Research explorer tool

Date


School

Output Type

Download Available

69 results

Scenario-based creation and digital investigation of ethereum ERC20 tokens

Journal Article
Dyson, S. F., Buchanan, W. J., & Bell, L. (2020)
Scenario-based creation and digital investigation of ethereum ERC20 tokens. Digital Investigation, 32, https://doi.org/10.1016/j.fsidi.2019.200894
This paper examines the Ethereum network in the context of an investigation. The validation of data sources is achieved through different client software on both the Ropsten n...

Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

Journal Article
Lowe, I., Buchanan, W. J., Macfarlane, R., & Lo, O. (2019)
Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction. Journal of Networking Technology, 10(4), 124-155. https://doi.org/10.6025/jnt/2019/10/4/124-155
Bluetooth is a short-range wireless technology that provides audio and data links between personal smartphones and playback devices, such as speakers, headsets and car enterta...

Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication

Journal Article
Aziz Shah, S., Ahmad, J., Tahir, A., Ahmed, F., Russell, G., Shah, S. Y., …Abbasi, Q. H. (2020)
Privacy-Preserving Non-Wearable Occupancy Monitoring System Exploiting Wi-Fi Imaging for Next-Generation Body Centric Communication. Micromachines, 11(4), https://doi.org/10.3390/mi11040379
Nano-scaled structures, wireless sensing, wearable devices, and wireless communications systems are anticipated to support the development of new next-generation technologies ...

A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption

Journal Article
Kumar, G., Rai, M., Saha, R., Buchanan, W. J., Thomas, R., Geetha, G., …Rodrigues, J. (2020)
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT using Matching Market and Signcryption. IEEE Transactions on Vehicular Technology, 69(7), 7707-7722. https://doi.org/10.1109/tvt.2020.2989817
The present world of vehicle technology is inclined to develop Electric Vehicles (EVs) with various optimized features. These vehicles need frequent charging which takes a lon...

Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

Journal Article
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020)
Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation. Forensic Science International: Digital Investigation, 33, https://doi.org/10.1016/j.fsidi.2020.300979
Ransomware continues to grow in both scale, cost, complexity and impact since its initial discovery nearly 30 years ago. Security practitioners are engaged in a continual "arm...

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure

Journal Article
Kim, T., Kumar, G., Saha, R., Alazab, M., Buchanan, W. J., Rai, M. K., …Thomas, R. (2020)
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access, 8, 94748-94756. https://doi.org/10.1109/access.2020.2995443
The increasing number of devices in the age of Internet-of-Thing (IoT) has arisen a number of problems related to security. Cryptographic processes, more precisely the signatu...

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect

Journal Article
Kim, T., Kumar, G., Saha, R., Rai, M. K., Buchanan, W. J., Thomas, R., & Alazab, M. (2020)
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access, 8, 96455-96467. https://doi.org/10.1109/access.2020.2995481
Blockchain is a technology used with the series of users in peer-to-peer transactions to utilize the usability properties of the immutable data records. The distributed nature...

A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos

Journal Article
Masood, F., Boulila, W., Ahmad, J., Arshad, A., Sankar, S., Rubaiee, S., & Buchanan, W. J. (2020)
A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos. Remote Sensing, 12(11), https://doi.org/10.3390/rs12111893
Aerial photography involves capturing images from aircraft and other flying objects, including Unmanned Aerial Vehicles (UAV). Aerial images are used in many fields and can co...

Protecting mobile agents from external replay attacks

Journal Article
Garrigues, C., Migas, N., Buchanan, W., Robles, S., & Borrell, J. (2009)
Protecting mobile agents from external replay attacks. Journal of Systems and Software, 82(2), 197-206. https://doi.org/10.1016/j.jss.2008.05.018
This paper presents a protocol for the protection of mobile agents against external replay attacks. This kind of attacks are performed by malicious platforms when dispatching ...

Radio frequency identification (RFID) in pervasive healthcare

Journal Article
Fekri, A. H., Thuemmler, C., Buchanan, W., Fekri, H., & Lawson, A. (2009)
Radio frequency identification (RFID) in pervasive healthcare. International Journal of Healthcare Technology and Management, 10(1/2), 119. doi:10.1504/ijhtm.2009.023731
Active and passive RFID (Radio Frequency Identification) technology are available and licensed for the use in hospitals, and can be used to establish highly reliable pervasive...