Search

Your search keyword '"Choo, Kim-Kwang Raymond"' showing total 152 results

Search Constraints

Start Over You searched for: Author "Choo, Kim-Kwang Raymond" Remove constraint Author: "Choo, Kim-Kwang Raymond"
152 results on '"Choo, Kim-Kwang Raymond"'

Search Results

1. Finite state machine for cloud forensic readiness as a service (CFRaaS) events.

2. The need for Internet of Things digital forensic black‐boxes.

3. Editorial: Blockchain Ecosystem—Technological and Management Opportunities and Challenges.

4. Blockchain-enabled secure communications in smart cities.

5. An Evidence‐based Forensic Taxonomy of Windows Phone Dating Apps.

6. Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.

7. Windows 7 Antiforensics: A Review and a Novel Approach.

8. Forensic Taxonomy of Android Social Apps.

9. Mobile cloud security: An adversary model for lightweight browser security.

10. Remote Wiping and Secure Deletion on Mobile Devices: A Review.

11. An Android Communication App Forensic Taxonomy.

12. Context-oriented web application protection model.

13. Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices.

15. Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.

16. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.

17. A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols.

18. High tech criminal threats to the national information infrastructure

19. An Integrative Framework to Protocol Analysis and Repair: Bellare–Rogaway Model + Planning + Model Checker.

20. On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.

21. New Code-Based Blind Signature Scheme.

23. Accurate authentication based on ECG using deep learning.

25. Guest Editorial: Network Forensics and Surveillance for Emerging Networks.

26. A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing.

27. A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.

28. An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks.

29. Blockchain-based multi-party proof of assets with privacy preservation.

30. Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.

31. Technical Requirements and Approaches in Personal Data Control.

32. A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.

33. DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.

34. S-DeepTrust: A deep trust prediction method based on sentiment polarity perception.

35. An Evidence‐Based Forensic Taxonomy of Windows Phone Communication Apps.

36. Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.

37. Mobile crowd sensing of human-like intelligence using social sensors: A survey.

38. Forensic analysis and security assessment of Android m-banking apps.

39. Efficient revocable ID-based encryption with cloud revocation server.

40. Efficient and secure searchable encryption protocol for cloud-based Internet of Things.

41. Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.

42. Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.

43. Visualizing Digital Forensic Datasets: A Proof of Concept.

44. Machine learning aided Android malware classification.

45. Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review.

46. Cloud storage forensics: MEGA as a case study.

47. Forensic Investigation of Cooperative Storage Cloud Service: Symform as a Case Study.

48. Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.

49. Effectiveness of multimedia presentations in improving understanding of technical terminologies and concepts: a pilot study.

50. Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.

Catalog

Books, media, physical & digital resources