Geong Sen Poh
Orcid: 0000-0002-2905-688X
According to our database1,
Geong Sen Poh
authored at least 44 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
2022
Update Recovery Attacks on Encrypted Database Within Two Updates Using Range Queries Leakage.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
A Survey of Privacy-Preserving Techniques for Encrypted Traffic Inspection over Network Middleboxes.
CoRR, 2021
LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Role-Based Access Classification: Evaluating the Performance of Machine Learning Algorithms.
Trans. Large Scale Data Knowl. Centered Syst., 2020
IEEE Trans. Inf. Forensics Secur., 2020
PSI-Stats: Private Set Intersection Protocols Supporting Secure Statistical Functions.
IACR Cryptol. ePrint Arch., 2020
PBio: Enabling Cross-organizational Biometric Authentication Service through Secure Sharing of Biometric Templates.
IACR Cryptol. ePrint Arch., 2020
Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the Database Systems for Advanced Applications, 2019
PrivDPI: Privacy-Preserving Encrypted Traffic Inspection with Reusable Obfuscated Rules.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Algorithms, 2017
2016
On the security advantages of block-based multiserver searchable symmetric encryption.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Preserving Privacy of Agents in Reinforcement Learning for Distributed Cognitive Radio Networks.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016
2015
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage.
Hum. centric Comput. Inf. Sci., 2015
Application of reinforcement learning for security enhancement in cognitive radio networks.
Appl. Soft Comput., 2015
A Client-Server Prototype of a Symmetric Key Searchable Encryption Scheme Using Open-Source Applications.
Proceedings of the 5th International Conference on IT Convergence and Security, 2015
2014
Secur. Commun. Networks, 2014
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the International Symposium on Intelligent Signal Processing and Communication Systems, 2014
2013
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective.
Int. J. Ad Hoc Ubiquitous Comput., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
2012
Analysis of a secure cooperative channel sensing protocol for cognitive radio networks.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the IET International Conference on Wireless Communications and Applications, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
Analysis of a Buyer-Seller Watermarking Protocol for Trustworthy Purchasing of Digital Contents.
Wirel. Pers. Commun., 2011
Proceedings of the 4th International Conference on Security of Information and Networks, 2011
2010
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
2008
On the (In)Security of Two Buyer-Seller Watermarking Protocols.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the Digital Watermarking, 7th International Workshop, 2008
Proceedings of the e-Business and Telecommunications - International Conference, 2008
2007
An Anonymous waterMarking Scheme for Content Distribution Protection using Trusted Computing.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2003
Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs.
Proceedings of the Communications and Multimedia Security, 2003