Search Results - "Poh, Geong"

Refine Results
  1. 1

    Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT by Li, Jiguo, Zhang, Yichen, Ning, Jianting, Huang, Xinyi, Poh, Geong Sen, Wang, Debang

    Published in IEEE transactions on cloud computing (01-04-2022)
    “…The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed…”
    Get full text
    Journal Article
  2. 2

    PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment by Poh, Geong Sen, Gope, Prosanta, Ning, Jianting

    “…A smart home enables users to access devices such as lighting, HVAC, temperature sensors, and surveillance camera. It provides a more convenient and safe…”
    Get full text
    Journal Article
  3. 3

    Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud by Wang, Haijiang, Ning, Jianting, Huang, Xinyi, Wei, Guiyi, Poh, Geong Sen, Liu, Ximeng

    “…E-Healthcare systems are increasingly popular due to the introduction of wearable healthcare devices and sensors. Personal health records (PHRs) are collected…”
    Get full text
    Journal Article
  4. 4

    Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage by Salam, Md Iftekhar, Yau, Wei-Chuen, Chin, Ji-Jian, Heng, Swee-Huay, Ling, Huo-Chong, Phan, Raphael C-W, Poh, Geong Sen, Tan, Syh-Yuan, Yap, Wun-She

    “…Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the…”
    Get full text
    Journal Article
  5. 5

    Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage by Ning, Jianting, Poh, Geong Sen, Huang, Xinyi, Deng, Robert H., Cao, Shuwei, Chang, Ee-Chien

    “…Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two…”
    Get full text
    Journal Article
  6. 6

    SearchaStore: fast and secure searchable cloud services by Lee, Wai-Kong, Phan, Raphael C.-W., Poh, Geong-Sen, Goi, Bok-Min

    Published in Cluster computing (01-06-2018)
    “…The emergence of Cloud Computing is revolutionizing the way we store, query, analyze and consume data, which also bring forward other development that…”
    Get full text
    Journal Article
  7. 7

    Application of Reinforcement Learning in Cognitive Radio Networks: Models and Algorithms by Al-Rawi, Hasan A. A., Chien, Su Fong, Poh, Geong-Sen, Yau, Kok-Lim Alvin

    Published in TheScientificWorld (01-01-2014)
    “…Cognitive radio (CR) enables unlicensed users to exploit the underutilized spectrum in licensed spectrum whilst minimizing interference to licensed users…”
    Get full text
    Journal Article
  8. 8

    Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage by Poh, Geong, Baskaran, Vishnu, Chin, Ji-Jian, Mohamad, Moesfa, Lee, Kay Win, Maniam, Dharmadharshni, Z’aba, Muhammad

    Published in Algorithms (01-06-2017)
    “…Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While…”
    Get full text
    Journal Article
  9. 9

    Searchable symmetric encryption over multiple servers by Poh, Geong Sen, Mohamad, Moesfa Soeheila, Chin, Ji-Jian

    Published in Cryptography and communications (2018)
    “…Searchable Symmetric Encryption (SSE) allows a user to store encrypted documents on server(s) and later efficiently searches these documents in a private…”
    Get full text
    Journal Article
  10. 10

    Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents by Phan, Raphael C.-W., Bok-Min Goi, Geong-Sen Poh, Kim, Jongsung

    Published in Wireless personal communications (2011)
    “…In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of…”
    Get full text
    Journal Article
  11. 11

    mathsf : Privacy-Preserving Integration and Sharing of Datasets by Lim, Hoon Wei, Poh, Geong Sen, Xu, Jia, Chittawar, Varsha

    “…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
    Get full text
    Journal Article
  12. 12

    Application of reinforcement learning for security enhancement in cognitive radio networks by Ling, Mee Hong, Yau, Kok-Lim Alvin, Qadir, Junaid, Poh, Geong Sen, Ni, Qiang

    Published in Applied soft computing (01-12-2015)
    “…•Cognitive radio leverages on reinforcement learning (RL) to enhance network security.•There is lack of reviews on the application of RL to based security…”
    Get full text
    Journal Article
  13. 13

    A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications by Syh-Yuan Tan, Ji-Jian Chin, Geong-Sen Poh, Kam, Yvonne H. S., Wei-Chuen Yau

    “…Searchable encryption is a cryptographic primitive that allows a user to confidentially store items on an outside server and grants the user the capability to…”
    Get full text
    Conference Proceeding
  14. 14

    On the security advantages of block-based multiserver searchable symmetric encryption by Mohamad, Moesfa Soeheila, Ji-Jian Chin, Geong Sen Poh

    “…One of the considerations for the security of searchable symmetric encryption is leakage, defined as the amount of information regarding stored data known to…”
    Get full text
    Conference Proceeding
  15. 15

    Remote website authentication using dynamic multi-scale code visualization by Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Dianat, Seyedvahid

    “…Static images selected by a user have been suggested as security indicators for allowing a human user to visually verify a website's authenticity. While being…”
    Get full text
    Conference Proceeding
  16. 16

    Trust and reputation management in cognitive radio networks: a survey by Ling, Mee Hong, Yau, Kok-Lim Alvin, Poh, Geong Sen

    Published in Security and communication networks (01-11-2014)
    “…ABSTRACT Cognitive radio (CR), which is the next generation wireless communication system, enables unlicensed users or secondary users (SUs) to exploit…”
    Get full text
    Journal Article
  17. 17

    High speed implementation of symmetric block cipher on GPU by Wai-Kong Lee, Bok-Min Goi, Phan, Raphael C.-W, Geong-Sen Poh

    “…Recently, GPU is widely accepted in research community as an effective accelerator to many existing algorithms. In this paper, we contribute to the…”
    Get full text
    Conference Proceeding
  18. 18

    [Formula Omitted]: Privacy-Preserving Integration and Sharing of Datasets by Hoon Wei Lim, Geong Sen Poh, Xu, Jia, Chittawar, Varsha

    “…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
    Get full text
    Journal Article
  19. 19

    Fluent: Round-efficient Secure Aggregation for Private Federated Learning by Li, Xincheng, Ning, Jianting, Poh, Geong Sen, Zhang, Leo Yu, Yin, Xinchun, Zhang, Tianwei

    Published 10-03-2024
    “…Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their…”
    Get full text
    Journal Article
  20. 20

    Delay, throughput and packet absorption rate analysis of heterogeneous WMN by Su Fong Chien, Ka Kien Lo, Kae Hsiang Kwong, Geong Sen Poh, Chieng, D

    “…The pioneering work of Gupta and Kumar [1] has inspired many subsequent studies on asymptotically achievable per node throughput and delay analysis for…”
    Get full text
    Conference Proceeding