Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Geong Sen Poh"'
Autor:
Geong Sen Poh, Vishnu Monn Baskaran, Ji-Jian Chin, Moesfa Soeheila Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Reza Z’aba
Publikováno v:
Algorithms, Vol 10, Iss 2, p 52 (2017)
Cloud storage services allow users to efficiently outsource their documents anytime and anywhere. Such convenience, however, leads to privacy concerns. While storage providers may not read users’ documents, attackers may possibly gain access by exp
Externí odkaz:
https://doaj.org/article/126b08d1070b443f8f03530d074f7758
Publikováno v:
IEEE Transactions on Cloud Computing. 10:762-773
The pervasive, ubiquitous, and heterogeneous properties of IoT make securing IoT systems a very challenging task. More so when access and storage are performed through a cloud-based IoT system. IoT data stored on cloud should be encrypted to ensure d
Publikováno v:
IEEE Transactions on Information Forensics and Security. 15:564-577
In privacy-enhancing technology, it has been inevitably challenging to strike a reasonable balance between privacy, efficiency, and usability (utility). To this, we propose a highly practical solution for the privacy-preserving integration and sharin
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dcad04345c993bf3e6179a77f0b5c785
https://doi.org/10.1007/978-3-031-09234-3_29
https://doi.org/10.1007/978-3-031-09234-3_29
Autor:
Xinyi Huang, Jianting Ning, Geong Sen Poh, Robert H. Deng, Jian Weng, Yingjiu Li, Jiaming Yuan
Publikováno v:
CCS
Searchable Encryption (SE) enables private queries on encrypted documents. Most existing SE schemes focus on constructing industrial-ready, practical solutions at the expense of information leakages that are considered acceptable. In particular, Shad
A smart home enables users to access devices such as lighting, HVAC, temperature sensors, and surveillance camera. It provides a more convenient and safe living environment for users. Security and privacy, however, is a key concern since information
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::20e387ec1e4f7a6b87b6999935e0b5a2
https://eprints.whiterose.ac.uk/153150/1/SmartHomeSE.pdf
https://eprints.whiterose.ac.uk/153150/1/SmartHomeSE.pdf
Autor:
GEONG SEN POH1 raymond.choo@fulbrightmail.org, JI-JIAN CHIN2 jjchin@mmu.edu.my, WEI-CHUEN YAU3 wcyau@xmu.edu.my, KIM-KWANG RAYMOND CHOO4 gspoh@mimos.my, MOHAMAD, MOESFA SOEHEILA1 soeheila.mohamad@mimos.my
Publikováno v:
ACM Computing Surveys. May2018, Vol. 50 Issue 3, p1-37. 37p.
Autor:
Youki Kadobayashi, Shaoning Pang, Iqbal Gondal, Kaizhu Huang, Tao Ban, Fadi Aloul, Jungsuk Song, Geong Sen Poh, Kitsuchart Pasupa
Publikováno v:
Neural Information Processing ISBN: 9783030638320
ICONIP (2)
ICONIP (2)
CDMC-International Cybersecurity Data Mining Competition (http://www.csmining.org) is a world unique data-analytic competition sitting in the trans-disciplinary area of artificial intelligence and cybersecurity. In this paper, we summarize CDMC’19
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e96f6722cc3f4a7eccb45d664fb73774
https://doi.org/10.1007/978-3-030-63833-7_20
https://doi.org/10.1007/978-3-030-63833-7_20
Publikováno v:
Transactions on Large-Scale Data-and Knowledge-Centered Systems XLIII ISBN: 9783662621981
The analysis of relational database access for the purpose of audit and anomaly detection can be based on the classification of queries according to user roles. One such approach is DBSAFE, a database anomaly detection system, which uses a Naive Baye
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a7d24ea9c61799b0b45c17f0740f6c8d
https://doi.org/10.1007/978-3-662-62199-8_1
https://doi.org/10.1007/978-3-662-62199-8_1
Autor:
Robert H. Deng, Xinyi Huang, Shengmin Xu, Jian Weng, Geong Sen Poh, Jianting Ning, Jia-Ch'ng Loh
Publikováno v:
Computer Security – ESORICS 2020 ISBN: 9783030589509
ESORICS (1)
ESORICS (1)
Transport Layer Security Inspection (TLSI) enables enterprises to decrypt, inspect and then re-encrypt users’ traffic before it is routed to the destination. This breaks the end-to-end security guarantee of the TLS specification and implementation.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::74f4b97e93ed4a98237ae206ca23b016
https://doi.org/10.1007/978-3-030-58951-6_1
https://doi.org/10.1007/978-3-030-58951-6_1