Follow
Shu Yun Lim
Shu Yun Lim
Unitar International University
Verified email at unitar.my
Title
Cited by
Cited by
Year
Blockchain technology the identity management and authentication service disruptor: a survey
SY Lim, PT Fotsing, A Almasri, O Musa, MLM Kiah, TF Ang, R Ismail
International Journal on Advanced Science, Engineering and Information …, 2018
1742018
Network anomaly detection system: The state of art of network behaviour analysis
SY Lim, A Jones
2008 International Conference on Convergence and Hybrid Information …, 2008
602008
Security issues and future challenges of cloud service authentication
SY Lim, MLM Kiah, TF Ang
Acta Polytechnica Hungarica 14 (2), 69-89, 2017
492017
Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
HW Kim, SY Lim, HJ Lee
2006 International Conference on Hybrid Information Technology 2, 718-723, 2006
412006
Dragon-MAC: Securing wireless sensor networks with authenticated encryption
SY Lim, CC Pu, HT Lim, HJ Lee
Cryptology ePrint Archive, 2007
172007
Miss Laiha Mat Kiah, Tan Fong Ang and Reza Ismail.“Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey”
SY Lim, PT Fotsing, A Almasri, O Musa
International Journal on Advanced Science, Engineering and Information …, 2018
142018
Trust models for blockchain-based self-sovereign identity management: A survey and research directions
SY Lim, OB Musa, BAS Al-Rimy, A Almasri
Advances in Blockchain Technology for Cyber Physical Systems, 277-302, 2022
102022
Energy-Efficient and Scalable Group Key Management for Hierarchical Sensor Network.
SY Lim, MH Lim
J. Ubiquitous Syst. Pervasive Networks 2 (1), 39-47, 2011
92011
AuthChain: A Decentralized Blockchain-based Authentication System
Shu Yun Lim, Pascal Tankam Fotsing, Omar Musa, Abdullah Almasri
International Journal of Engineering Trends and Technology (IJETT), 70-74, 2020
82020
Digital evidence case management tool for collaborative digital forensics investigation
VR Silvarajoo, SY Lim, P Daud
2021 3rd International Cyber Resilience Conference (CRC), 1-4, 2021
62021
Dropbox forensics: forensic analysis of a cloud storage service
SY Lim, A Johan, P Daud, N Ismail
International Journal of Engineering Trends and Technology (IJETT), 45-49, 2020
62020
Propose a simple and practical vehicle logo detection and extraction framework
MS Kadhm, LS Yun
International Journal of Emerging Tendrs and Technology in Computer Sciences …, 2015
32015
UPLX: Blockchain platform for integrated health data management
O Musa, LS Yun, R Ismail
International Conference of Reliable Information and Communication …, 2020
22020
Secure Hybrid Group Key Management for Hierarchical Self-Organizing Sensor Network
SY Lim, MH Lim, SG Lee, HJ Lee
2008 The Fourth International Conference on Information Assurance and …, 2008
22008
User Profiling with Virtual Pet for Mobile Device Authentication
S Yun Lim, JNM Kho
Informatics Engineering and Information Science: International Conference …, 2011
12011
An Anomaly-based Intrusion Detection Architecture to Secure Wireless Networks
SY Lim, A Jones
12009
Transfer learning with deep models for small food datasets
L Cai, L Tang, S Lim
International Conference on Automation Control, Algorithm, and Intelligent …, 2023
2023
Can Deep Neural Networks Learn Broad Semantic Concepts of Images?
L Cai, S Lim, X Wang, L Tang
Genetic and Evolutionary Computing: Proceedings of the Thirteenth …, 2020
2020
Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안
SY Lim, CC Pu, HT Lim, HJ Lee
한국해양정보통신학회논문지 11 (8), 1519-1527, 2007
2007
Ant Colony Optimization and Data Centric Routing Approach for Sensor Networks
SY Lim, EY Lee, SH Park, HJ Lee
Journal of the Korea Institute of Information and Communication Engineering …, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–20