BibTeX records: Kok-Seng Wong

download as .bib file

@article{DBLP:journals/ijwgs/WongK18,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Emerging issues and challenges for cloud data at the edge},
  journal   = {{IJWGS}},
  volume    = {14},
  number    = {2},
  pages     = {123--145},
  year      = {2018},
  url       = {https://doi.org/10.1504/IJWGS.2018.10006679},
  doi       = {10.1504/IJWGS.2018.10006679},
  timestamp = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijwgs/WongK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ChewOWPH18,
  author    = {Yee Jian Chew and
               Shih Yin Ooi and
               Kok{-}Seng Wong and
               Ying{-}Han Pang and
               Seong Oun Hwang},
  title     = {Evaluation of black-marker and bilateral classification with {J48}
               decision tree in anomaly based intrusion detection system},
  journal   = {Journal of Intelligent and Fuzzy Systems},
  volume    = {35},
  number    = {6},
  pages     = {5927--5937},
  year      = {2018},
  url       = {https://doi.org/10.3233/JIFS-169834},
  doi       = {10.3233/JIFS-169834},
  timestamp = {Wed, 09 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jifs/ChewOWPH18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WongK18,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Toward a fair indictment for sealed-bid auction with self-enforcing
               privacy},
  journal   = {The Journal of Supercomputing},
  volume    = {74},
  number    = {8},
  pages     = {3801--3819},
  year      = {2018},
  url       = {https://doi.org/10.1007/s11227-017-2045-3},
  doi       = {10.1007/s11227-017-2045-3},
  timestamp = {Thu, 13 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tjs/WongK18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/WangCWZL18,
  author    = {Shangguang Wang and
               Wu Chou and
               Kok{-}Seng Wong and
               Ao Zhou and
               Victor C. M. Leung},
  title     = {Service Migration in Mobile Edge Computing},
  journal   = {Wireless Communications and Mobile Computing},
  volume    = {2018},
  pages     = {3823721:1--3823721:2},
  year      = {2018},
  url       = {https://doi.org/10.1155/2018/3823721},
  doi       = {10.1155/2018/3823721},
  timestamp = {Wed, 26 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/wicomm/WangCWZL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ZhouWHKW17,
  author    = {Ao Zhou and
               Shangguang Wang and
               Ching{-}Hsien Hsu and
               Myung Ho Kim and
               Kok{-}Seng Wong},
  title     = {Network failure-aware redundant virtual machine placement in a cloud
               data center},
  journal   = {Concurrency and Computation: Practice and Experience},
  volume    = {29},
  number    = {24},
  year      = {2017},
  url       = {https://doi.org/10.1002/cpe.4290},
  doi       = {10.1002/cpe.4290},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/concurrency/ZhouWHKW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijstm/WongK17,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Secure rank correlation computation for IoT applications},
  journal   = {{IJSTM}},
  volume    = {23},
  number    = {1/2},
  pages     = {40--51},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJSTM.2017.10002702},
  doi       = {10.1504/IJSTM.2017.10002702},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijstm/WongK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwgs/GuoWWK17,
  author    = {Yan Guo and
               Shangguang Wang and
               Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Skyline service selection approach based on QoS prediction},
  journal   = {{IJWGS}},
  volume    = {13},
  number    = {4},
  pages     = {425--447},
  year      = {2017},
  url       = {https://doi.org/10.1504/IJWGS.2017.10008332},
  doi       = {10.1504/IJWGS.2017.10008332},
  timestamp = {Wed, 22 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ijwgs/GuoWWK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/WongK17,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Privacy Protection for Data-Driven Smart Manufacturing Systems},
  journal   = {Int. J. Web Service Res.},
  volume    = {14},
  number    = {3},
  pages     = {17--32},
  year      = {2017},
  url       = {https://doi.org/10.4018/IJWSR.2017070102},
  doi       = {10.4018/IJWSR.2017070102},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jwsr/WongK17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WongK16,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {An enhanced user authentication solution for mobile payment systems
               using wearables},
  journal   = {Security and Communication Networks},
  volume    = {9},
  number    = {17},
  pages     = {4639--4649},
  year      = {2016},
  url       = {https://doi.org/10.1002/sec.1654},
  doi       = {10.1002/sec.1654},
  timestamp = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/scn/WongK16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jzusc/WongK15,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Towards a respondent-preferred k i -anonymity model},
  journal   = {Frontiers of {IT} {\&} {EE}},
  volume    = {16},
  number    = {9},
  pages     = {720--731},
  year      = {2015},
  url       = {https://doi.org/10.1631/FITEE.1400395},
  doi       = {10.1631/FITEE.1400395},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jzusc/WongK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/WongSK15,
  author    = {Kok{-}Seng Wong and
               Minjie Seo and
               Myung Ho Kim},
  title     = {Secure Two-Party Rank Correlation Computations for Recommender Systems},
  booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  pages     = {1022--1028},
  year      = {2015},
  crossref  = {DBLP:conf/trustcom/2015-1},
  url       = {https://doi.org/10.1109/Trustcom.2015.478},
  doi       = {10.1109/Trustcom.2015.478},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/WongSK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jam/WongK14,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Towards Self-Awareness Privacy Protection for Internet of Things Data
               Collection},
  journal   = {J. Applied Mathematics},
  volume    = {2014},
  pages     = {827959:1--827959:9},
  year      = {2014},
  url       = {https://doi.org/10.1155/2014/827959},
  doi       = {10.1155/2014/827959},
  timestamp = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jam/WongK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/WongK14,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {On private Hamming distance computation},
  journal   = {The Journal of Supercomputing},
  volume    = {69},
  number    = {3},
  pages     = {1123--1138},
  year      = {2014},
  url       = {https://doi.org/10.1007/s11227-013-1063-z},
  doi       = {10.1007/s11227-013-1063-z},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tjs/WongK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcc/WongK14,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Privacy-Preserving Data Collection with Self-Awareness Protection},
  booktitle = {Frontier and Innovation in Future Computing and Communications, Proceedings
               of the 2014 {FTRA} International Symposium on Frontier and Innovation
               in Future Computing and Communications, {FCC} 2014, Auckland, New
               Zealand, January 13-16, 2014},
  pages     = {365--371},
  year      = {2014},
  crossref  = {DBLP:conf/fcc/2014},
  url       = {https://doi.org/10.1007/978-94-017-8798-7\_44},
  doi       = {10.1007/978-94-017-8798-7\_44},
  timestamp = {Wed, 29 May 2019 09:35:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fcc/WongK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/WongK13,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Privacy-preserving similarity coefficients for binary data},
  journal   = {Computers {\&} Mathematics with Applications},
  volume    = {65},
  number    = {9},
  pages     = {1280--1290},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.camwa.2012.02.028},
  doi       = {10.1016/j.camwa.2012.02.028},
  timestamp = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cma/WongK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WongK13,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Secure Re-publication of Dynamic Big Data},
  booktitle = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
               2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  pages     = {468--477},
  year      = {2013},
  crossref  = {DBLP:conf/css/2013},
  url       = {https://doi.org/10.1007/978-3-319-03584-0\_36},
  doi       = {10.1007/978-3-319-03584-0\_36},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/css/WongK13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WongK12,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Privacy-preserving frequent itemsets mining via secure collaborative
               framework},
  journal   = {Security and Communication Networks},
  volume    = {5},
  number    = {3},
  pages     = {263--272},
  year      = {2012},
  url       = {https://doi.org/10.1002/sec.335},
  doi       = {10.1002/sec.335},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scn/WongK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/WongK12a,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Secure Biometric-Based Authentication for Cloud Computing},
  booktitle = {Cloud Computing and Services Science - Second International Conference,
               {CLOSER} 2012, Porto, Portugal, April 18-21, 2012. Revised Selected
               Papers},
  pages     = {86--101},
  year      = {2012},
  crossref  = {DBLP:conf/closer/2012s},
  url       = {https://doi.org/10.1007/978-3-319-04519-1\_6},
  doi       = {10.1007/978-3-319-04519-1\_6},
  timestamp = {Fri, 02 Jun 2017 20:48:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/closer/WongK12a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/WongK12,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Towards Biometric-based Authentication for Cloud Computing},
  booktitle = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on
               Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April,
               2012},
  pages     = {501--510},
  year      = {2012},
  crossref  = {DBLP:conf/closer/2012},
  timestamp = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/closer/WongK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/music/WongK12,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {A Privacy-Preserving Biometric Matching Protocol for Iris Codes Verification},
  booktitle = {Third {FTRA} International Conference on Mobile, Ubiquitous, and Intelligent
               Computing, {MUSIC} 2012, Vancouver, Canada, June 26-28, 2012},
  pages     = {120--125},
  year      = {2012},
  crossref  = {DBLP:conf/music/2012},
  url       = {https://doi.org/10.1109/MUSIC.2012.28},
  doi       = {10.1109/MUSIC.2012.28},
  timestamp = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/music/WongK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/WongK10,
  author    = {Kok{-}Seng Wong and
               Myung Ho Kim},
  title     = {Semi-trusted Collaborative Framework for Multi-party Computation},
  journal   = {{TIIS}},
  volume    = {4},
  number    = {3},
  pages     = {411--427},
  year      = {2010},
  url       = {https://doi.org/10.3837/tiis.2010.06.013},
  doi       = {10.3837/tiis.2010.06.013},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itiis/WongK10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/trustcom/2015-1,
  title     = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
               2015, Volume 1},
  publisher = {{IEEE}},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7293439},
  isbn      = {978-1-4673-7952-6},
  timestamp = {Thu, 10 Dec 2015 19:40:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/trustcom/2015-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fcc/2014,
  editor    = {James Jong Hyuk Park and
               Albert Y. Zomaya and
               Hwa{-}Young Jeong and
               Mohammad S. Obaidat},
  title     = {Frontier and Innovation in Future Computing and Communications, Proceedings
               of the 2014 {FTRA} International Symposium on Frontier and Innovation
               in Future Computing and Communications, {FCC} 2014, Auckland, New
               Zealand, January 13-16, 2014},
  series    = {Lecture Notes in Electrical Engineering},
  volume    = {301},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-94-017-8798-7},
  doi       = {10.1007/978-94-017-8798-7},
  isbn      = {978-94-017-8797-0},
  timestamp = {Wed, 29 May 2019 09:35:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fcc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/css/2013,
  editor    = {Guojun Wang and
               Indrakshi Ray and
               Dengguo Feng and
               Muttukrishnan Rajarajan},
  title     = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
               2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8300},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-03584-0},
  doi       = {10.1007/978-3-319-03584-0},
  isbn      = {978-3-319-03583-3},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/css/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/closer/2012s,
  editor    = {Ivan I. Ivanov and
               Marten van Sinderen and
               Frank Leymann and
               Tony Shan},
  title     = {Cloud Computing and Services Science - Second International Conference,
               {CLOSER} 2012, Porto, Portugal, April 18-21, 2012. Revised Selected
               Papers},
  series    = {Communications in Computer and Information Science},
  volume    = {367},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-04519-1},
  doi       = {10.1007/978-3-319-04519-1},
  isbn      = {978-3-319-04518-4},
  timestamp = {Fri, 02 Jun 2017 20:48:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/closer/2012s},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/closer/2012,
  editor    = {Frank Leymann and
               Ivan I. Ivanov and
               Marten van Sinderen and
               Tony Shan},
  title     = {{CLOSER} 2012 - Proceedings of the 2nd International Conference on
               Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April,
               2012},
  publisher = {SciTePress},
  year      = {2012},
  isbn      = {978-989-8565-05-1},
  timestamp = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/closer/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/music/2012,
  title     = {Third {FTRA} International Conference on Mobile, Ubiquitous, and Intelligent
               Computing, {MUSIC} 2012, Vancouver, Canada, June 26-28, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6305021},
  isbn      = {978-1-4673-1956-0},
  timestamp = {Fri, 02 Nov 2012 08:17:19 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/music/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics