Issue Date | Title | Author(s) |
2020-09-01 | A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things | Xu, C; Ren, W; Yu, L; Zhu, T; Choo, KKR |
2016-10-01 | Building knowledge base of urban emergency events based on crowdsourcing of social media | Xu, Z; Zhang, H; Hu, C; Mei, L; Xuan, J; Choo, KKR; Sugumaran, V; Zhu, Y |
2020-04-01 | Energy Management for Cyber-Physical Cloud Systems | Kumar, N; Vasilakos, AV; Choo, KKR; Yang, LT |
2018-01-01 | Graph-Based Symmetric Crypto-System for Data Confidentiality | Mishra, AK; Obaidat, MS; Puthal, D; Tripathy, AK; Choo, KKR |
2020-01-01 | IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities | Li, S; Choo, KKR; Tan, Z; He, X; Hu, J; Qin, T |
2018-09-14 | Lico: A Lightweight Access Control Model for Inter-Networking Linkages | Li, S; Ren, W; Zhu, T; Choo, KKR |
2020-04-01 | Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks | Chen, J; Zhou, J; Cao, Z; Vasilakos, AV; Dong, X; Choo, KKR |
2018-07-05 | Performance and Security Evaluations of Identity-and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt | Zhong, S; Ren, W; Zhu, T; Ren, Y; Choo, KKR |
2020 | Secure search for encrypted personal health records from big data NoSQL databases in cloud | Chen, L; Zhang, N; Sun, HM; Chang, CC; Yu, S; Choo, KKR |
2018-01-01 | User relationship classification of facebook messenger mobile data using WEKA | Umair, A; Nanda, P; He, X; Choo, KKR |