Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management

    In this paper, we introduce the notion of verifiably encrypted cascade-instantiable blank signatures (CBS) in a multi-user setting. In CBS, there is a delegation chain that starts with an originator and is follow...

    Yujue Wang, HweeHwa Pang, Robert H. Deng in International Journal of Information Security (2018)

  2. No Access

    Article

    Detecting anomaly collections using extreme feature ranks

    Detecting anomaly collections is an important task with many applications, including spam and fraud detection. In an anomaly collection, entities often operate in collusion and hold different agendas to normal...

    Hanbo Dai, Feida Zhu, Ee-Peng Lim, HweeHwa Pang in Data Mining and Knowledge Discovery (2015)

  3. Chapter and Conference Paper

    Verifiable Computation on Outsourced Encrypted Data

    On one hand, homomorphic encryption allows a cloud server to perform computation on outsourced encrypted data but provides no verifiability that the computation is correct. On the other hand, homomorphic authe...

    Junzuo Lai, Robert H. Deng, Hweehwa Pang, Jian Weng in Computer Security - ESORICS 2014 (2014)

  4. No Access

    Chapter

    Cryptography Foundation

    The query authentication schemes that we cover in this book make extensive use of cryptographic constructs. In this chapter, we give a working definition of those constructs; the reader is encouraged to refer ...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  5. No Access

    Chapter

    Data Streams

    Electronic services like stock trading, online bidding, RFID-enabled supply chain management, environment sensing and monitoring, have become commonplace, especially with the widespread adoption of mobile devi...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  6. No Access

    Chapter

    Introduction

    In data publishing, a data owner delegates the role of satisfying user queries to a third-party publisher [Devanbu et al., 2000, Miklau and Suciu, 2003]. This model is applicable to a wide range of computing p...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  7. No Access

    Chapter

    Text Search Queries

    Professional users commonly require certain security provisions from their paid content services. This is particularly so in the financial and legal industries. One security provision is integrity assurance [Pfle...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  8. No Access

    Chapter

    Conclusion

    In data publishing, owners outsource their data and processing logics to a third-party publisher. This raises security concerns. In particular, there is a need to ensure users that answers to their queries are...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  9. No Access

    Chapter

    Spatial Queries

    There are many applications that manipulate spatial data. For example, Geographic Information Systems (GIS) represent locations as points, rivers and highways as lines and lakes and cities as regions. As anoth...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  10. No Access

    Book

  11. No Access

    Chapter

    Relational Queries

    As we saw in Chapter 2, the cryptographic protocols that form the foundation of query answer authentication, particularly the Merkle Hash Tree, are designed for verifying ordered lists. Since a tree-structured...

    HweeHwa Pang, Kian-Lee Tan in Query Answer Authentication (2012)

  12. No Access

    Article

    Efficient processing of exact top-k queries over disk-resident sorted lists

    The top-k query is employed in a wide range of applications to generate a ranked list of data that have the highest aggregate scores over certain attributes. As the pool of attributes for selection by individual ...

    HweeHwa Pang, Xuhua Ding, Baihua Zheng in The VLDB Journal (2010)

  13. No Access

    Chapter and Conference Paper

    Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes

    Extracting textured objects from natural scenes is a challenging task in computer vision. The main difficulties arise from the intrinsic randomness of natural textures and the high-semblance between the object...

    Jundi Ding, Jialie Shen, HweeHwa Pang, Songcan Chen in Computer Vision – ACCV 2009 (2010)

  14. No Access

    Chapter and Conference Paper

    Dual Phase Learning for Large Scale Video Gait Recognition

    Accurate gait recognition from video is a complex process involving heterogenous features, and is still being developed actively. This article introduces a novel framework, called GC2F, for effective and efficien...

    Jialie Shen, HweeHwa Pang, Dacheng Tao, Xuelong Li in Advances in Multimedia Modeling (2010)

  15. No Access

    Article

    Partially materialized digest scheme: an efficient verification method for outsourced databases

    In the outsourced database model, a data owner publishes her database through a third-party server; i.e., the server hosts the data and answers user queries on behalf of the owner. Since the server may not be ...

    Kyriakos Mouratidis, Dimitris Sacharidis, HweeHwa Pang in The VLDB Journal (2009)

  16. No Access

    Chapter and Conference Paper

    Visual Analytics for Supporting Entity Relationship Discovery on Text Data

    To conduct content analysis over text data, one may look out for important named objects and entities that refer to real world instances, synthesizing them into knowledge relevant to a given information seekin...

    Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw in Intelligence and Security Informatics (2008)

  17. Chapter and Conference Paper

    Authenticating Multi-dimensional Query Results in Data Publishing

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the publisher may be untrusted or susceptible to attacks, it could produce incorrect query results. Th...

    Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan in Data and Applications Security XX (2006)

  18. No Access

    Article

    Social Network Discovery by Mining Spatio-Temporal Events

    Knowing patterns of relationship in a social network is very useful for law enforcement agencies to investigate collaborations among criminals, for businesses to exploit relationships to sell products, or for ...

    Hady W. Lauw, Ee-Peng Lim, HweeHwa Pang in Computational & Mathematical Organization … (2005)

  19. No Access

    Book and Conference Proceedings

    Information Security Practice and Experience

    First International Conference, ISPEC 2005, Singapore, April 11-14, 2005. Proceedings

    Robert H. Deng, Feng Bao, HweeHwa Pang in Lecture Notes in Computer Science (2005)

  20. Chapter and Conference Paper

    Authenticating Query Results in Data Publishing

    We propose a communication-efficient authentication scheme to authenticate query results disseminated by untrusted data publishing servers. In our scheme, signatures of multiple tuples in the result set are ag...

    Di Ma, Robert H. Deng, Hweehwa Pang in Information and Communications Security (2005)

previous disabled Page of 2