Research Publications for Ryan Kok Leong K L (Ryan) Ko

Welcome to the University of Waikato research publications search page. This database includes all research publications produced by the University from 1998.

See Also: Research Links | Student Research Theses | Research Commons

Author's Publications

Publications ByKO, Ryan Kok Leong K L (Ryan)

  Use our Online Phonebook to contact our current staff members.

  • Will, M. A., Ko, R. K. L., & Witten, I. H. (2016). Privacy preserving computation by fragmenting individual bits and distributing gates. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 900-908). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0154

  • Ko, R., & Choo, K. K. R. (2016). Message from the TSCloud 2016 Symposium Chairs. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. xli). Tianjin, China. doi:10.1109/TrustCom.2016.0015

  • Chaisiri, S., & Ko, R. K. L. (2016). From reactionary to proactive security: context-aware security policy management and optimization under uncertainty. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 535-543). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0107

  • Scoon, C., & Ko, R. K. L. (2016). The data privacy matrix project: towards a global alignment of data privacy laws. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 1998-2005). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0305

  • Stricot-Tarboton, S., Chaisiri, S., & Ko, R. K. L. (2016). Taxonomy of man-in-the-middle attacks on HTTPS. In Proc 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 527-534). Tianjin, China: IEEE Computer Society. doi:10.1109/TrustCom.2016.0106

  • Will, M. A., & Ko, R. K. L. (2016). Computing mod with a variable lookup table. In P. Mueller, S. M. Thampi, M. Z. Alam Bhuiyan, R. Ko, R. Doss, & J. M. Alcaraz Calero (Eds.), Proc 4th International Symposium on Security in Computing and Communications Vol. CCIS 625 (pp. 3-17). Jaipur, India: Springer. doi:10.1007/978-981-10-2738-3_1

  • Tan, A. Y. S., Ko, R. K. L., Holmes, G., & Rogers, B. (2015). Provenance for cloud data accountability. In R. Ko, & K. -K. R. Choo (Eds.), The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues (pp. 171-185). Elsevier Inc. doi:10.1016/B978-0-12-801595-7.00008-2

  • Bany Taha, M., Chaisiri, S., & Ko, R. K. L. (2015). Trusted tamper-evident data provenance. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 646-653). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.430

  • Ko, R., & Choo, K. K. R. (2015). Message from the workshop chairs of IEEE TSCloud 2015. In Proc 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Vol. 1 (pp. xxx). Helsinki, Finland: IEEE. doi:10.1109/Trustcom.2015.337

  • Ko, R. K. L., & Choo, K. -K. R. (2015). Message from the symposium chairs: TSCloud 2014. In Proc 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications (pp. xxvi). Beijing, China: Institute of Electrical and Electronics Engineers Inc.. doi:10.1109/TrustCom.2014.147

This page has been reformatted for printing.