Academic Profile : Faculty
Assoc Prof Wee Keong NG
Associate Professor, College of Computing & Data Science
Email
External Links
Dr. W. K. NG works in machine learning, privacy-preserving techniques, query-permissible encrypted databases, enterprise blockchain systems, data security, and blockchain security. His work is motivated by the need to harness the power of data for the betterment of stakeholders, where the data has confidentiality and privacy issues; where the data may be owned and held by different stakeholders, and where the data is so large that it must be hosted in cloud servers that are never completely secured (susceptible to insider and cyber attacks). He contributes to companies and industries as technology consultant on projects involving data analytics, artificial intelligence, data privacy and security, and blockchain. In recent years, his involvement in conferences and workshop can be found here. His work is supported by various research grants, which can be found here. He is Associate Editor and Member of Editorial Boards of five journals. Over the years, he has worked with many talented students on their PhD and Master theses. Dr. Ng writes for online magazines and newspapers and contributes to social causes.
Machine learning / Artificial intelligence
Privacy-preserving data analytical techniques
Encrypted databases
Enterprise blockchain systems
Data security
Privacy-preserving data analytical techniques
Encrypted databases
Enterprise blockchain systems
Data security
- Strategic Centre For Research In Privacy-Preserving Technologies & Systems (SCRIPTS)
US 2020/0211004 A1: Method Of Performing Authentication For A Transaction And A System Thereof (2023)
Abstract: There is provided a method of performing authentication for a transaction between first and second devices. The method includes: generating a first random number and encrypting it based on a first key of a first private-public key pair; sending the encrypted first random number to the server; receiving a transaction identifier for the transaction, the first random number and a second random number, wherein the transaction identifier, the first random number and the second random number are encrypted based on a first key of a second private-public key pair; decrypting the encrypted transaction identifier, the encrypted first random number and the encrypted second random number based on a second key of the second private-public key pair; and sending the transaction identifier, and the second random number to the second device for authenticating the first device for the transaction. There is also provided a corresponding device and system.
Abstract: There is provided a method of performing authentication for a transaction between first and second devices. The method includes: generating a first random number and encrypting it based on a first key of a first private-public key pair; sending the encrypted first random number to the server; receiving a transaction identifier for the transaction, the first random number and a second random number, wherein the transaction identifier, the first random number and the second random number are encrypted based on a first key of a second private-public key pair; decrypting the encrypted transaction identifier, the encrypted first random number and the encrypted second random number based on a second key of the second private-public key pair; and sending the transaction identifier, and the second random number to the second device for authenticating the first device for the transaction. There is also provided a corresponding device and system.