Search Results - "Poh, Geong"
-
1
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT
Published in IEEE transactions on cloud computing (01-04-2022)“…The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed…”
Get full text
Journal Article -
2
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment
Published in IEEE transactions on dependable and secure computing (01-05-2021)“…A smart home enables users to access devices such as lighting, HVAC, temperature sensors, and surveillance camera. It provides a more convenient and safe…”
Get full text
Journal Article -
3
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud
Published in IEEE transactions on dependable and secure computing (01-05-2021)“…E-Healthcare systems are increasingly popular due to the introduction of wearable healthcare devices and sensors. Personal health records (PHRs) are collected…”
Get full text
Journal Article -
4
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
Published in Human-centric computing and information sciences (17-07-2015)“…Ensuring the cloud data security is a major concern for corporate cloud subscribers and in some cases for the private cloud users. Confidentiality of the…”
Get full text
Journal Article -
5
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage
Published in IEEE transactions on dependable and secure computing (01-03-2022)“…Recently, reconstruction attacks on static encrypted database supporting range queries have been proposed. However, attacks on encrypted database within two…”
Get full text
Journal Article -
6
SearchaStore: fast and secure searchable cloud services
Published in Cluster computing (01-06-2018)“…The emergence of Cloud Computing is revolutionizing the way we store, query, analyze and consume data, which also bring forward other development that…”
Get full text
Journal Article -
7
Application of Reinforcement Learning in Cognitive Radio Networks: Models and Algorithms
Published in TheScientificWorld (01-01-2014)“…Cognitive radio (CR) enables unlicensed users to exploit the underutilized spectrum in licensed spectrum whilst minimizing interference to licensed users…”
Get full text
Journal Article -
8
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage
Published in Algorithms (01-06-2017)“…Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While…”
Get full text
Journal Article -
9
Searchable symmetric encryption over multiple servers
Published in Cryptography and communications (2018)“…Searchable Symmetric Encryption (SSE) allows a user to store encrypted documents on server(s) and later efficiently searches these documents in a private…”
Get full text
Journal Article -
10
Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents
Published in Wireless personal communications (2011)“…In ubiquitous environments where human users get to access diverse kinds of (often multimedia enabled) services irrespective of where they are, the issue of…”
Get full text
Journal Article -
11
mathsf : Privacy-Preserving Integration and Sharing of Datasets
Published in IEEE transactions on information forensics and security (2020)“…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
Get full text
Journal Article -
12
Application of reinforcement learning for security enhancement in cognitive radio networks
Published in Applied soft computing (01-12-2015)“…•Cognitive radio leverages on reinforcement learning (RL) to enhance network security.•There is lack of reviews on the application of RL to based security…”
Get full text
Journal Article -
13
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications
Published in 2015 5th International Conference on IT Convergence and Security (ICITCS) (01-08-2015)“…Searchable encryption is a cryptographic primitive that allows a user to confidentially store items on an outside server and grants the user the capability to…”
Get full text
Conference Proceeding -
14
On the security advantages of block-based multiserver searchable symmetric encryption
Published in 2016 14th Annual Conference on Privacy, Security and Trust (PST) (01-12-2016)“…One of the considerations for the security of searchable symmetric encryption is leakage, defined as the amount of information regarding stored data known to…”
Get full text
Conference Proceeding -
15
Remote website authentication using dynamic multi-scale code visualization
Published in 2016 14th Annual Conference on Privacy, Security and Trust (PST) (01-12-2016)“…Static images selected by a user have been suggested as security indicators for allowing a human user to visually verify a website's authenticity. While being…”
Get full text
Conference Proceeding -
16
Trust and reputation management in cognitive radio networks: a survey
Published in Security and communication networks (01-11-2014)“…ABSTRACT Cognitive radio (CR), which is the next generation wireless communication system, enables unlicensed users or secondary users (SUs) to exploit…”
Get full text
Journal Article -
17
High speed implementation of symmetric block cipher on GPU
Published in 2014 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS) (01-12-2014)“…Recently, GPU is widely accepted in research community as an effective accelerator to many existing algorithms. In this paper, we contribute to the…”
Get full text
Conference Proceeding -
18
[Formula Omitted]: Privacy-Preserving Integration and Sharing of Datasets
Published in IEEE transactions on information forensics and security (01-01-2020)“…In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To…”
Get full text
Journal Article -
19
Fluent: Round-efficient Secure Aggregation for Private Federated Learning
Published 10-03-2024“…Federated learning (FL) facilitates collaborative training of machine learning models among a large number of clients while safeguarding the privacy of their…”
Get full text
Journal Article -
20
Delay, throughput and packet absorption rate analysis of heterogeneous WMN
Published in ICWCA 2012 : IET International Conference on Wireless Communications and Applications : 8-10 October 2012 (2012)“…The pioneering work of Gupta and Kumar [1] has inspired many subsequent studies on asymptotically achievable per node throughput and delay analysis for…”
Get full text
Conference Proceeding