Skip to main content

Research Repository

Advanced Search

Outputs (9)

Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, September). Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities. Paper presented at 7th International Conference on Security of Information and Networks (SIN 2014)

This presentation will outline some new research related to the Heartbleed vulnerability, and cover the full technical details of the threat, with a live demo. Along with it will show how Heartbleed is detected on networked device, and some new resea... Read More about Complete anatomy of Heartbleed, Truecrypt and large-scale vulnerabilities..

Evaluating Digital Forensic Tools (DFTs). (2014)
Presentation / Conference Contribution
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B., & Smales, A. (2014). Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & Training

This paper outlines the key methods used in the evaluation of digital forensics tools.

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference Contribution
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Discrete Logarithms within Computer and Network Security. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium

As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public... Read More about Discrete Logarithms within Computer and Network Security..

The Risks and Opportunities of Mobile Working within Cloud Environments. (2014)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2014, February). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working

This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mobile devices for business and social uses, and define some best practice me... Read More about The Risks and Opportunities of Mobile Working within Cloud Environments..

Norms and standards in modular medical architectures. (2014)
Presentation / Conference Contribution
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., …Paulin, A. (2014). Norms and standards in modular medical architectures. In 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Heal

Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules... Read More about Norms and standards in modular medical architectures..

Creating engaging and stimulating Web based material (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). Creating engaging and stimulating Web based material. Presented at LTT 2014

This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing

The New Enlightenment in Scotland. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The New Enlightenment in Scotland. Paper presented at Secure Scotland

Scotland, as a nation, has been built on enterprise and innovation, and, at one time, led the world in terms of enlightenment for its scientific and cultural approach. This presentation outlines the current growth of confidence in Scotland as a place... Read More about The New Enlightenment in Scotland..

The future of computer science education and observations from on-line learning. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support

This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career in related areas. Along with this Bill will outline the results of the work... Read More about The future of computer science education and observations from on-line learning..