Skip to main content

Research Repository

Advanced Search

Outputs (26)

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing.

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Trust-based Ecosystem to Combat Fake News (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020, May). Trust-based Ecosystem to Combat Fake News. Presented at 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada

The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to combat the flow of fake news. This paper attempts to resolves some of the aspe... Read More about Trust-based Ecosystem to Combat Fake News.

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020). TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC 2020) (1215-1220)

The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships, needs and wants. This is because of th... Read More about TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Ghaleb, B., & Buchanan, W. J. (2020). SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. . https://doi.org/10.1109/icsa-c50368.2020.00034

The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This paper introduces SklCoin, a new Byzantine consensus protocol and its correspon... Read More about SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain.

Jabber-based cross-domain efficient and privacy-ensuring context management framework. (2013)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2013). Jabber-based cross-domain efficient and privacy-ensuring context management framework. International Journal of Advanced Computer Science and Applications, 4, 84

In pervasive environments, context-aware applications require a global knowledge of the context information distributed in different spatial domains in order to establish context-based interactions. Therefore, the design of distributed storage, retri... Read More about Jabber-based cross-domain efficient and privacy-ensuring context management framework..

An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments (2012)
Thesis
Jaroucheh, Z. An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments. (Thesis). Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/id/eprint/5348

The concept of context-awareness is widely used in mobile and pervasive computing to reduce explicit user input and customization through the increased use of implicit input. It is considered to be the corner stone technique for developing pervasive... Read More about An approach to cross-domain situation-based context management and highly adaptive services in pervasive environments.

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications (2011)
Presentation / Conference Contribution
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011). Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), (351-355). ht

Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context information is naturally distributed among different spatial or logical domains. Ma... Read More about Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications.

An approach to domain-based scalable context management architecture in pervasive environments (2011)
Journal Article
Jaroucheh, Z., Liu, X., & Smith, S. (2012). An approach to domain-based scalable context management architecture in pervasive environments. Personal and Ubiquitous Computing, 16(6), 741-755. https://doi.org/10.1007/s00779-011-0422-0

In pervasive environments, context management systems are expected to administrate large volume of contextual information that is captured from spatial to nonspatial elements. Research in context-aware computing produced a number of middleware system... Read More about An approach to domain-based scalable context management architecture in pervasive environments.