

Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization.
KSII Trans. Internet Inf. Syst., 2011

An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting.
KSII Trans. Internet Inf. Syst., 2011

An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances.
EURASIP J. Adv. Signal Process., 2011

An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation.
EURASIP J. Adv. Signal Process., 2011

Non-user-Specific Multivariate Biometric Discretization with Medoid-Based Segmentation.
Proceedings of the Biometric Recognition - 6th Chinese Conference, 2011

2010
A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario.
J. Inform. and Commun. Convergence Engineering, 2010

Dynamic detection rate-based bit allocation for biometric discretization.
Proceedings of the 11th International Conference on Control, 2010

2009
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card.
J. Inform. and Commun. Convergence Engineering, 2009

2008
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves.
Proceedings of the NETWORKING 2008, Ad Hoc and Sensor Networks, Wireless Networks, 2008

An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Secure Deniable Authenticated Key Establishment for Internet Protocols.
IACR Cryptol. ePrint Arch., 2007

An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

An Enhanced ID-based Deniable Authentication Protocol on Pairings.
IACR Cryptol. ePrint Arch., 2007

Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol.
IACR Cryptol. ePrint Arch., 2007

An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2007

Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol.
Proceedings of the Information Systems Security, Third International Conference, 2007


  Loading...