Geong Sen Poh
Geong Sen Poh
Cyber Security R & D
Verified email at - Homepage
Cited by
Cited by
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 1-16, 2015
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing, 2020
Application of reinforcement learning for security enhancement in cognitive radio networks
MH Ling, KLA Yau, J Qadir, GS Poh, Q Ni
Applied Soft Computing 37, 809-829, 2015
PrivHome: Privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing, 2019
Trust and reputation management in cognitive radio networks: a survey
MH Ling, KLA Yau, GS Poh
Security and Communication Networks 7 (11), 2160-2179, 2014
Weighted entropy-based measure for image segmentation
WK Lai, IM Khan, GS Poh
Procedia Engineering 41, 1261-1267, 2012
Application of reinforcement learning in cognitive radio networks: models and algorithms
KLA Yau, GS Poh, SF Chien, HAA Al-Rawi
The Scientific World Journal 2014, 2014
An efficient buyer-seller watermarking protocol based on chameleon encryption
GS Poh, KM Martin
International Workshop on Digital Watermarking, 433-447, 2008
PrivDPI: Privacy-preserving encrypted traffic inspection with reusable obfuscated rules
J Ning, GS Poh, JC Loh, J Chia, EC Chang
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications†…, 2019
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing, 2019
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
Design and analysis of fair content tracing protocols
GS Poh
Ph. D. dissertation, Department of Mathematics, Univ. London, London, UK, 2009
Integrating public key cryptography into the simple network management protocol (snmp) framework
TC Wan, A Goh, CK Ng, GS Poh
2000 TENCON Proceedings. Intelligent Systems and Technologies for the New†…, 2000
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi–agent perspective
KLA Yau, GS Poh, P Komisarczuk
International Journal of Ad Hoc and Ubiquitous Computing 12 (3), 157-176, 2013
Classification framework for fair content tracing protocols
GS Poh, KM Martin
International Workshop on Digital Watermarking, 252-267, 2009
Verifiable structured encryption
MS Mohamad, GS Poh
International Conference on Information Security and Cryptology, 137-156, 2012
Analysis of a buyer–seller watermarking protocol for trustworthy purchasing of digital contents
RCW Phan, BM Goi, GS Poh, J Kim
Wireless Personal Communications 56 (1), 73-83, 2011
The system can't perform the operation now. Try again later.
Articles 1–20