default search action
Teik Guan Tan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Zengpeng Li, Mei Wang, Teik Guan Tan, Jianying Zhou:
Funder: Future-Proof Unbiased Decentralized Randomness. IEEE Internet Things J. 11(6): 10352-10367 (2024) - [c13]Xiaodong Ye, Teik Guan Tan, Jianying Zhou:
Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries. ACNS Workshops (1) 2024: 283-302 - [c12]Xinxin Fan, Teik Guan Tan, Nicholas Ho, Shi Hong Choy:
Enabling a Smooth Migration Towards Post-Quantum Security for Ethereum. ICBC 2024: 3-15 - 2023
- [j7]Teik Guan Tan, Jianying Zhou, Vishal Sharma, Saraju P. Mohanty:
Post-Quantum Adversarial Modeling: A User's Perspective. Computer 56(8): 58-67 (2023) - [c11]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret. ACNS Workshops 2023: 530-550 - 2022
- [j6]Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou:
Reinshard: An Optimally Sharded Dual-Blockchain for Concurrency Resolution. Distributed Ledger Technol. Res. Pract. 1(1): 1-23 (2022) - [j5]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Challenges of post-quantum digital signing in real-world applications: a survey. Int. J. Inf. Sec. 21(4): 937-952 (2022) - [j4]Vishal Sharma, Teik Guan Tan, Saurabh Singh, Pradip Kumar Sharma:
Optimal and Privacy-Aware Resource Management in Artificial Intelligence of Things Using Osmotic Computing. IEEE Trans. Ind. Informatics 18(5): 3377-3386 (2022) - [c10]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. DSC 2022: 1-10 - [c9]Teik Guan Tan, Jianying Zhou:
Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications. DPM/CBT@ESORICS 2022: 308-316 - [c8]Teik Guan Tan, De Wen Soh, Jianying Zhou:
Calibrating Learning Parity with Noise Authentication for Low-Resource Devices. ICICS 2022: 19-36 - [i5]Teik Guan Tan, Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Jianying Zhou:
ZKBdf: A ZKBoo-based Quantum-Secure Verifiable Delay Function with Prover-secret. IACR Cryptol. ePrint Arch. 2022: 1373 (2022) - 2021
- [c7]Cher Chye Lee, Teik Guan Tan, Vishal Sharma, Jianying Zhou:
Quantum Computing Threat Modelling on a Generic CPS Setup. ACNS Workshops 2021: 171-190 - [c6]Teik Guan Tan, Jianying Zhou:
Layering Quantum-Resistance into Classical Digital Signature Algorithms. ISC 2021: 26-41 - [i4]Zengpeng Li, Teik Guan Tan, Pawel Szalachowski, Vishal Sharma, Jianying Zhou:
Post-Quantum VRF and its Applications in Future-Proof Blockchain System. CoRR abs/2109.02012 (2021) - [i3]Vishal Sharma, Zengpeng Li, Pawel Szalachowski, Teik Guan Tan, Jianying Zhou:
Reinshard: An optimally sharded dual-blockchain for concurrency resolution. CoRR abs/2109.07316 (2021) - 2020
- [c5]Teik Guan Tan, Vishal Sharma, Jianying Zhou:
Right-of-Stake: Deterministic and Fair Blockchain Leader Election with Hidden Leader. IEEE ICBC 2020: 1-9 - [i2]Teik Guan Tan, Pawel Szalachowski, Jianying Zhou:
Securing Password Authentication for Web-based Applications. CoRR abs/2011.06257 (2020)
2010 – 2019
- 2019
- [i1]Teik Guan Tan, Jianying Zhou:
A Survey of Digital Signing in the Post Quantum Era. IACR Cryptol. ePrint Arch. 2019: 1374 (2019) - 2010
- [c4]Teik Guan Tan:
BetterThanPin: Empowering Users to Fight Phishing (Poster). Financial Cryptography 2010: 424
2000 – 2009
- 2007
- [j3]Xin Luo, Teik Guan Tan:
Defeating Active Phishing Attacks for Web-Based Transactions. Int. J. Inf. Secur. Priv. 1(3): 47-60 (2007) - 2005
- [c3]Teik Guan Tan:
An Enhanced One-Time Password Implementation. Security and Management 2005: 357-363
1990 – 1999
- 1999
- [j2]Wynne Hsu, Teik Guan Tan:
Rapid Prototyping with Constraints-based Scheduling for Multimedia Applications. Multim. Tools Appl. 8(2): 175-195 (1999) - 1998
- [j1]Teik Guan Tan, Wynne Hsu:
Approximating scheduling for multimedia applications under overload conditions. Int. J. Approx. Reason. 19(1-2): 57-71 (1998) - 1997
- [c2]Teik Guan Tan, Wynne Hsu:
Interactive Scheduling Supports for Real-Time Multimedia Execution. ICMCS 1997: 598-599 - [c1]Teik Guan Tan, Wynne Hsu:
Scheduling multimedia applications under overload and non-deterministic conditions. IEEE Real Time Technology and Applications Symposium 1997: 178-183
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint