Weihan Goh

According to our database1, Weihan Goh authored at least 13 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
AfterImage: Evading Traditional Indicator of Compromise (IOC) Blocking.
Proceedings of the IEEE International Conference on Service Operations and Logistics, 2023

IoT-Enhanced Remote Proctoring: A New Paradigm for Remote Assessment Integrity.
Proceedings of the 35th International Conference on Software Engineering Education and Training, 2023

2022
Ensuring Web Integrity through Content Delivery Networks.
Proceedings of the 2022 IEEE World AI IoT Congress (AIIoT), 2022

2016
Data exchange via multiplexed color QR codes on mobile devices.
Proceedings of the 2016 Wireless Telecommunications Symposium, 2016

2015
Two Factor Authentication Made Easy.
Proceedings of the Engineering the Web in the Big Data Era - 15th International Conference, 2015

2014
Cryptanalyzing the efficient identity-based RSA and GQ multisignature schemes.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A Wavelet Entropy-Based Change Point Detection on Network Traffic: A Case Study of Heartbleed Vulnerability.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
Towards inconspicuous security
PhD thesis, 2013

Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures.
IEEE Secur. Priv., 2013

Anonymity-preserving identity-based multisignature scheme with provision for origin Self-Revelation.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Threat mitigation in tactical-level disruption tolerant networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
A Plausibly-Deniable, Practical Trusted Platform Module Based Anti-Forensics Client-Server System.
IEEE J. Sel. Areas Commun., 2011

2010
A Queuing Mechanism to Alleviate Flooding Attacks in Probabilistic Delay Tolerant Networks.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010


  Loading...