Research explorer tool

Date


School

Themes

Output Type

Download Available

25 results

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption

Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...

Performance evaluation of RPL metrics in environments with strained transmission ranges.

Conference Proceeding
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2017)
Performance evaluation of RPL metrics in environments with strained transmission ranges. In 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). https://doi.org/10.1109/aiccsa.2016.7945687
An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consisten...

Security, privacy and safety evaluation of dynamic and static fleets of drones

Conference Proceeding
Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A., & Chaumette, S. (2017)
Security, privacy and safety evaluation of dynamic and static fleets of drones. In 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC),https://doi.org/10.1109/dasc.2017.8101984
Interconnected everyday objects, either via public or private networks, are gradually becoming reality in modern life -- often referred to as the Internet of Things (IoT) or C...

TraceMatch: a computer vision technique for user input by tracing of animated controls

Conference Proceeding
Esteves>, A., Clarke, C., Bellino, A., Esteves, A., Velloso, E., & Gellersen, H. (2016)
TraceMatch: a computer vision technique for user input by tracing of animated controls. In UbiComp '16 Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, (298-303). https://doi.org/10.1145/2971648.2971714
Recent works have explored the concept of movement correlation interfaces, in which moving objects can be selected by matching the movement of the input device to that of the ...

A software tool for evaluating navigation

Conference Proceeding
McCall, R., & Benyon, D. (1997)
A software tool for evaluating navigation. In J. May, J. Siddiqui, & J. Wilkinson (Eds.), HCI’98 Conference Companion, 72-73
Traditional methods of evaluating the usability of software systems largely ignore the problem of navigation within computer based environments. In contrast the 'Navigation of...

EniSpace: Evaluating Navigation in Information Space

Conference Proceeding
McCall, R., & Benyon, D. (1998)
EniSpace: Evaluating Navigation in Information Space. In P. De Bra, & J. J. Leggett (Eds.), Proceedings of WebNet World Conference on the WWW and Internet 1999, 1344-1345
Traditional methods of evaluating usability such as heuristic evaluation and cognitive walkthrough do not address all issues relating to navigation. This is despite the fact t...

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors

Conference Proceeding
Kumar Mishra, A., Kumar Tripathy, A., Obaidat, M. S., Tan, Z., Prasad, M., Sadoun, B., & Puthal, D. (2018)
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. In Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 89-98. https://doi.org/10.5220/0006850602550264
Due to lack of an efficient monitoring system to periodically record environmental parameters for food grain storage, a huge loss of food grains in storage is reported every y...

Performance Investigation of RPL Routing in Pipeline Monitoring WSNs

Conference Proceeding
Wadhaj, I., Gharebi, W., Al-Dubai, A., & Thomson, C. (2018)
Performance Investigation of RPL Routing in Pipeline Monitoring WSNs. In 20th {IEEE} International Conference on High Performance Computing and Communications; 16th {IEEE} International Conference on Smart City; 4th {IEEE} International Conference on Data Science and Systems, HPCC/SmartCity/DSS 2018https://doi.org/10.1109/HPCC/SmartCity/DSS.2018.00178
The adoption of WSN and IEEE 802.15.4 standard for the linear WSN networks were assumed. The interconnection of WSNs with the Internet is possible by assigning IPv6 addresses ...

DIY Community WiFi Networks: Insights on Participatory Design

Conference Proceeding
Smyth, M., & Helgason, I. (2019)
DIY Community WiFi Networks: Insights on Participatory Design. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systemshttps://doi.org/10.1145/3290607.3313073
This paper presents a first version of a set of insights developed collaboratively by researchers during a three-year participatory design project spread across four European ...

A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK)

Conference Proceeding
Abdmeziem, M. R., Tandjaoui, D., & Romdhani, I. (2015)
A Decentralized Batch-Based Group Key Management Protocol for Mobile Internet of Things (DBGK). In 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), (1109-1117). https://doi.org/10.1109/cit/iucc/dasc/picom.2015.166
It is anticipated that constrained devices in the Internet of Things (IoT) will often operate in groups to achieve collective monitoring or management tasks. For sensitive and...