default search action
Meng-Hui Lim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j18]Guangcan Mai, Meng-Hui Lim, Pong C. Yuen:
Binary feature fusion for discriminative and secure multi-biometric cryptosystems. Image Vis. Comput. 58: 254-265 (2017) - [c15]Guangcan Mai, Meng-Hui Lim, Pong C. Yuen:
On the guessability of binary biometric templates: A practical guessing entropy based approach. IJCB 2017: 367-374 - 2016
- [j17]Meng-Hui Lim, Sunny Verma, Guangcan Mai, Pong C. Yuen:
Learning discriminability-preserving histogram representation from unordered features for multibiometric feature-fused-template protection. Pattern Recognit. 60: 706-719 (2016) - [j16]Meng-Hui Lim, Pong C. Yuen:
Entropy Measurement for Biometric Verification Systems. IEEE Trans. Cybern. 46(5): 1065-1077 (2016) - [j15]Zhe Jin, Meng-Hui Lim, Andrew Beng Jin Teoh, Bok-Min Goi, Yong Haur Tay:
Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication. IEEE Trans. Syst. Man Cybern. Syst. 46(10): 1415-1428 (2016) - 2015
- [j14]Meng-Hui Lim, Andrew Beng Jin Teoh, Jaihie Kim:
Biometric Feature-Type Transformation: Making templates compatible for secret protection. IEEE Signal Process. Mag. 32(5): 77-87 (2015) - [c14]Guangcan Mai, Meng-Hui Lim, Pong C. Yuen:
Fusing binary templates for multi-biometric cryptosystems. BTAS 2015: 1-8 - [r1]Meng-Hui Lim, Andrew Beng Jin Teoh:
Biometric Template Binarization. Encyclopedia of Biometrics 2015: 257-263 - 2014
- [j13]Yi C. Feng, Meng-Hui Lim, Pong C. Yuen:
Masquerade attack on transform-based binary-template protection based on perceptron learning. Pattern Recognit. 47(9): 3019-3033 (2014) - [j12]Zhe Jin, Meng-Hui Lim, Andrew Beng Jin Teoh, Bok-Min Goi:
A non-invertible Randomized Graph-based Hamming Embedding for generating cancelable fingerprint template. Pattern Recognit. Lett. 42: 137-147 (2014) - [c13]Meng-Hui Lim, Jian-Guang Lou, Hongyu Zhang, Qiang Fu, Andrew Beng Jin Teoh, Qingwei Lin, Rui Ding, Dongmei Zhang:
Identifying Recurrent and Unknown Performance Issues. ICDM 2014: 320-329 - 2013
- [j11]Meng-Hui Lim, Andrew Beng Jin Teoh:
A Novel Encoding Scheme for Effective Biometric Discretization: Linearly Separable Subcode. IEEE Trans. Pattern Anal. Mach. Intell. 35(2): 300-313 (2013) - [j10]Meng-Hui Lim, Andrew Beng Jin Teoh, Kar-Ann Toh:
Dynamic Detection-Rate-Based Bit Allocation With Genuine Interval Concealment for Binary Biometric Representation. IEEE Trans. Cybern. 43(3): 843-857 (2013) - [c12]Ying-Cong Chen, Meng-Hui Lim, Pong Chi Yuen, Jian-Huang Lai:
Discriminant Spectral Hashing for Compact Palmprint Representation. CCBR 2013: 225-232 - [c11]Na Liu, Meng-Hui Lim, Pong C. Yuen, Jian-Huang Lai:
Image Set-Based Face Recognition: A Local Multi-keypoint Descriptor-Based Approach. CVPR Workshops 2013: 160-165 - 2012
- [j9]Meng-Hui Lim, Andrew Beng Jin Teoh, Kar-Ann Toh:
An efficient dynamic reliability-dependent bit allocation for biometric discretization. Pattern Recognit. 45(5): 1960-1971 (2012) - [j8]Meng-Hui Lim, Andrew Beng Jin Teoh:
An Analytic Performance Estimation Framework for Multibit Biometric Discretization Based on Equal-Probable Quantization and Linearly Separable Subcode Encoding. IEEE Trans. Inf. Forensics Secur. 7(4): 1242-1254 (2012) - [c10]Yi Cheng Feng, Pong Chi Yuen, Meng-Hui Lim:
Distance Entropy as an Information Measure for Binary Biometric Representation. CCBR 2012: 332-339 - 2011
- [j7]Meng-Hui Lim, Andrew Beng Jin Teoh, Kar-Ann Toh:
An analysis on equal width quantization and linearly separable subcode encoding-based discretization and its performance resemblances. EURASIP J. Adv. Signal Process. 2011: 82 (2011) - [j6]Meng-Hui Lim, Andrew Beng Jin Teoh:
An effective biometric discretization approach to extract highly discriminative, informative, and privacy-protective binary representation. EURASIP J. Adv. Signal Process. 2011: 107 (2011) - [j5]Meng-Hui Lim, Andrew Beng Jin Teoh:
Discriminative and Non-User Specific Binary Biometric Representation via Linearly-Separable SubCode Encoding-based Discretization. KSII Trans. Internet Inf. Syst. 5(2): 374-389 (2011) - [j4]Meng-Hui Lim, Bok-Min Goi, Sanggon Lee:
An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting. KSII Trans. Internet Inf. Syst. 5(4): 822-839 (2011) - [j3]Shu Yun Lim, Meng-Hui Lim:
Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network. J. Ubiquitous Syst. Pervasive Networks 2(1): 39-47 (2011) - [c9]Meng-Hui Lim, Andrew Beng Jin Teoh:
Non-user-Specific Multivariate Biometric Discretization with Medoid-Based Segmentation. CCBR 2011: 279-287 - 2010
- [j2]Meng-Hui Lim, MinYi Jeong, Andrew Beng Jin Teoh:
A Novel Two-Stage Approach in Rectifying BioHash's Problem under Stolen Token Scenario. J. Inform. and Commun. Convergence Engineering 8(2): 173-179 (2010) - [c8]Meng-Hui Lim, Andrew Beng Jin Teoh:
Dynamic detection rate-based bit allocation for biometric discretization. ICARCV 2010: 1285-1290
2000 – 2009
- 2009
- [j1]Sanggon Lee, Meng-Hui Lim, Hoon-Jae Lee:
Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card. J. Inform. and Commun. Convergence Engineering 7(3): 340-344 (2009) - 2008
- [c7]Shu Yun Lim, Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network. IAS 2008: 43-49 - [c6]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. ICCSA (2) 2008: 458-467 - [c5]Meng-Hui Lim, Sanggon Lee, Hoon-Jae Lee:
An Improved Variant of Wang-Cao's Certificate-Based Authenticated Key Agreement Protocol. NCM (2) 2008: 198-201 - [c4]Meng-Hui Lim, Chee-Min Yeoh, Sanggon Lee, Hyotaek Lim, Hoonjae Lee:
A Secure and Efficient Three-Pass Authenticated Key Agreement Protocol Based on Elliptic Curves. Networking 2008: 170-182 - 2007
- [c3]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-Round Pairing-Based Tripartite Authenticated Key Agreement Protocol. ICCSA (2) 2007: 503-513 - [c2]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-Based Deniable Authentication Protocol on Pairings. ICCSA (2) 2007: 1008-1017 - [c1]Meng-Hui Lim, Sanggon Lee, Sang-Jae Moon:
Cryptanalysis of Tso et al.'s ID-Based Tripartite Authenticated Key Agreement Protocol. ICISS 2007: 64-76 - [i7]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced ID-based Deniable Authentication Protocol on Pairings. IACR Cryptol. ePrint Arch. 2007: 113 (2007) - [i6]Meng-Hui Lim, Sanggon Lee, Youngho Park, Hoonjae Lee:
An Enhanced One-round Pairing-based Tripartite Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 142 (2007) - [i5]Meng-Hui Lim, Sanggon Lee, Youngho Park, Sang-Jae Moon:
Secure Deniable Authenticated Key Establishment for Internet Protocols. IACR Cryptol. ePrint Arch. 2007: 163 (2007) - [i4]Meng-Hui Lim, Sanggon Lee:
An Improved One-Round ID-Based Tripartite Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 189 (2007) - [i3]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalysis on Improved Chou et al.'s ID-Based Deniable Authentication Protocol. IACR Cryptol. ePrint Arch. 2007: 383 (2007) - [i2]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalysis on Improved One-round Lin-Li's Tripartite Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 411 (2007) - [i1]Meng-Hui Lim, Sanggon Lee, Hoonjae Lee:
Cryptanalytic Flaws in Oh et al.'s ID-Based Authenticated Key Agreement Protocol. IACR Cryptol. ePrint Arch. 2007: 415 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint