Search for a surname in the box below and then click "Search" to search for Staff.
Asif, R. & Buchanan, W. J. (2017). Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)ISBN 978-1-5090-5880-8
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...
Vones, K. (2017). Crafted Evolution - The creation of the HyperHive Series. In Conference Proceedingsdoi:10.6084/m9.figshare.4746934. ISBN N/A
The following paper describes the conception and creation of the HyperHive Series of interactive pendants. This practice-led research analyses how the recent emergence of term...
Clarke, C., Bellino, A., Esteves, A., Velloso, E. & Gellersen, H. (2016). TraceMatch: a computer vision technique for user input by tracing of animated controls. In UbiComp '16 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 298-303. doi:10.1145/2971648.2971714. ISBN 9781450344616
Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the ...
22 November 2017
Lecturer of Cybersecurity, Encryption and Networks
(CAICT), C. A. O. I. A. C. T. & DG Connect, E. C. (2016). EU-China joint white paper on the Internet of Things
This paper reflects the outcome of several years of the IoT international cooperation between the EU and China and documents the state-of-the-art on IoT development in both re...
Abdmeziem, M. R., Tandjaoui, D. & Romdhani, I. (2015). A decentralized batch-based group key management potocol for mobile Internet of Thngs (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 1109-1117. doi:10.1109/CIT/IUCC/DASC/PICOM.2015.166. ISBN 978-1-5090-0153-8
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...
Vones, K. (2014). Towards the Posthuman: Materiality and process in the creation of stimulus-responsive jewellery objects. In All Makers Now?ISBN 978-0-9544187-9-3
The idea of creating a jewellery organism that comes alive on the
body has fascinated and inspired my research ever since learning
about the potential inherent in smart materi...
Thuemmler, C., Mival, O., Benyon, D., Buchanan, W., Paulin, A., Fricker, S., …Petrakis, E. (2014). Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013), 382-387. doi:10.1109/HealthCom.2013.6720705. ISBN 9781467358019
Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet – Private Public Partnershi...
Sotiriadis, S., Petrakis,, E. G. M., Covaci, . S., Zampognaro, P., Georga, E. & Thuemmler, C. (2014). An architecture for designing future internet (fi) applications in sensitive domains: Expressing the software to data paradigm by utilizing hybrid cloud technology. In 13th IEEE International Conference on BioInformatics and BioEngineering, 1-6. doi:10.1109/BIBE.2013.6701578. ISBN 9781479931637
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud servic...
Thuemmler, C., Mueller, J., Covaci, S., Magedanz, T., de Panfilis, S., Jell, T., …Gavras, A. (2013). Applying the software-to-data paradigm in next generation e-health hybrid clouds. In 2013 Tenth International Conference on Information Technology: New Generations (ITNG),, 459-463. doi:10.1109/itng.2013.77. ISBN 9780769549675
Health care providers have over years continuously rejected Public Cloud technology for understandable concerns regarding privacy and confidentiality. The pick up rate on clou...
Smyth, M. & Helgason, I. (2017). Making and Unfinishedness: Designing Toolkits for Negotiation. Design Journal. 20(sup1), S3966-S3974. doi:10.1080/14606925.2017.1352899. ISSN 1460-6925
Abstract: The diffusion and democratisation of computing technologies and physical prototyping systems has supported the rise of Do-It-Yourself culture. In the context of desi...
Asif, R. & Buchanan, W. J. (2017). Quantum-to-the-Home (QTTH): Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipments. Security and Communication Networks. doi:10.1155/2017/7616847. ISSN 1939-0114
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...
Sébastien Bedo, J., Eddine El Ayoubi, S., Filippou, M., Gavras, A., Giustiniano, D., Iovanna, P., …Tjelta, T. (2017). 5G innovations for new business opportunities. Brussels: European Commission / 5G PPP
5G is the next generation mobile network that enables
innovation and supports progressive change across all
vertical industries and across our society1. Through its
Thuemmler, C. (2016). 5G empowering vertical industries. Brussels: European Commission
Supported by the 5G empowering vertical industries With 5G, networks will be transformed into intelligent orchestration platforms. By cementing strong relationships between ve...
This research will investigate the nature of interactions between people and experience-oriented technologies such as new-media artw...