Research Publications for Ryan Kok Leong K L (Ryan) Ko
Welcome to the University of Waikato research publications search. This database includes all research publications produced by the University from 1998.
Author's Publications
Search our Staff Profiles to contact our current staff members.
Will, M. A., & Ko, R. K. L. (2017). Distributing encoded data for private processing in the cloud. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 89-115). London: IET. doi:10.1049/PBSE007E_ch5
Other publications by:
KO, Ryan Kok Leong K L (Ryan)Shute, S., Ko, R. K. L., & Chaisiri, S. (2017). Attribution using keyboard row based behavioural biometrics for handedness recognition. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1131-1138). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.363
Scoon, C., & Ko, R. K. L. (2017). The Waikato Data Privacy Matrix. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 243-259). London: IET. doi:10.1049/PBSE007E_ch11
Other publications by:
KO, Ryan Kok Leong K L (Ryan)Tan, A. Y. S., Chaisiri, S., Ko, R. K. L., Ko, R. K. K. L., Holmes, G., & Rogers, B. (2017). Data provenance in cloud. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 261-275). London: IET. doi:10.1049/PBSE007E_ch12
Chase, J., Niyato, D., Wang, P., Chaisiri, S., & Ko, R. (2017). A scalable approach to joint cyber insurance and security-as-a-service provisioning in cloud computing. IEEE Transactions on Dependable and Secure Computing, PP(99). doi:10.1109/TDSC.2017.2703626
Open Access version at:
https://hdl.handle.net/10289/11869
Other publications by:
CHAISIRI, Sivadon :: KO, Ryan Kok Leong K L (Ryan)Burton, J., & Ko, R. (2017). Opinion: Ransomware attack needs global solution. Retrieved from http://www.stuff.co.nz/
Kumar, V., Chaisiri, S., & Ko, R. (2017). A data-centric view of cloud security. In V. Kumar, S. Chaisiri, & R. Ko (Eds.), Data Security in Cloud Computing (pp. 1-17). London: IET. doi:10.1049/PBSE007E_ch1
Will, M., Garae, J., Tan, Y. S., Scoon, C., & Ko, R. (2017). Returning control of data to users with a personal information crunch - a position paper. In Proc 2017 International Conference on Cloud Computing Research and Innovation (pp. 23-32). Conference held Singapore: IEEE. doi:10.1109/ICCCRI.2017.12
Ko, R. K. L., & Phua, T. W. (2017). The full provenance stack: Five layers for complete and meaningful provenance. In G. Wang, M. Atiquzzaman, Z. Yan, & K. -K. R. Choo (Eds.), Proc Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017) International Workshops Vol. LNCS 10658 (pp. 180-193). Guangzhou, China: Springer. doi:10.1007/978-3-319-72395-2_18
Other publications by:
KO, Ryan Kok Leong K L (Ryan)Will, M. A., Ko, R. K. L., & Schlickmann, S. J. (2017). Anonymous data sharing between organisations with elliptic curve cryptography. In Proc 16th IEEE International Conference on Trust, Security and Privacy in Computer and Communications (pp. 1024-1031). Sydney, Australia: IEEE. doi:10.1109/Trustcom/BigDataSE/ICESS.2017.347
Open Access version at:
https://hdl.handle.net/10289/11872
Other publications by:
KO, Ryan Kok Leong K L (Ryan)
See Also: Research Links | Student Research Theses | Research Commons