Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications
Conference Proceeding
Gunathilake, N. A., Buchanan, W. J., & Asif, R. (2019)
Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. https://doi.org/10.1109/WF-IoT.2019.8767250
High/ultra-high speed data connections are currently being developed, and by the year 2020, it is expected that the 5th generation networking (5GN) should be much smarter. It ...
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Other
Buchanan, W. J. (2015)
Apple and Starbucks could have avoided being hacked if they'd taken this simple step
Apple and Starbucks are two of the world’s most trusted companies, but their reputations were recently tarnished thanks to some novice cybersecurity mistakes. Both setup syste...
Distributed systems and networks.
Book
Buchanan, W. J. (1999)
Distributed systems and networks. McGraw-Hill
This book provides the student with comprehensive coverage of both networks and system architecture. It aims to introduce the most widely used networking protocols and distrib...
An Analysis of N5 and Higher Computing.
Presentation / Conference
Buchanan, W. J. (2015, January)
An Analysis of N5 and Higher Computing. Paper presented at Computing at School, University of Dundee, Scotland
This presentation outlined an analysis of N5 and Higher Computing in Scotland.
Cloud-based e-Health System.
Presentation / Conference
Buchanan, W. J., Fan, L., Thuemmler, C., Lo, O., & Ekonomou, E. (2011, September)
Cloud-based e-Health System. Paper presented at BCS Health Informatics, Edinburgh
This paper presents the future of health care system, which uses the newly developed security infrastructure.
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment
Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...
Minimising collateral damage: privacy-preserving Investigative data acquisition platform.
Journal Article
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2011)
Minimising collateral damage: privacy-preserving Investigative data acquisition platform. International Journal of Information Technologies and Systems Approach, 4, 12-31. https://doi.org/10.4018/jitsa.2011070102
Investigators define invasion of privacy during their operations as collateral damage. Inquiries that require gathering data about potential suspects from third parties, such ...
Advanced security and network forensics: Introduction.
Other
Buchanan, W. J. (2011)
Advanced security and network forensics: Introduction. Edinburgh Napier University
1.1 Objectives
1.2 Introduction
1.3 Security Taxonomy
1.4 Threats
Hardware misuse
Environmental risks
External misuse
Pests
Active misuse
Passive misuse
Masquerading...
Sticky policy enabled authenticated OOXML
Conference Proceeding
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2016)
Sticky policy enabled authenticated OOXML. In Conference Proceedings of the IEEE Technically Sponsored SAI Computing Conference 2016. https://doi.org/10.1109/SAI.2016.7556117
This paper proposes a secure document sharing construction, which addresses confidentiality and authenticity concerns related to cloud-based data sharing. The goal of this res...
Mastering the Internet.
Book
Buchanan, W. J. (1996)
Mastering the Internet. Macmillan Press
This work offers an up-to-date account of all the component parts of the Internet and the World Wide Web, from architecture to networking. The book discusses key specification...