Geong Sen Poh

Orcid: 0000-0002-2905-688X

According to our database1, Geong Sen Poh authored at least 44 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fluent: Round-efficient Secure Aggregation for Private Federated Learning.
CoRR, 2024

2022
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022

Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT.
IEEE Trans. Cloud Comput., 2022

2021
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment.
IEEE Trans. Dependable Secur. Comput., 2021

A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021

LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Role-Based Access Classification: Evaluating the Performance of Machine Learning Algorithms.
Trans. Large Scale Data Knowl. Centered Syst., 2020

<i>PrivateLink</i>: Privacy-Preserving Integration and Sharing of Datasets.
IEEE Trans. Inf. Forensics Secur., 2020

PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
IACR Cryptol. ePrint Arch., 2020

PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates.
IACR Cryptol. ePrint Arch., 2020

Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Privacy as a Service: Publishing Data and Models.
Proceedings of the Database Systems for Advanced Applications, 2019

PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
SearchaStore: fast and secure searchable cloud services.
Clust. Comput., 2018

Searchable symmetric encryption over multiple servers.
Cryptogr. Commun., 2018

Attribute-Based Encryption with Efficient Keyword Search and User Revocation.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

2017
Searchable Symmetric Encryption: Designs and Challenges.
ACM Comput. Surv., 2017

Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage.
Algorithms, 2017

2016
On the security advantages of block-based multiserver searchable symmetric encryption.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Remote website authentication using dynamic multi-scale code visualization.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015

Application of reinforcement learning for security enhancement in cognitive radio networks.
Appl. Soft Comput., 2015

A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015

2014
Trust and reputation management in cognitive radio networks: a survey.
Secur. Commun. Networks, 2014

Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

High speed implementation of symmetric block cipher on GPU.
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014

2013
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective.
Int. J. Ad Hoc Ubiquitous Comput., 2013

An authentication framework for peer-to-peer cloud.
Proceedings of the 6th International Conference on Security of Information and Networks, 2013

2012
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

Structured Encryption for Conceptual Graphs.
Proceedings of the Advances in Information and Computer Security, 2012

Delay, throughput and packet absorption rate analysis of heterogeneous WMN.
Proceedings of the IET International Conference on Wireless Communications and Applications, 2012

Verifiable Structured Encryption.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011

On the security and practicality of a buyer seller watermarking protocol for DRM.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

2010
Analysis of Two Watermarking Protocols Based on Commutative Encryption.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Classification Framework for Fair Content Tracing Protocols.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
On the (In)Security of Two Buyer-Seller Watermarking Protocols.
Proceedings of the SECRYPT 2008, 2008

An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption.
Proceedings of the Digital Watermarking, 7th International Workshop, 2008

On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority.
Proceedings of the e-Business and Telecommunications - International Conference, 2008

2007
An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing.
Proceedings of the SECRYPT 2007, 2007

A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2003
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Proceedings of the Communications and Multimedia Security, 2003


  Loading...