Teik Guan Tan

Orcid: 0000-0003-3373-699X

According to our database1, Teik Guan Tan authored at least 21 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Funder: Future-Proof Unbiased Decentralized Randomness.
IEEE Internet Things J., March, 2024

2023
Post-Quantum Adversarial Modeling: A User's Perspective.
Computer, August, 2023

2022
Optimal and Privacy-Aware Resource Management in Artificial Intelligence of Things Using Osmotic Computing.
IEEE Trans. Ind. Informatics, 2022

Challenges of post-quantum digital signing in real-world applications: a survey.
Int. J. Inf. Sec., 2022

ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret.
IACR Cryptol. ePrint Arch., 2022

Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution.
Distributed Ledger Technol. Res. Pract., 2022

Calibrating Learning Parity with Noise Authentication for Low-Resource Devices.
Proceedings of the Information and Communications Security - 24th International Conference, 2022

Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

Securing Password Authentication for Web-based Applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Post-Quantum VRF and its Applications in Future-Proof Blockchain System.
CoRR, 2021

Layering Quantum-Resistance into Classical Digital Signature Algorithms.
Proceedings of the Information Security - 24th International Conference, 2021

Quantum Computing Threat Modelling on a Generic CPS Setup.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

2019
A Survey of Digital Signing in the Post Quantum Era.
IACR Cryptol. ePrint Arch., 2019

2010
BetterThanPin: Empowering Users to Fight Phishing (Poster).
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2007
Defeating Active Phishing Attacks for Web-Based Transactions.
Int. J. Inf. Secur. Priv., 2007

2005
An Enhanced One-Time Password Implementation.
Proceedings of The 2005 International Conference on Security and Management, 2005

1999
Rapid Prototyping with Constraints-based Scheduling for Multimedia Applications.
Multim. Tools Appl., 1999

1998
Approximating scheduling for multimedia applications under overload conditions.
Int. J. Approx. Reason., 1998

1997
Scheduling multimedia applications under overload and non-deterministic conditions.
Proceedings of the 3rd IEEE Real-Time Technology and Applications Symposium, 1997

Interactive Scheduling Supports for Real-Time Multimedia Execution.
Proceedings of the International Conference on Multimedia Computing and Systems, 1997


  Loading...