Geong Sen Poh
Geong Sen Poh
NUS-Singtel Cyber Security R & D Lab
Verified email at trustwave.com - Homepage
Title
Cited by
Cited by
Year
Searchable symmetric encryption: designs and challenges
GS Poh, JJ Chin, WC Yau, KKR Choo, MS Mohamad
ACM Computing Surveys (CSUR) 50 (3), 1-37, 2017
762017
Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
MI Salam, WC Yau, JJ Chin, SH Heng, HC Ling, RCW Phan, GS Poh, ...
Human-centric Computing and Information Sciences 5 (1), 19, 2015
452015
Application of reinforcement learning for security enhancement in cognitive radio networks
MH Ling, KLA Yau, J Qadir, GS Poh, Q Ni
Applied Soft Computing 37, 809-829, 2015
342015
Weighted entropy-based measure for image segmentation
WK Lai, IM Khan, GS Poh
Procedia Engineering 41, 1261-1267, 2012
202012
Trust and reputation management in cognitive radio networks: a survey
MH Ling, KLA Yau, GS Poh
Security and Communication Networks 7 (11), 2160-2179, 2014
172014
Attribute based encryption with privacy protection and accountability for CloudIoT
J Li, Y Zhang, J Ning, X Huang, GS Poh, D Wang
IEEE Transactions on Cloud Computing, 2020
142020
Privhome: privacy-preserving authenticated communication in smart home environment
GS Poh, P Gope, J Ning
IEEE Transactions on Dependable and Secure Computing, 2019
132019
An efficient buyer-seller watermarking protocol based on chameleon encryption
GS Poh, KM Martin
International Workshop on Digital Watermarking, 433-447, 2008
122008
Searchable symmetric encryption over multiple servers
GS Poh, MS Mohamad, JJ Chin
Cryptography and Communications 10 (1), 139-158, 2018
112018
Application of reinforcement learning in cognitive radio networks: models and algorithms
KLA Yau, GS Poh, SF Chien, HAA Al-Rawi
The Scientific World Journal 2014, 2014
112014
Design and analysis of fair content tracing protocols
GS Poh
Ph. D. dissertation, 2009
112009
Integrating public key cryptography into the simple network management protocol (snmp) framework
TC Wan, A Goh, CK Ng, GS Poh
2000 TENCON Proceedings. Intelligent Systems and Technologies for the New†…, 2000
92000
An authentication framework for peer-to-peer cloud
GS Poh, MAN Mohd Nazir, BM Goi, SY Tan, RCW Phan, MS Shamsudin
Proceedings of the 6th International Conference on Security of Information†…, 2013
82013
Structured encryption for conceptual graphs
GS Poh, MS Mohamad, MR Z’aba
International Workshop on Security, 105-122, 2012
82012
Analysis of a buyer–seller watermarking protocol for trustworthy purchasing of digital contents
RCW Phan, BM Goi, GS Poh, J Kim
Wireless Personal Communications 56 (1), 73-83, 2011
82011
Classification framework for fair content tracing protocols
GS Poh, KM Martin
International Workshop on Digital Watermarking, 252-267, 2009
72009
Verifiable structured encryption
MS Mohamad, GS Poh
International Conference on Information Security and Cryptology, 137-156, 2012
62012
A framework for design and analysis of asymmetric fingerprinting protocols
GS Poh, KM Martin
Third International Symposium on Information Assurance and Security, 457-461, 2007
62007
Secure fine-grained encrypted keyword search for e-healthcare cloud
H Wang, J Ning, X Huang, G Wei, GS Poh, X Liu
IEEE Transactions on Dependable and Secure Computing, 2019
52019
Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi–agent perspective
KLA Yau, GS Poh, P Komisarczuk
International Journal of Ad Hoc and Ubiquitous Computing 12 (3), 157-176, 2013
52013
The system can't perform the operation now. Try again later.
Articles 1–20