Showing 1 - 5 results of 5 for search 'Syh-Yuan Tan' Skip to content
    • About the Library
    • Rules and Regulations
    • Library Services
    • Library Hours
  • Library News
    • Digital Repository
    • Google Scholar
    • ResearchGate
    • AJoGPL
    • KURJ
    • AJLS
    • MyLOFT
    • Lexis Plus UK
    • Britannica Academic
    • Research Support Tools
    • Quick Resource Links
  • Login
Advanced
  • Author
  • Syh-Yuan Tan
Showing 1 - 5 results of 5 for search 'Syh-Yuan Tan', query time: 0.02s Refine Results
  1. 1
    A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability

    A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability by Yun-Xing Kho, Swee-Huay Heng, Syh-Yuan Tan, Ji-Jian Chin

    Published 2025-01-01
    Get full text
    Article
    Save to List
    Saved in:
  2. 2
    Relationships Among e-Voting, e-Auction, e-Cheque, and e-Cash

    Relationships Among e-Voting, e-Auction, e-Cheque, and e-Cash by Yun-Xing Kho, Swee-Huay Heng, Syh-Yuan Tan, Ji-Jian Chin

    Published 2025-01-01
    Get full text
    Article
    Save to List
    Saved in:
  3. 3
    A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability.

    A provably secure coercion-resistant e-voting scheme with confidentiality, anonymity, unforgeability, and CAI verifiability. by Yun-Xing Kho, Swee-Huay Heng, Syh-Yuan Tan, Ji-Jian Chin

    Published 2025-01-01
    Get full text
    Article
    Save to List
    Saved in:
  4. 4
    Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme

    Twin-Schnorr: A Security Upgrade for the Schnorr Identity-Based Identification Scheme by Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael Chung-Wei Phan

    Published 2015-01-01
    Get full text
    Article
    Save to List
    Saved in:
  5. 5
    Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes

    Efficient and Provable Secure Pairing-Free Security-Mediated Identity-Based Identification Schemes by Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan

    Published 2014-01-01
    Get full text
    Article
    Save to List
    Saved in:

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs