Ben Soh

According to our database1, Ben Soh authored at least 91 papers between 1991 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
MICKEY 2.0.85: A Secure and Lighter MICKEY 2.0 Cipher Variant with Improved Power Consumption for Smaller Devices in the IoT.
Symmetry, 2020

Secure color image cryptosystem based on chaotic logistic in the FrFT domain.
Multim. Tools Appl., 2020

Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applications.
IEEE Access, 2020

2019
From Learning Management Systems to a Social Learning Environment: A Comparative Review and the Implications.
Int. J. Smart Educ. Urban Soc., 2019

Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection.
Int. J. Commun. Networks Inf. Secur., 2019

A new neural-network-based model for measuring the strength of a pseudorandom binary sequence.
CoRR, 2019

Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding.
IEEE Access, 2019

Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity.
IEEE Access, 2019

2017
A Cloud-Based Architecture for Interactive E-Training.
Int. J. Knowl. Soc. Res., 2017

SDMw: Secure Dynamic Middleware for Defeating Port and OS Scanning.
Future Internet, 2017

2016
Byzantine Fault-Tolerant Architecture in Cloud Data Management.
Int. J. Knowl. Soc. Res., 2016

A Conceptual Model for an Intelligent Simulation-Based Learning Management System Using a Data Mining Agent in Clinical Skills Education.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

2015
Multi-Cloud Data Management using Shamir's Secret Sharing and Quantum Byzantine Agreement Schemes.
Int. J. Cloud Appl. Comput., 2015

2014
Improving e-Health Services and System Requirements by Modelling the Health Environment.
J. Softw., 2014

Automated Health Business Process Modelling and Analysis for E-Health System Requirements Elicitation.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Evaluation of multi-cloud computing TMR-based model using a cloud simulator.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

2013
A Survey on Data Security Issues in Cloud Computing: From Single to Multi-Clouds.
J. Softw., 2013

Structure-free message aggregation and routing in traffic information system (SMART).
J. Netw. Comput. Appl., 2013

A hybrid history based weighted voting algorithm for smart mobile e-health monitoring systems.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

A Byzantine Fault Tolerance Model for a Multi-cloud Computing.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
A new model to ensure security in cloud computing services.
J. Serv. Sci. Res., 2012

A hybrid history based weighted voting algorithm for ultra-critical systems.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Cloud Computing Security: From Single to Multi-clouds.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

A New approach using redundancy technique to improve security in cloud computing.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Special issue on security and privacy in wireless systems.
Secur. Commun. Networks, 2011

A Parallelism Extended Approach for the Enumeration of Orthogonal Arrays.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

MCDB: Using Multi-clouds to Ensure Security in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011

2010
A Step-by-Step Extending Parallelism Approach for Enumeration of Combinatorial Objects.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

A Four-Stage Design Approach Towards Securing a Vehicular Ad Hoc Networks Architecture.
Proceedings of the Fifth IEEE International Symposium on Electronic Design, 2010

A Novel Design Framework for Business Process Modelling in Automotive Industry.
Proceedings of the Fifth IEEE International Symposium on Electronic Design, 2010

A Scalable Wireless Routing Protocol Secure against Route Truncation Attacks.
Proceedings of the Communications and Multimedia Security, 2010

2009
A cryptographic primitive based on hidden-order groups.
J. Math. Cryptol., 2009

2007
A Comparative Study of Different Sensors for Smart Car Park Management.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Improving TCP Performance: Identifying Corruption Based Packet Loss.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Improving Congestion Window Growth in Large Bandwidth Delay Product Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

Rule component specification for business process deployment.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

2006
A novel approach toward integration of rules into business processes using an agent-oriented framework.
IEEE Trans. Ind. Informatics, 2006

Fault-tolerant performance checking application for distributed computing and supply chain networks.
J. Comput. Methods Sci. Eng., 2006

A New Cryptosystem Based On Hidden Order Groups.
IACR Cryptol. ePrint Arch., 2006

A new TCP-friendly prioritized video multicast protocol using SPLIT protocol.
Comput. Commun., 2006

Incorporating Data Mining Tools into a New Hybrid-IDS to Detect Known and Unknown Attacks.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

TCP New Vegas: Performance Evaluation and Validation.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Analysis of Error Resilience in H.264 Video Using Slice Interleaving Technique.
Proceedings of the Information Networking, 2006

An integration of H.264 based Error Concealment technique and the SPLIT layer protocol.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

A Web Page Ranking Method by Analyzing Hyperlink Structure and K-Elements.
Proceedings of the Computational Science and Its Applications, 2006

Pairing Based Cryptography For Distributed And Grid Computing.
Proceedings of IEEE International Conference on Communications, 2006

Context and Time Dependent Risk Based Decision Making.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

Context and Time Based Riskiness Assessment for Decision Making.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

Predicting the Dynamic Nature of Risk.
Proceedings of the 2006 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2006), 2006

2005
One-Way Signature Chaining - A New Paradigm For Group Cryptosystems.
IACR Cryptol. ePrint Arch., 2005

An Authentication Protocol For Mobile Agents Using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2005

Zero-Knowledge Blind Identification For Smart Cards Using Bilinear Pairings.
IACR Cryptol. ePrint Arch., 2005

TCP New Vegas: Improving the Performance of TCP Vegas Over High Latency Links.
Proceedings of the Fourth IEEE International Symposium on Network Computing and Applications (NCA 2005), 2005

Turning Mass Media to Your Media: Intelligent Search with Customized Results.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2005

A novel method for authenticating mobile agents with one-way signature chaining.
Proceedings of the 2005 International Symposium on Autonomous Decentralized Systems, 2005

Simulation of Video Multicasting over SPLIT Protocol.
Proceedings of the Ninth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2005), 2005

On the Use of Snoop with Geostationary Satellite Links.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

A Critical Analysis of Multilayer IP Security Protocol.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Distributed Denial of Service Attacks and Anonymous Group Authentication on the Internet.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Personalized Web Search Results with Profile Comparisons.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Multimedia Multicast Using SPLIT and Layered FEC.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

A New Adaptive Business Model for E-Commerce.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Design and Implementation of a Model for Business Rules Automation.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

CRANAI: A New Search Model Reinforced by Combining a Ranking Algorithm with Author Inputs.
Proceedings of the 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 2005

Risk in Trusted Decentralized Communications.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

A Digital Cash Protocol Based on Additive Zero Knowledge.
Proceedings of the Computational Science and Its Applications, 2005

Authenticating Mobile Agent Platforms Using Signature Chaining Without Trusted Third Parties.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Web Service Intelligent Agent Structuring for Supply Chain Management (SCM).
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
SPLIT: A priority based TCP-friendly video protocol.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

A simulation study on a layered video multicast algorithm.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

TCP performance over geostationary satellite links: problems and solutions.
Proceedings of the 12th IEEE International Conference on Networks, 2004

Internet Security: Public-Key Infrastractures and Certification Systems.
Proceedings of the ICETE 2004, 2004

Optimal Analysis of a Hybrid Authentication System: Web Security versus System Performance.
Proceedings of the ICETE 2004, 2004

A New Reduction Method of Intrusion Detection False Alerts Using SNORT.
Proceedings of the ICETE 2004, 2004

A New Word-Intersection Clustering Method for Information Filtering.
Proceedings of the ICETE 2004, 2004

Performance Analysis of a Split-Layer Multicast Mechanism with H.26L Video Coding Scheme.
Proceedings of the ICETE 2004, 2004

A New Adaptive Layered Multicast Protocol.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

Using Element and Document Profile for Information Clustering.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

A New Receiver-Based Layered-Rate Estimator Algorithm for Fair Bandwidth Distribution.
Proceedings of the 28th International Computer Software and Applications Conference (COMPSAC 2004), 2004

2003
A Novel Web Security Evaluation Model for a One-Time-Password System.
Proceedings of the 2003 IEEE / WIC International Conference on Web Intelligence, 2003

Split-Layer Video Multicast Protocol: A New Receiver-Based Rate-Adaptation Protocol.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

Contributory approaches to centralized key agreement in dynamic peer groups.
Proceedings of the 11th IEEE International Conference on Networks, 2003

A new paradigm for group cryptosystems using quick keys.
Proceedings of the 11th IEEE International Conference on Networks, 2003

Web Security Solutions: Current Development and Future Trend.
Proceedings of the International Conference on Internet Computing, 2003

Design and Implementation of an Efficient B2C Online Platform.
Proceedings of the International Conference on Internet Computing, 2003

2002
A Proposed Secure TCP Connection-oriented Model for E-Commerce Systems.
Proceedings of the Internet and Multimedia Systems and Applications, 2002

A simulation study on multicast congestion control algorithms with multimedia traffic.
Proceedings of the Global Telecommunications Conference, 2002

1997
System intrusion processes: a simulation model.
Comput. Secur., 1997

1995
Setting optimal intrusion-detection thresholds.
Comput. Secur., 1995

Quantitative Risk Assessment of Computer Virus Attacks on Computer Networks.
Comput. Networks ISDN Syst., 1995

1991
On Modelling and Analysis of Latency Problem in Fault-Tolerant Systems.
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991


  Loading...