Geong Sen Poh
Geong Sen Poh
NUS-Singtel Cyber Security R & D Lab
Verified email at - Homepage
Cited by
Cited by
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
Application of reinforcement learning for security enhancement in cognitive radio networks
MH Ling, KLA Yau, J Qadir, GS Poh, Q Ni
Applied Soft Computing 37, 809-829, 2015
Weighted entropy-based measure for image segmentation
WK Lai, IM Khan, GS Poh
Procedia Engineering 41, 1261-1267, 2012
Trust and reputation management in cognitive radio networks: a survey
MH Ling, KLA Yau, GS Poh
Security and Communication Networks 7 (11), 2160-2179, 2014
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing, 2020
Privhome: privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing, 2019
An efficient buyer-seller watermarking protocol based on chameleon encryption
GS Poh, KM Martin
International Workshop on Digital Watermarking, 433-447, 2008
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
Application of reinforcement learning in cognitive radio networks: models and algorithms
KLA Yau, GS Poh, SF Chien, HAA Al-Rawi
The Scientific World Journal 2014, 2014
Design and analysis of fair content tracing protocols
GS Poh
Ph. D. dissertation, 2009
Integrating public key cryptography into the simple network management protocol (snmp) framework
TC Wan, A Goh, CK Ng, GS Poh
2000 TENCON Proceedings. Intelligent Systems and Technologies for the New†…, 2000
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
Analysis of a buyer–seller watermarking protocol for trustworthy purchasing of digital contents
RCW Phan, BM Goi, GS Poh, J Kim
Wireless Personal Communications 56 (1), 73-83, 2011
Verifiable structured encryption
MS Mohamad, GS Poh
International Conference on Information Security and Cryptology, 137-156, 2012
Classification framework for fair content tracing protocols
GS Poh, KM Martin
International Workshop on Digital Watermarking, 252-267, 2009
A framework for design and analysis of asymmetric fingerprinting protocols
GS Poh, KM Martin
Third International Symposium on Information Assurance and Security, 457-461, 2007
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi–agent perspective
KLA Yau, GS Poh, P Komisarczuk
International Journal of Ad Hoc and Ubiquitous Computing 12 (3), 157-176, 2013
Analysis of a Buyer–Seller Watermarking Protocol for Trustworthy Purchasing
CWP Raphael, BM Goi, GS Poh, J Kim
Wireless Pers Commun, 2009
The system can't perform the operation now. Try again later.
Articles 1–20