Skip to main content

Research Repository

Advanced Search

Outputs (167)

Mobile User Authentication System for E-commerce Applications. (2014)
Presentation / Conference Contribution
Molla, R., Romdhani, I., Buchanan, W. J., & Fadel, E. Y. (2014, June). Mobile User Authentication System for E-commerce Applications. Paper presented at International Conference on Advanced Networking, Distributed Systems and Applications 2014

E-commerce applications provide on-line clients and merchants with a quick and convenient way to exchange goods and services. However, the deployment of these applications is still facing many problems such as security threats; and on-line attacks. T... Read More about Mobile User Authentication System for E-commerce Applications..

Discrete Logarithms within Computer and Network Security. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, April). Discrete Logarithms within Computer and Network Security. Presented at Napier 400 - Numerical Algorithms and Intelligent Software Symposium

As we move into an Information Age, the requirement for computer security increases by the day, only in terms of privacy, but also in terms of proving identity and in verifying the integrity of data. Unfortunately many of the most widely used public... Read More about Discrete Logarithms within Computer and Network Security..

The Risks and Opportunities of Mobile Working within Cloud Environments. (2014)
Presentation / Conference Contribution
Buchanan, W. J., & Smales, A. (2014, February). The Risks and Opportunities of Mobile Working within Cloud Environments. Paper presented at Practical Perspectives on Secure Mobile Working

This presentation outlines the changing architecture of business systems, and with the increasing use of Cloud-based systems. It outlines some of the key risks around using mobile devices for business and social uses, and define some best practice me... Read More about The Risks and Opportunities of Mobile Working within Cloud Environments..

Norms and standards in modular medical architectures. (2014)
Presentation / Conference Contribution
Fricker, S., Fiedler, M., Grottland, A., Jell, T., Magedanz, T., Thuemmler, C., Mival, O., Benyon, D., Buchanan, W. J., & Paulin, A. (2013, October). Norms and standards in modular medical architectures. Presented at 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013)

Recent Internet of Things (IoT) research has been aiming at interoperability of devices and the integration of sensor networks. The Future Internet - Private Public Partnership (FI-PPP) has created a whole array of different purpose-oriented modules... Read More about Norms and standards in modular medical architectures..

Creating engaging and stimulating Web based material (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). Creating engaging and stimulating Web based material. Presented at LTT 2014

This presentation outlines the collaboration between Edinburgh Napier University and Bright Red Publishing

The New Enlightenment in Scotland. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The New Enlightenment in Scotland. Paper presented at Secure Scotland

Scotland, as a nation, has been built on enterprise and innovation, and, at one time, led the world in terms of enlightenment for its scientific and cultural approach. This presentation outlines the current growth of confidence in Scotland as a place... Read More about The New Enlightenment in Scotland..

The future of computer science education and observations from on-line learning. (2014)
Presentation / Conference Contribution
Buchanan, W. J. (2014, January). The future of computer science education and observations from on-line learning. Paper presented at Higher Computing Science National Qualifications Support

This session will look at the opportunities at the present time and in the future for Computing, and provide key pointer to the skills that are required to undertake a career in related areas. Along with this Bill will outline the results of the work... Read More about The future of computer science education and observations from on-line learning..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., Varga, J., & Anderson, C. (2013, April). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. Presented at CSP 2013: Cyber Security and Privacy

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs? (2013)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013

Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymität und dami... Read More about Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?.

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..