AES Encryption and Decryption in Microsoft .NET.
Report
Buchanan, W. J. (2009)
AES Encryption and Decryption in Microsoft .NET
This paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample...
Network Firewall Dynamic Performance Evaluation and Formalisation
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/2599
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to...
Protecting mobile agents from external replay attacks
Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...
An Information Economy Built on Sand?
Journal Article
Dougan, S., & Saliou, L. (2008)
An Information Economy Built on Sand?. Expert Witness Institute NewsLetter, 12, 14-15
MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks
Thesis
Migas, N. (2008)
MARIAN: A hybrid, metric-driven, agent-based routing protocol for multihop ad-hoc networks. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4000
Recent advances in technology provided the ground for highly dynamic, mobile, infrastructure-less networks, namely, ad-hoc networks. Despite their enormous benefits, the full ...
Distributed healthcare framework using patient-centric role-based security modelling and workflow
Thesis
Symes, M. (2008)
Distributed healthcare framework using patient-centric role-based security modelling and workflow. (Dissertation). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4008
Healthcare professionals are spending less time with patients and more time on administrative duties (Royal College of Nursing, 2008). This is due to a high bureaucratic deman...
The impact of routing schemes on group communication throughput in scalable networks.
Conference Proceeding
Al-Dubai, A. (2008)
The impact of routing schemes on group communication throughput in scalable networks. In Proceedings of the 2008 IEEE international parallel & distributed processing symposium, 1-8. https://doi.org/10.1109/IPDPS.2008.4536490
Multicast communication has been a major avenue for many studies in interconnection networks. However, such a communication pattern has been studied under either limited opera...
Ad-hoc routing metrics and applied weighting for QoS support
Conference Proceeding
Migas, N., & Buchanan, W. J. (2008)
Ad-hoc routing metrics and applied weighting for QoS support. In 22nd IEEE International Parallel & Distributed Processing Symposium. , (1-8). https://doi.org/10.1109/IPDPS.2008.4536496
In the vast majority of ad-hoc routing protocols, the hop-counting mechanisms for identifying the optimal route are dominant. However, this approach oversimplifies such a comp...
Scenario Analysis using Out-of-line Firewall Evaluation Framework.
Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...
Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology.
Journal Article
Thuemmler, C., Buchanan, W. J. & Kumar, V. (2007)
Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology. International Journal of Healthcare Technology and Management. 8, 571-583. doi:10.1504/IJHTM.2007.013524. ISSN 1368-2156
This paper outlines a large-scale audit for the enhancement of quality of care and staff and patient safety using passive RFID (Radio Frequency ID) wrist bands, which link to ...