Research explorer tool

7 results

Cryptographic privacy-preserving enhancement method for investigative data acquisition

Thesis
Kwecka, Z. (2011)
Cryptographic privacy-preserving enhancement method for investigative data acquisition. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4437
The current processes involved in the acquisition of investigative data from third parties, such as banks, Internet Service Providers (ISPs) and employers, by the public autho...

Making assessment and feedback fun: feedback before and after assessments.

Presentation / Conference
Buchanan, W. J. (2011, January)
Making assessment and feedback fun: feedback before and after assessments. Paper presented at Edinburgh Napier University Staff Conference, Edinburgh Napier University
Multiple Choice Questions (MCQs) are often seen as being weak in terms of their coverage, and are criticised for often only assessing knowledge and not encouraging deep learni...

5G - What architecture to serve vertical industry

Presentation / Conference
Thuemmler, C. (2017, May)
5G - What architecture to serve vertical industry. Presented at IEEE ICC 2017, Paris
5G offers the promise to dynamically satisfy a multiplicity of concurrent requirements originating from various business models of vertical industries. The 5G PPP has publishe...

A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments

Thesis
Pallis, G. (2010)
A comparative study of in-band and out-of-band VOIP protocols in layer 3 and layer 2.5 environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/4005
For more than a century the classic circuit-switched telephony in the form of PSTN (Public Service Telephone Network) has dominated the world of phone communications (Varshney...

Patent: Improvements in or relating to digital forensics.

Patent
Buchanan, W. J., Graves, J. & Bose, N. (2009)
Patent: Improvements in or relating to digital forensics.
WO 2010029346 20100318 IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS The present disclosure relates to improvements in or relating to digital forensics, and in particular...

On privacy aware carriers for value-possessed e-invoices considering intelligence mining

Journal Article
Cha, S., Wang, H., Tan, Z., Joung, Y., Tseng, Y., & Yeh, K. (in press)
On privacy aware carriers for value-possessed e-invoices considering intelligence mining. IEEE Transactions on Emerging Topics in Computational Intelligence, https://doi.org/10.1109/TETCI.2019.2938547
Intelligence mining is one of the most promising technologies for effectively extracting intelligence (and knowledge) to enhance the quality of decision-making. In Taiwan, the...

When amateurs do the job of a professional, the result is smart grids secured by dumb crypto.

Other
Buchanan, W. J. (2015)
When amateurs do the job of a professional, the result is smart grids secured by dumb crypto
Security relies upon good programming and correct adherence to well-designed standards. If the standards are sloppy, then security has been compromised from the outset. Smart ...