Date


People

Download Available

334 results

Building a new nation: risk, goverance and trust.

Presentation / Conference
Buchanan, W. J. (2013, January)
Building a new nation: risk, goverance and trust. Presented at Cyber Security 2013, Edinburgh
This presentation outlines some of the opportunities and threats that Scotland faces within an Information Age.

GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

Journal Article
Lo, O., Buchanan, W., Sayeed, S., Papadopoulos, P., Pitropakis, N., & Chrysoulas, C. (2022)
GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture. Sensors, 22(6), Article 2291. https://doi.org/10.3390/s22062291
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evo...

HI-risk: A method to analyse health information risk intelligence

Conference Proceeding
Buchanan, W. J., & van Deursen, N. (2016)
HI-risk: A method to analyse health information risk intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)https://doi.org/10.1109/healthcom.2016.7749536
Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to securi...

Sensing and Artificial Intelligent Maternal-Infant Health Care Systems: A Review

Journal Article
Gulzar Ahmad, S., Iqbal, T., Javaid, A., Ullah Munir, E., Kirn, N., Jan, S. U., & Ramzan, N. (2022)
Sensing and Artificial Intelligent Maternal-Infant Health Care Systems: A Review. Sensors, 22(12), Article 4362. https://doi.org/10.3390/s22124362
Currently, information and communication technology (ICT) allows health institutions to reach disadvantaged groups in rural areas using sensing and artificial intelligence (AI...

Embedded document security using sticky policies and identity based encryption

Thesis
Spyra, G. K. Embedded document security using sticky policies and identity based encryption. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2090564
Data sharing domains have expanded over several, both trusted and insecure environments. At the same time, the data security boundaries have shrunk from internal network perim...

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...

Prediction of electric fields from conductors on a PCB by 3D finite-difference time-domain method.

Journal Article
Buchanan, W. J., & Gupta, N. K. (1995)
Prediction of electric fields from conductors on a PCB by 3D finite-difference time-domain method. Engineering Science and Education Journal, 4, 177-182. https://doi.org/10.1049/esej%3A19950410
The finite-difference time-domain method gives accurate results for the calculation of electromagnetic wave propagation and hence can be used in a number of university final-y...

How the love of one teenager brought Tweetdeck to its knees.

Other
Buchanan, W. J. (2014)
How the love of one teenager brought Tweetdeck to its knees
TweetDeck, a Twitter app with millions of users, is back online after a rather surprising security scare. For several hours, the service was taken down all because a 19-year-o...

A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption

Journal Article
Kumar, G., Rai, M., Saha, R., Buchanan, W. J., Thomas, R., Geetha, G., …Rodrigues, J. (2020)
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption. IEEE Transactions on Vehicular Technology, 69(7), 7707-7722. https://doi.org/10.1109/tvt.2020.2989817
The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a lon...

If you seek to ‘switch off’ encryption, you may as well switch off the whole internet.

Other
Buchanan, W. J. (2015)
If you seek to ‘switch off’ encryption, you may as well switch off the whole internet
Prime Minister David Cameron has stated that the UK government will look at “switching off” some forms of encryption in order to make society safer from terror attacks. This m...