KC
Kim Kwang Raymond Choo
8 records found
1
Misinformation Detection on Social Media
Challenges and the Road Ahead
It is increasingly challenging to deal with the volume,variety, velocity, and veracity of misinformation (e.g., dissemination of fake news contents, spurious posts, and fabricated images/videos) from different online platforms. In this article, we present an overview of existing
...
CovertSYS
A systematic covert communication approach for providing secure end-to-end conversation via social networks
While encryption can prevent unauthorized access to a secret message, it does not provide undetectability of covert communications over the public network. Implementing a highly latent data exchange, especially with low eavesdropping/discovery probability, is challenging for prac
...
Modern Authentication Schemes in Smartphones and IoT Devices
An Empirical Survey
User authentication remains a challenging issue, despite the existence of a large number of proposed solutions, such as traditional text-based, graphical-based, biometrics-based, Web-based, and hardware-based schemes. For example, some of these schemes are not suitable for deploy
...
BAS-VAS
A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices
Mobile operators offer a wide range of value-added services (VAS) to their subscribers (i.e., mobile users), which in turn generates around 15% of the telecommunication industry revenue. However, simultaneous VAS requests from a large number of mobile devices to a single server o
...
CryptCloud+
Secure and Expressive Data Access Control for Cloud Storage
Secure cloud storage, an emerging cloud service, guarantees the confidentiality of outsourced data while providing flexible data access control for cloud users whose data are out of their physical control. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is one of the promis
...
Secret picture
An efficient tool for mitigating deletion delay on OSN
With the increasing popularity of online social networks (OSNs) and the ability to access and exchange sensitive user information, user privacy concerns become an important issue which have attracted the attention of researchers and policymakers. For example, deleted pictures or
...
Extended proxy-assisted approach
Achieving revocable fine-grained encryption of cloud data
Attribute-based encryption has the potential to be deployed in a cloud computing environment to provide scalable and fine-grained data sharing. However, user revocation within ABE deployment remains a challenging issue to overcome, particularly when there is a large number of use
...