Skip to main content

Research Repository

Advanced Search

Outputs (61)

Harnessing Blockchain: a Framework for Sustainable Reverse Supply Chain Optimization (2025)
Presentation / Conference Contribution
Ahmed, E., Ghaleb, B., Jan, S. U., Ahmad, J., Abubakar, M., & Al-Dubai, A. (2025, July). Harnessing Blockchain: a Framework for Sustainable Reverse Supply Chain Optimization. Presented at 2025 16th International Conference on Information and Communication Systems (ICICS), Irbid, Jordan

Vehicle recalls in the UK have surged in recent years, necessitating efficient and secure management of safety concerns by the Driver and Vehicle Standards Agency (DVSA) in partnership with manufacturers. The DVSA currently relies on traditional cent... Read More about Harnessing Blockchain: a Framework for Sustainable Reverse Supply Chain Optimization.

Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices (2025)
Journal Article
Baird, I., Wadhaj, I., Ghaleb, B., Thomson, C., & Russell, G. (2025). Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices. IoT, 6(3), Article 40. https://doi.org/10.3390/iot6030040

The rapid expansion of Internet of Things (IoT) devices has heightened the demand for lightweight and secure cryptographic mechanisms suitable for resource-constrained environments. While SHA-256 remains a widely used standard, the emergence of SHA-3... Read More about Evaluating the Energy Costs of SHA-256 and SHA-3 (KangarooTwelve) in Resource-Constrained IoT Devices.

A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols (2025)
Journal Article
Alahmadi, H., Bouabdallah, F., Al-Dubai, A., Ghaleb, B., Hussain, A., Chamola, V., Hawbani, A., Zhao, L., & Yu, R. (in press). A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols. Communications Surveys and Tutorials,

Long Range (LoRa) networks have emerged as a vital solution catering to applications requiring coverage over relatively long distances in the world of Internet of Things (IoT), where connectivity and efficient data transmission are paramount. LoRa’s... Read More about A Survey on LoRaWAN MAC Schemes: From Conventional Solutions To AI-driven Protocols.

Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE (2025)
Presentation / Conference Contribution
Faneela, Ahmad, J., Ghaleb, B., Jan, S. U., & Buchanan, W. J. (2025, April). Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE. Presented at 2025 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan

The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) enables computation on encrypted data while maintaining p... Read More about Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE.

A Blockchain-Based Secure Data-Sharing Framework for Automotive Supply Chains: Enhancing Privacy with Attribute-Based Encryption (2025)
Presentation / Conference Contribution
Ahmed, E., Ghaleb, B., Abubakar, M., & Jan, S. U. (2025, April). A Blockchain-Based Secure Data-Sharing Framework for Automotive Supply Chains: Enhancing Privacy with Attribute-Based Encryption. Presented at 2025 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan

Original Equipment Manufacturers (OEMs) encounter significant challenges in facilitating secure and efficient data sharing, as they must strike a delicate balance between maintaining stringent data confidentiality and enabling seamless collaboration... Read More about A Blockchain-Based Secure Data-Sharing Framework for Automotive Supply Chains: Enhancing Privacy with Attribute-Based Encryption.

Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification (2024)
Journal Article
Ghaban, W., Ahmad, J., Siddique, A. A., Alshehri, M. S., Saghir, A., Saeed, F., Ghaleb, B., & Rehman, M. U. (2025). Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification. IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing, 18, 3640-3653. https://doi.org/10.1109/jstars.2024.3522202

Oceans and seas cover more than 70% of the Earth's surface. If compared with the land mass there are a lot of unexplored locations, a wealth of natural resources, and diverse ocean creatures that are inaccessible to us humans. Underwater rovers and v... Read More about Sustainable Environmental Monitoring: Multistage Fusion Algorithm for Remotely Sensed Underwater Super-Resolution Image Enhancement and Classification.

Investigation of brain response to acquisition and learning the second languages based on EEG signals and machine learning techniques (2024)
Journal Article
Aldhaheria, T. A., Kulkarni, S. B., Bhise, P. R., & Ghaleb, B. (2024). Investigation of brain response to acquisition and learning the second languages based on EEG signals and machine learning techniques. Cogent Arts & Humanities, 11(1), Article 2416759. https://doi.org/10.1080/23311983.2024.2416759

Brain-computer interfaces (BCI) and neurolinguistics have become vital areas of scientific inquiry, focusing on neural mechanisms in language acquisition. While studies have examined brain activity during language learning, there’s a need for validat... Read More about Investigation of brain response to acquisition and learning the second languages based on EEG signals and machine learning techniques.

DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof (2024)
Presentation / Conference Contribution
Kasimatis, D., Grierson, S., Buchanan, W. J., Eckl, C., Papadopoulos, P., Pitropakis, N., Chrysoulas, C., Thomson, C., & Ghaleb, B. (2024, September). DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof. Presented at 2024 IEEE International Conference on Cyber Security and Resilience (CSR), London, UK

Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper de... Read More about DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof.

Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains (2024)
Journal Article
Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., & Buchanan, W. J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13(17), Article 3467. https://doi.org/10.3390/electronics13173467

In the evolving landscape of the Internet of Things (IoT), ensuring the security and integrity of data transmission remains a paramount challenge. Routing Protocol for Low-Power and Lossy Networks (RPL) is commonly utilized in IoT networks to facili... Read More about Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains.

Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs) (2024)
Journal Article
Baird, I., Wadhaj, I., Ghaleb, B., & Thomson, C. (2024). Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs). Electronics, 13(16), Article 3314. https://doi.org/10.3390/electronics13163314

Mobile ad hoc networks (MANETs) offer a decentralized communication solution ideal for infrastructure-less environments like disaster relief zones. However, their inherent lack of central control and dynamic topology make them vulnerable to attacks.... Read More about Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs).