Kok-Seng Wong received his first degree in Computer Science (major in Software Engineering) from the University of Malaya, Malaysia in 2002 and an M.Sc. IT from the Malaysia University of Science and Technology, Malaysia in 2004. He obtained his Ph.D. degree in Computer Science and Engineering from the Soongsil University, South Korea in 2012.
He is currently Assistant Professor in the Department of Computer Science, School of Science and Technology, Nazarbayev University. Prior to joining Nazarbayev University, he has taught computer science subjects (undergraduate and postgraduate) in Malaysian and South Korean universities for the past 15 years.
His research interests lie in the fields of cryptography, secret sharing, security, data privacy, and biometrics. His ultimate research goal is to help users to protect their data privacy in this technology era. However, his research interests are not limited to the above topics/areas.
Toward a fair indictment for sealed-bid auction with self-enforcing privacyWong, K., Kim, M.,
2018 In : Journal of Supercomputing. 74, 8, p. 3801-3819
Emerging issues and challenges for cloud data at the edgeWong, K., Kim, M.,
2018 In : International Journal of Web and Grid Services. 14, 2, p. 123-145
Network failure–aware redundant virtual machine placement in a cloud data centerZhou, A., Wang, S., Hsu, C., Kim, M., Wong, K.,
2017Virtual machine placement with (m, n)-fault tolerance in cloud data centerZhou, A., Wang, S., Hsu, C., Kim, M., Wong, K.,
2017Springer New York, In : Cluster Computing. p. 1-13
Skyline service selection approach based on QoS predictionGuo, Y., Wang, S., Wong, K., Kim, M.,
2017 In : International Journal of Web and Grid Services. 13, 4, p. 425-447
Privacy Protection for Data-Driven Smart Manufacturing SystemsWong, K., Kim, M.,
2017 In : International Journal of Web Services Research. 14, 3, p. 17-32
Secure rank correlation computation for IoT applicationsWong, K., Kim, M.,
2017 In : International Journal of Services, Technology and Management. 23, 1/2, p. 40
An enhanced user authentication solution for mobile payment systems using wearablesWong, K., Kim, M.,
2016 Security and Communication Networks. John Wiley and Sons Inc., p. 4639-4649
SFADS: A SIP flooding attack detection scheme with the internal and external detection features in IMS networksSun, Q., Wang, S., Lu, N., Wong, K., Kim, M.,
2016 Journal of Internet Technology. Taiwan Academic Network Management Committee, p. 1327-1338
Secure two-party rank correlation computations for recommender systemsWong, K., Seo, M., Kim, M.,
2015 Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015. Institute of Electrical and Electronics Engineers Inc., p. 1022-1028
Towards a respondent-preferred ki-anonymity modelWong, K., Kim, M.,
2015 In : Frontiers of Information Technology and Electronic Engineering. 16, 9, p. 720-731
A Collaborative Framework Design for Distributed Biometrics-based Authentication in the CloudWong, K., Kim, M.,
2015 Biometric Security. Cambridge Scholars Publishing, p. 351-380
Preserving Differential Privacy for Similarity Measurement in Smart EnvironmentsWong, K., Kim, M.,
2014 In : The Scientific World Journal, The Scientific World Journal. 2014, p. 1-9
Towards self-awareness privacy protection for internet of things data collectionWong, K., Kim, M.,
2014 In : Journal of Applied Mathematics. 2014,
Privacy-preserving data collection with self-awareness protectionWong, K., Kim, M.,
2014 Frontier and Innovation in Future Computing and Communications. Springer Verlag, p. 365-371
Preserving differential privacy for similarity measurement in smart environmentsWong, K., Kim, M.,
2014 In : Scientific World Journal. 2014,
Secure re-publication of dynamic big dataWong, K., Kim, M.,
2013 Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Proceedings. p. 468-477
Privacy-preserving similarity coefficients for binary dataWong, K., Kim, M.,
2013 In : Computers and Mathematics with Applications. 65, 9, p. 1280-1290
Secure Biometric-Based Authentication for Cloud ComputingWong, K., Kim, M.,
2013 Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 86-101
On private Hamming distance computationWong, K., Kim, M.,
2013 In : Journal of Supercomputing. 69, 3, p. 1123-1138
A privacy-preserving biometric matching protocol for iris codes verificationWong, K., Kim, M.,
2012 Proceedings - 2012 3rd FTRA International Conference on Mobile, Ubiquitous, and Intelligent Computing, MUSIC 2012. p. 120-125
Towards biometric-based authentication for cloud computingWong, K., Kim, M.,
2012 CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 501-510
A privacy-preserving biometric authentication protocolWong, K., Kim, M.,
2012 In : Advanced Science Letters. 9, p. 683-688
Privacy-preserving frequent itemsets mining via secure collaborative frameworkWong, K., Kim, M.,
2012 In : Security and Communication Networks. 5, 3, p. 263-272
Semi-trusted collaborative framework for multi-party computationWong, K., Kim, M.,
2010 In : KSII Transactions on Internet and Information Systems. 4, 3, p. 411-427
Collaborative Support for Medical Data Mining in TelemedicineSeng, W., Besar, R., Abas, F.,
2006 2006 2nd International Conference on Information & Communication Technologies. p. 894-899