Works matching AU Choo, Kim-Kwang Raymond
Results: 114
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
- Published in:
- Symmetry (20738994), 2015, v. 7, n. 1, p. 105, doi. 10.3390/sym7010105
- By:
- Publication type:
- Article
efficient IoT forensic approach for the evidence acquisition and analysis based on network link.
- Published in:
- Logic Journal of the IGPL, 2022, v. 30, n. 6, p. 1041, doi. 10.1093/jigpal/jzac012
- By:
- Publication type:
- Article
A Comprehensive Evaluation of Machine Learning Algorithms for Web Application Attack Detection with Knowledge Graph Integration.
- Published in:
- Mobile Networks & Applications, 2024, v. 29, n. 3, p. 1008, doi. 10.1007/s11036-024-02367-z
- By:
- Publication type:
- Article
Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices.
- Published in:
- Mobile Networks & Applications, 2023, v. 28, n. 4, p. 1282, doi. 10.1007/s11036-022-02049-8
- By:
- Publication type:
- Article
Badoo Android and iOS Dating Application Analysis.
- Published in:
- Mobile Networks & Applications, 2023, v. 28, n. 4, p. 1272, doi. 10.1007/s11036-022-02048-9
- By:
- Publication type:
- Article
A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 4, p. 1317, doi. 10.1007/s11036-018-1168-y
- By:
- Publication type:
- Article
Editorial: Security and Privacy in Internet of Things.
- Published in:
- Mobile Networks & Applications, 2019, v. 24, n. 3, p. 878, doi. 10.1007/s11036-018-1150-8
- By:
- Publication type:
- Article
Applications of Federated Learning in Mobile Health: Scoping Review.
- Published in:
- Journal of Medical Internet Research, 2023, v. 25, n. 1, p. 1, doi. 10.2196/43006
- By:
- Publication type:
- Article
Efficient revocable ID-based encryption with cloud revocation server.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 1, p. n/a, doi. 10.1002/dac.3386
- By:
- Publication type:
- Article
On authenticated skyline query processing over road networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2022, v. 34, n. 14, p. 1, doi. 10.1002/cpe.5747
- By:
- Publication type:
- Article
Cyberbullying detection in social media text based on character‐level convolutional neural network with shortcuts.
- Published in:
- Concurrency & Computation: Practice & Experience, 2020, v. 32, n. 23, p. 1, doi. 10.1002/cpe.5627
- By:
- Publication type:
- Article
An opcode‐based technique for polymorphic Internet of Things malware detection.
- Published in:
- Concurrency & Computation: Practice & Experience, 2020, v. 32, n. 6, p. N.PAG, doi. 10.1002/cpe.5173
- By:
- Publication type:
- Article
A relative privacy model for effective privacy preservation in transactional data.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 23, p. N.PAG, doi. 10.1002/cpe.4923
- By:
- Publication type:
- Article
A hierarchical key pre‐distribution scheme for fog networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 22, p. N.PAG, doi. 10.1002/cpe.4776
- By:
- Publication type:
- Article
CloudMe forensics: A case of big data forensic investigation.
- Published in:
- Concurrency & Computation: Practice & Experience, 2018, v. 30, n. 5, p. 1, doi. 10.1002/cpe.4277
- By:
- Publication type:
- Article
On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 23, p. n/a, doi. 10.1002/cpe.3930
- By:
- Publication type:
- Article
A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 23, p. n/a, doi. 10.1002/cpe.3978
- By:
- Publication type:
- Article
Astroturfing detection in social media: a binary n-gram-based approach.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 17, p. n/a, doi. 10.1002/cpe.4013
- By:
- Publication type:
- Article
Cloud incident handling and forensic-by-design: cloud storage as a case study.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 14, p. n/a, doi. 10.1002/cpe.3868
- By:
- Publication type:
- Article
Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 14, p. n/a, doi. 10.1002/cpe.3855
- By:
- Publication type:
- Article
Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.
- Published in:
- Concurrency & Computation: Practice & Experience, 2017, v. 29, n. 7, p. n/a, doi. 10.1002/cpe.3845
- By:
- Publication type:
- Article
Building knowledge base of urban emergency events based on crowdsourcing of social media.
- Published in:
- Concurrency & Computation: Practice & Experience, 2016, v. 28, n. 15, p. 4038, doi. 10.1002/cpe.3780
- By:
- Publication type:
- Article
The Applications of Blockchain in Artificial Intelligence.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6126247
- By:
- Publication type:
- Article
Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users.
- Published in:
- Behaviour & Information Technology, 2014, v. 33, n. 12, p. 1347, doi. 10.1080/0144929X.2014.934286
- By:
- Publication type:
- Article
Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
- Published in:
- Journal of Medical Systems, 2020, v. 44, n. 5, p. 1, doi. 10.1007/s10916-020-1527-7
- By:
- Publication type:
- Article
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 11, p. 1, doi. 10.1007/s10916-016-0588-0
- By:
- Publication type:
- Article
AI-enabled IoT penetration testing: state-of-the-art and research challenges.
- Published in:
- Enterprise Information Systems, 2023, v. 17, n. 9, p. 1, doi. 10.1080/17517575.2022.2130014
- By:
- Publication type:
- Article
A model for sentiment and emotion analysis of unstructured social media text.
- Published in:
- Electronic Commerce Research, 2018, v. 18, n. 1, p. 181, doi. 10.1007/s10660-017-9257-8
- By:
- Publication type:
- Article
Graph neural networks: a survey on the links between privacy and security.
- Published in:
- Artificial Intelligence Review, 2024, v. 57, n. 2, p. 1, doi. 10.1007/s10462-023-10656-4
- By:
- Publication type:
- Article
Secure search for encrypted personal health records from big data NoSQL databases in cloud.
- Published in:
- Computing, 2020, v. 102, n. 6, p. 1521, doi. 10.1007/s00607-019-00762-z
- By:
- Publication type:
- Article
Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".
- Published in:
- Information Systems Frontiers, 2022, v. 24, n. 5, p. 1393, doi. 10.1007/s10796-022-10354-6
- By:
- Publication type:
- Article
An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain.
- Published in:
- Information Systems Frontiers, 2020, v. 22, n. 6, p. 1467, doi. 10.1007/s10796-019-09941-x
- By:
- Publication type:
- Article
Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks.
- Published in:
- Information Systems Frontiers, 2020, v. 22, n. 6, p. 1357, doi. 10.1007/s10796-019-09939-5
- By:
- Publication type:
- Article
Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.
- Published in:
- PLoS ONE, 2016, v. 11, n. 8, p. 1, doi. 10.1371/journal.pone.0161857
- By:
- Publication type:
- Article
LiPISC: A Lightweight and Flexible Method for Privacy-Aware Intersection Set Computation.
- Published in:
- PLoS ONE, 2016, v. 11, n. 6, p. 1, doi. 10.1371/journal.pone.0157752
- By:
- Publication type:
- Article
A Lightweight Radio Propagation Model for Vehicular Communication in Road Tunnels.
- Published in:
- PLoS ONE, 2016, v. 11, n. 3, p. 1, doi. 10.1371/journal.pone.0152727
- By:
- Publication type:
- Article
Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
- Published in:
- 2016
- By:
- Publication type:
- Case Study
A Forensically Sound Adversary Model for Mobile Devices.
- Published in:
- PLoS ONE, 2015, v. 10, n. 9, p. 1, doi. 10.1371/journal.pone.0138449
- By:
- Publication type:
- Article
Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
- Published in:
- PLoS ONE, 2015, v. 10, n. 4, p. 1, doi. 10.1371/journal.pone.0116709
- By:
- Publication type:
- Article
Password-only authenticated three-party key exchange with provable security in the standard model.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.
- Published in:
- 2014
- By:
- Publication type:
- journal article
Password-Only Authenticated Three-Party Key Exchange Proven Secure against Insider Dictionary Attacks.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/802359
- By:
- Publication type:
- Article
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/479534
- By:
- Publication type:
- Article
Reliable and Secure e-Health Networks.
- Published in:
- 2021
- By:
- Publication type:
- Editorial
The need for Internet of Things digital forensic black‐boxes.
- Published in:
- Wiley Interdisciplinary Reviews: Forensic Science, 2020, v. 2, n. 6, p. 1, doi. 10.1002/wfs2.1385
- By:
- Publication type:
- Article
From puzzles to portraits: Enhancing situation awareness during natural disasters using a design science approach.
- Published in:
- Decision Sciences, 2023, v. 54, n. 2, p. 211, doi. 10.1111/deci.12527
- By:
- Publication type:
- Article
CoinFA: an efficient coin mixing scheme with flexible amounts.
- Published in:
- Computer Journal, 2024, v. 67, n. 12, p. 3141, doi. 10.1093/comjnl/bxae076
- By:
- Publication type:
- Article
New Code-Based Blind Signature Scheme.
- Published in:
- Computer Journal, 2022, v. 65, n. 7, p. 1776, doi. 10.1093/comjnl/bxab018
- By:
- Publication type:
- Article
Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
- Published in:
- Computer Journal, 2018, v. 61, n. 4, p. 545, doi. 10.1093/comjnl/bxx112
- By:
- Publication type:
- Article
Improved t-SNE based manifold dimensional reduction for remote sensing data processing.
- Published in:
- Multimedia Tools & Applications, 2019, v. 78, n. 4, p. 4311, doi. 10.1007/s11042-018-5715-0
- By:
- Publication type:
- Article