Browsing by Author "Ko, Ryan K.L."

Now showing items 1-5 of 25

  • Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography

    Will, Mark Antony; Ko, Ryan K.L.; Schlickmann, Silvino J. (IEEE, 2017)
    Promoting data sharing between organisations is challenging, without the added concerns over having actions traced. Even with encrypted search capabilities, the entities digital location and downloaded information can be ...
  • Computing Mod with a Variable Lookup Table

    Will, Mark Antony; Ko, Ryan K.L. (Springer Nature Singapore Pte Ltd, 2016)
    Encryption algorithms are designed to be difficult to break without knowledge of the secrets or keys. To achieve this, the algorithms require the keys to be large, with some having a recommend size of 2048-bits or more. ...
  • Consumer-centric protection for online social networks

    Akram, Raja Naeem; Ko, Ryan K.L.; Law, Tsz Fung (IEEE Computer Society, 2014)
    Online Social Networks (OSNs) are a unique construct that is shaped by the advancement and availability of Internet technologies. A large portion of internet users make use of OSN services to share and celebrate their ...
  • The data privacy matrix project: towards a global alignment of data privacy laws

    Scoon, Craig; Ko, Ryan K.L. (IEEE Computer Society, 2016)
    Data privacy is an expected right of most citizens around the world but there are many legislative challenges within a boundary-less cloud computing and World Wide Web environment. Despite its importance, there is limited ...
  • Digital trust - trusted computing and beyond: A position paper

    Akram, Raja Naeem; Ko, Ryan K.L. (IEEE Computer Society, 2015-01-15)
    Along with the invention of computers and interconnected networks, physical societal notions like security, trust, and privacy entered the digital environment. The concept of digital environments begins with the trust ...

Showing up to 5 theses - most recently added to Research Commons first.

  • Cyber security visualization effectiveness

    Garae, Jeffery (The University of Waikato, 2019)
    Security visualization utilises predefined data attributes and translates them into visual nodes to form images for the purpose of communicating critical security information to targeted audiences. It is commonly used for ...
  • Privacy-preserving encoding for cloud computing

    Will, Mark Antony (The University of Waikato, 2019)
    Information in the cloud is under constant attack from cyber criminals as profitability increases; user privacy is also at risk with data being mined for monetary value – the new gold. A single leak could have devastating ...
  • Detecting relay attacks against Bluetooth communications on Android

    Symon, Jeremy (The University of Waikato, 2018)
    The widespread usage of mobile devices has lead to mobile devices being used to replace existing solutions, including smart cards for authentication in access control systems. While this can be convenient, there are security ...
  • Key factors in building a Secure Web Gateway

    Yeh, Jeffrey (University of Waikato, 2017)
    A Secure Web Gateway, according to Gartner’s definition, is a solution that provides URL filtering, malicious code detection and blocking, and application controls for cloud applications to filter out objectionable ...
  • Reconstructing Data Provenance from Log Files

    Tan, Yu Shyang (The University of Waikato, 2017)
    Data provenance describes the derivation history of data, capturing details such as the entities involved and the relationships between entities. Knowledge of data provenance can be used to address issues, such as data ...

... View More