MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features
Saha, R., Geetha, G., Kumar, G., Kim, T., & Buchanan, W. J. (2019)
MRC4: A Modified RC4 Algorithm using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access, 7, 172045-172054. https://doi.org/10.1109/access.2019.2956160
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing symmetric key encryption, and is now proposed as an efficient cipher within light-weigh...
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks
Khan, F., Ur Rehman, A., Yahya, A., Jan, M. A., Chuma, J., Tan, Z., & Hussain, K. (2019)
A Quality of Service-Aware Secured Communication Scheme for Internet of Things-Based Networks. Sensors, 19, https://doi.org/10.3390/s19194321
The Internet of Things (IoT) is an emerging technology that aims to enable the interconnection of a large number of smart devices and heterogeneous networks. Ad hoc networks p...
PIR sensor array for hand motion recognition
Presentation / Conference
Wojtczuk, P., Armitage, A., Binnie, D., & Chamberlain, T. (2011, August)
PIR sensor array for hand motion recognition. Paper presented at SensorDevices 2011, Nice, France
Abstract—In this paper we present our work towards a hand gesture recognition system realised with a passive thermal infrared sensor array. In contrast with the majority of re...
Inside the Palimpsest: A Study of Newsroom Information
Macaulay, C. Gathering. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/7241
The methodologies of systems design, rooted in engineering and in cognitivist conceptions
of human action, have been stretched to the limit by the complexity of uses to which
Investigations into Decrypting Live Secure Traffic in Virtual Environments
McLaren, P. W. L. Investigations into Decrypting Live Secure Traffic in Virtual Environments. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/2386517
Malicious agents increasingly use encrypted tunnels to communicate with external servers. Communications may contain ransomware keys, stolen banking details, or other confiden...
Converting an existing taxonomic data resource to employ an ontology and LSIDs.
Kennedy, J., Gales, R., & Kukla, R. (2006)
Converting an existing taxonomic data resource to employ an ontology and LSIDs. In L. Belbin, A. Rissoné, & A. Weitzman (Eds.), Proceedings of TDWG (2006), St Louis, MI
Data sharing is fundamental to biodiversity and taxonomic data applications, however previous attempts at developing mechanisms to facilitate sharing within the community have...
Lightweight cryptography methods
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...
Protecting mobile agents from external replay attacks
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...
A topological insight into restricted Boltzmann machines
Mocanu, D. C., Mocanu, E., Nguyen, P. H., Gibescu, M., & Liotta, A. (2016)
A topological insight into restricted Boltzmann machines. Machine Learning, 104(2-3), 243-270. https://doi.org/10.1007/s10994-016-5570-z
Restricted Boltzmann Machines (RBMs) and models derived from them have been successfully used as basic building blocks in deep artificial neural networks for automatic feature...
A refinement calculus for the development of real-time systems.
Chen, Z., Cau, A., Zedan, H., Liu, X., & Yang, H. (1998)
A refinement calculus for the development of real-time systems. In 5th Asia Pacific Software Engineering Conference, APSEC '98, 61. https://doi.org/10.1109/APSEC.1998.733588
We present a calculus which can transfer specifications
to objects for the development of real-time systems. The
object model is based on a practical OO development