Weihan Goh
Cited by
Cited by
A queuing mechanism to alleviate flooding attacks in probabilistic delay tolerant networks
FC Lee, W Goh, CK Yeo
2010 Sixth Advanced International Conference on Telecommunications, 329-334, 2010
Data exchange via multiplexed color QR codes on mobile devices
SR Toh, W Goh, CK Yeo
2016 Wireless Telecommunications Symposium (WTS), 1-6, 2016
A wavelet entropy-based change point detection on network traffic: A case study of heartbleed vulnerability
C Lee, L Yi, LH Tan, W Goh, BS Lee, CK Yeo
2014 IEEE 6th International Conference on Cloud Computing Technology and …, 2014
A trusted platform module based anti-forensics system
W Goh, PC Leong, CK Yeo
2009 International Conference on Network and Service Security, 1-5, 2009
Two Factor Authentication Made Easy
AQ Chen, W Goh
International Conference on Web Engineering, 449-458, 2015
Teaching an Old TPM New Tricks: Repurposing for Identity-Based Signatures
W Goh, CK Yeo
IEEE Security & Privacy Magazine 11 (5), 28-35, 2013
A Plausibly-Deniable, Practical Trusted Platform Module Based Anti-Forensics Client-Server System
W Goh, PC Leong, CK Yeo
IEEE Journal on Selected Areas in Communications 29 (7), 1377-1391, 2011
Anonymity-preserving identity-based multisignature scheme with provision for origin Self-Revelation
W Goh, CK Yeo
2013 IEEE Global Communications Conference (GLOBECOM), 855-860, 2013
Cryptanalyzing the efficient identity-based RSA and GQ multisignature schemes
W Goh, CK Yeo
2014 International Wireless Communications and Mobile Computing Conference …, 2014
Threat mitigation in tactical-level disruption tolerant networks
W Goh, CK Yeo
2012 IEEE Global Communications Conference (GLOBECOM), 997-1003, 2012
The system can't perform the operation now. Try again later.
Articles 1–10