default search action
Geong Sen Poh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i4]Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang:
Fluent: Round-efficient Secure Aggregation for Private Federated Learning. CoRR abs/2403.06143 (2024) - 2022
- [j15]Jiguo Li, Yichen Zhang, Jianting Ning, Xinyi Huang, Geong Sen Poh, Debang Wang:
Attribute Based Encryption with Privacy Protection and Accountability for CloudIoT. IEEE Trans. Cloud Comput. 10(2): 762-773 (2022) - [j14]Jianting Ning, Geong Sen Poh, Xinyi Huang, Robert H. Deng, Shuwei Cao, Ee-Chien Chang:
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage. IEEE Trans. Dependable Secur. Comput. 19(2): 1164-1180 (2022) - [c26]Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. ACNS 2022: 585-604 - 2021
- [j13]Geong Sen Poh, Prosanta Gope, Jianting Ning:
PrivHome: Privacy-Preserving Authenticated Communication in Smart Home Environment. IEEE Trans. Dependable Secur. Comput. 18(3): 1095-1107 (2021) - [j12]Haijiang Wang, Jianting Ning, Xinyi Huang, Guiyi Wei, Geong Sen Poh, Ximeng Liu:
Secure Fine-Grained Encrypted Keyword Search for E-Healthcare Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1307-1319 (2021) - [c25]Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, Robert H. Deng:
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset. CCS 2021: 2307-2320 - [i3]Geong Sen Poh, Dinil Mon Divakaran, Hoon Wei Lim, Jianting Ning, Achintya Desai:
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes. CoRR abs/2101.04338 (2021) - 2020
- [j11]Hoon Wei Lim, Geong Sen Poh, Jia Xu, Varsha Chittawar:
PrivateLink: Privacy-Preserving Integration and Sharing of Datasets. IEEE Trans. Inf. Forensics Secur. 15: 564-577 (2020) - [j10]Randy Julian, Edward Guyot, Shaowen Zhou, Geong Sen Poh, Stéphane Bressan:
Role-Based Access Classification: Evaluating the Performance of Machine Learning Algorithms. Trans. Large Scale Data Knowl. Centered Syst. 43: 1-39 (2020) - [c24]Jianting Ning, Xinyi Huang, Geong Sen Poh, Shengmin Xu, Jia-Ch'ng Loh, Jian Weng, Robert H. Deng:
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment. ESORICS (1) 2020: 3-22 - [i2]Jason H. M. Ying, Shuwei Cao, Geong Sen Poh, Jia Xu, Hoon Wei Lim:
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions. IACR Cryptol. ePrint Arch. 2020: 623 (2020) - [i1]Jia-Ch'ng Loh, Geong Sen Poh, Jason H. M. Ying, Jia Xu, Hoon Wei Lim, Jonathan Pan, Weiyang Wong:
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates. IACR Cryptol. ePrint Arch. 2020: 1381 (2020)
2010 – 2019
- 2019
- [c23]Jianting Ning, Geong Sen Poh, Jia-Ch'ng Loh, Jason Chia, Ee-Chien Chang:
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules. CCS 2019: 1657-1670 - [c22]Ashish Dandekar, Debabrota Basu, Thomas Kister, Geong Sen Poh, Jia Xu, Stéphane Bressan:
Privacy as a Service: Publishing Data and Models. DASFAA (3) 2019: 557-561 - 2018
- [j9]Geong Sen Poh, Moesfa Soeheila Mohamad, Ji-Jian Chin:
Searchable symmetric encryption over multiple servers. Cryptogr. Commun. 10(1): 139-158 (2018) - [j8]Wai-Kong Lee, Raphael C.-W. Phan, Geong Sen Poh, Bok-Min Goi:
SearchaStore: fast and secure searchable cloud services. Clust. Comput. 21(2): 1189-1202 (2018) - [c21]Jingwei Wang, Xinchun Yin, Jianting Ning, Geong Sen Poh:
Attribute-Based Encryption with Efficient Keyword Search and User Revocation. Inscrypt 2018: 490-509 - 2017
- [j7]Geong Sen Poh, Vishnu Monn Baskaran, Ji-Jian Chin, Moesfa Soeheila Mohamad, Kay Win Lee, Dharmadharshni Maniam, Muhammad Reza Z'aba:
Searchable Data Vault: Encrypted Queries in Secure Distributed Cloud Storage. Algorithms 10(2): 52 (2017) - [j6]Geong Sen Poh, Ji-Jian Chin, Wei-Chuen Yau, Kim-Kwang Raymond Choo, Moesfa Soeheila Mohamad:
Searchable Symmetric Encryption: Designs and Challenges. ACM Comput. Surv. 50(3): 40:1-40:37 (2017) - 2016
- [c20]Geong Sen Poh, Kok-Lim Alvin Yau:
Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks. ICONIP (1) 2016: 555-562 - [c19]Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat:
Remote website authentication using dynamic multi-scale code visualization. PST 2016: 325-328 - [c18]Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh:
On the security advantages of block-based multiserver searchable symmetric encryption. PST 2016: 349-352 - 2015
- [j5]Mee Hong Ling, Kok-Lim Alvin Yau, Junaid Qadir, Geong Sen Poh, Qiang Ni:
Application of reinforcement learning for security enhancement in cognitive radio networks. Appl. Soft Comput. 37: 809-829 (2015) - [j4]Md. Iftekhar Salam, Wei-Chuen Yau, Ji-Jian Chin, Swee-Huay Heng, Huo-Chong Ling, Raphael C.-W. Phan, Geong Sen Poh, Syh-Yuan Tan, Wun-She Yap:
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage. Hum. centric Comput. Inf. Sci. 5: 19 (2015) - [c17]Syh-Yuan Tan, Ji-Jian Chin, Geong Sen Poh, Yvonne H. S. Kam, Wei-Chuen Yau:
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications. ICITCS 2015: 1-5 - 2014
- [j3]Mee Hong Ling, Kok-Lim Alvin Yau, Geong Sen Poh:
Trust and reputation management in cognitive radio networks: a survey. Secur. Commun. Networks 7(11): 2160-2179 (2014) - [c16]Wai-Kong Lee, Bok-Min Goi, Raphael C.-W. Phan, Geong Sen Poh:
High speed implementation of symmetric block cipher on GPU. ISPACS 2014: 102-107 - [c15]Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng:
Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution. SIN 2014: 170 - 2013
- [j2]Kok-Lim Alvin Yau, Geong Sen Poh, Peter Komisarczuk:
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective. Int. J. Ad Hoc Ubiquitous Comput. 12(3): 157-176 (2013) - [c14]Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin:
An authentication framework for peer-to-peer cloud. SIN 2013: 94-101 - 2012
- [c13]Moesfa Soeheila Mohamad, Geong Sen Poh:
Verifiable Structured Encryption. Inscrypt 2012: 137-156 - [c12]Su Fong Chien, Ka Kien Lo, Kae Hsiang Kwong, Geong Sen Poh, David Chieng:
Delay, throughput and packet absorption rate analysis of heterogeneous WMN. ICWCA 2012: 1-6 - [c11]Geong Sen Poh, Moesfa Soeheila Mohamad, Muhammad Reza Z'aba:
Structured Encryption for Conceptual Graphs. IWSEC 2012: 105-122 - [c10]Geong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling:
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks. SIN 2012: 41-46 - 2011
- [j1]Raphael C.-W. Phan, Bok-Min Goi, Geong Sen Poh, Jongsung Kim:
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents. Wirel. Pers. Commun. 56(1): 73-83 (2011) - [c9]Geong Sen Poh, Muhammad Reza Z'aba:
On the security and practicality of a buyer seller watermarking protocol for DRM. SIN 2011: 251-254 - 2010
- [c8]Moesfa Soeheila Mohamad, Geong Sen Poh:
Analysis of Two Watermarking Protocols Based on Commutative Encryption. COMPSAC Workshops 2010: 115-120
2000 – 2009
- 2009
- [c7]Geong Sen Poh, Keith M. Martin:
Classification Framework for Fair Content Tracing Protocols. IWDW 2009: 252-267 - 2008
- [c6]Geong Sen Poh, Keith M. Martin:
On the Design of Buyer-Seller Watermarking Protocols without a Watermark Authority. ICETE (Selected Papers) 2008: 210-223 - [c5]Geong Sen Poh, Keith M. Martin:
An Efficient Buyer-Seller Watermarking Protocol Based on Chameleon Encryption. IWDW 2008: 433-447 - [c4]Geong Sen Poh, Keith M. Martin:
On the (In)Security of Two Buyer-Seller Watermarking Protocols. SECRYPT 2008: 253-260 - 2007
- [c3]Geong Sen Poh, Keith M. Martin:
A Framework for Design and Analysis of Asymmetric Fingerprinting Protocols. IAS 2007: 457-461 - [c2]Adrian Leung, Geong Sen Poh:
An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing. SECRYPT 2007: 319-326 - 2003
- [c1]Alwyn Goh, Geong Sen Poh, David Ngo Chek Ling:
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs. Communications and Multimedia Security 2003: 239-251
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint