Skip to main content

Research Repository

Advanced Search

All Outputs (33)

Privacy-preserving Surveillance Methods using Homomorphic Encryption (2020)
Presentation / Conference Contribution
Bowditch, W., Abramson, W., Buchanan, W. J., Pitropakis, N., & Hall, A. J. (2020, February). Privacy-preserving Surveillance Methods using Homomorphic Encryption. Presented at 6th International Conference on Information Security Systems and Privacy (ICISSP), Valletta, Malta

Data analysis and machine learning methods often involve the processing of cleartext data, and where this could breach the rights to privacy. Increasingly, we must use encryption to protect all states of the data: in-transit, at-rest, and in-memory.... Read More about Privacy-preserving Surveillance Methods using Homomorphic Encryption.

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach (2020)
Presentation / Conference Contribution
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020, February). Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. Presented at ICISSP 2020, Valletta, Malta

Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be awa... Read More about Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach.

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020, November). PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. Presented at 4th International Conference on Vision, Image and Signal Processing, Newcastle, UK

The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism.

Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing (2020)
Journal Article
Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., Haynes, D., Pitropakis, N., & Papadopoulos, P. (2020). Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing. Frontiers in Communications and Networks, https://doi.org/10.3389/frcmn.2020.583376

The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking. Many nations of the world have therefore, developed their own ways... Read More about Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing.

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism (2020)
Presentation / Conference Contribution
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020, December). PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. Presented at ICVISP 2020: The 2020 4th International Conference on Vision, Image and Signal Processing, Bangkok

The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ethereum, among many others. Nevertheless, the concept has received criticisms o... Read More about PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism.

Recent Advances and Trends in Lightweight Cryptography for IoT Security (2020)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., & Buchanan, W. J. (2020, November). Recent Advances and Trends in Lightweight Cryptography for IoT Security. Presented at 2020 16th International Conference on Network and Service Management (CNSM), Izmir, Turkey

Lightweight cryptography is a novel diversion from conventional cryptography to minimise its high level of resource requirements, thus it would impeccably fit in the internet-of-things (IoT) environment. The IoT platform is constrained in terms of ph... Read More about Recent Advances and Trends in Lightweight Cryptography for IoT Security.

A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric (2020)
Journal Article
Stamatellis, C., Papadopoulos, P., Pitropakis, N., Katsikas, S., & Buchanan, W. J. (2020). A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric. Sensors, 20(22), Article 6587. https://doi.org/10.3390/s20226587

Electronic health record (EHR) management systems require the adoption of effective technologies when health information is being exchanged. Current management approaches often face risks that may expose medical record storage solutions to common sec... Read More about A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric.

Towards Continuous User Authentication Using Personalised Touch-Based Behaviour (2020)
Presentation / Conference Contribution
Aaby, P., Giuffrida, M. V., Buchanan, W. J., & Tan, Z. (2020, August). Towards Continuous User Authentication Using Personalised Touch-Based Behaviour. Presented at CyberSciTech 2020, Calgary, Canada

In this paper, we present an empirical evaluation of 30 features used in touch-based continuous authentication. It is essential to identify the most significant features for each user, as behaviour is different amongst humans. Thus, a fixed feature s... Read More about Towards Continuous User Authentication Using Personalised Touch-Based Behaviour.

Fast Probabilistic Consensus with Weighted Votes (2020)
Presentation / Conference Contribution
Müller, S., Penzkofer, A., Ku´smierz, B., Camargo, D., & Buchanan, W. J. (2020, November). Fast Probabilistic Consensus with Weighted Votes. Presented at FTC 2020 - Future Technologies Conference 2020, Vancouver, Canada

The fast probabilistic consensus (FPC) is a voting consensus protocol that is robust and efficient in Byzantine infrastructure. We propose an adaption of the FPC to a setting where the voting power is proportional to the nodes reputations. We model t... Read More about Fast Probabilistic Consensus with Weighted Votes.

BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond (2020)
Journal Article
Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (2021). BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond. IEEE Internet of Things, 8(5), 3915-3929. https://doi.org/10.1109/jiot.2020.3025953

The outbreak of COVID-19 pandemic has exposed an urgent need for effective contact tracing solutions through mobile phone applications to prevent the infection from spreading further. However, due to the nature of contact tracing, public concern on p... Read More about BeepTrace: Blockchain-enabled Privacy-preserving Contact Tracing for COVID-19 Pandemic and Beyond.

A Distributed Trust Framework for Privacy-Preserving Machine Learning (2020)
Presentation / Conference Contribution
Abramson, W., Hall, A. J., Papadopoulos, P., Pitropakis, N., & Buchanan, W. J. (2020, September). A Distributed Trust Framework for Privacy-Preserving Machine Learning. Presented at The 17th International Conference on Trust, Privacy and Security in Digital Business - TrustBus2020, Bratislava, Slovakia

When training a machine learning model, it is standard procedure for the researcher to have full knowledge of both the data and model. However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluct... Read More about A Distributed Trust Framework for Privacy-Preserving Machine Learning.

FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures (2020)
Journal Article
Popov, S., & Buchanan, W. J. (2021). FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures. Journal of Parallel and Distributed Computing, 147, 77-86. https://doi.org/10.1016/j.jpdc.2020.09.002

This paper presents a novel leaderless protocol (FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures) with a low communicational complexity and which allows a set of nodes to come to a consensus on a value of a single bit. The paper... Read More about FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures.

DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption (2020)
Journal Article
Khan, J. S., Boulila, W., Ahmad, J., Rubaiee, S., Rehman, A. U., Alroobaea, R., & Buchanan, W. J. (2020). DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption. IEEE Access, 8, 159732-159744. https://doi.org/10.1109/access.2020.3020917

Visual selective image encryption can both improve the efficiency of the image encryption algorithm and reduce the frequency and severity of attacks against data. In this article, a new form of encryption is proposed based on keys derived from Deoxyri... Read More about DNA and Plaintext Dependent Chaotic Visual Selective Image Encryption.

Trust-based Ecosystem to Combat Fake News (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020, May). Trust-based Ecosystem to Combat Fake News. Presented at 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON, Canada

The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to combat the flow of fake news. This paper attempts to resolves some of the aspe... Read More about Trust-based Ecosystem to Combat Fake News.

Privacy-Preserving Passive DNS (2020)
Journal Article
Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-Preserving Passive DNS. Computers, 9(3), Article 64. https://doi.org/10.3390/computers9030064

The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global... Read More about Privacy-Preserving Passive DNS.

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies (2020)
Presentation / Conference Contribution
Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020). TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC 2020) (1215-1220)

The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about politics, economics, relationships, needs and wants. This is because of th... Read More about TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies.

Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution (2020)
Journal Article
Qayyum, A., Ahmad, J., Boulila, W., Rubaiee, S., Arshad, Masood, F., Khan, F., & Buchanan, W. J. (2020). Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution. IEEE Access, 8, 140876-140895. https://doi.org/10.1109/access.2020.3012912

The evolution of wireless and mobile communication from 0G to the upcoming 5G gives riseto data sharing through the Internet. This data transfer via open public networks are susceptible to severaltypes of attacks. Encryption is a method that can prot... Read More about Chaos-Based Confusion and Diffusion of Image Pixels Using Dynamic Substitution.

Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust (2020)
Preprint / Working Paper
Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020). Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow

On December 31st, 2019, the World Health Organisation received a report from the Chinese government detailing a cluster of cases of ‘pneumonia of unknown origin’, later identified as novel coronavirus. The virus, now referred to as COVID-19, quickly... Read More about Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust.

5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum (2020)
Presentation / Conference Contribution
Khan, J. S., Tahir, A., Ahmad, J., Shah, S. A., Abbasi, Q. H., Russell, G., & Buchanan, W. (2020, July). 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum. Presented at 2020 Computing Conference, London

Freezing of gait (FOG) is one of the most incapacitating and disconcerting symptom in Parkinson's disease (PD). FOG is the result of neural control disorder and motor impairments, which severely impedes forward locomotion. This paper presents the exp... Read More about 5G-FOG: Freezing of Gait Identification in Multi-Class Softmax Neural Network Exploiting 5G Spectrum.

Decentralized Accessibility of e-commerce Products through Blockchain Technology (2020)
Journal Article
Kumar, G., Saha, R., Buchanan, W. J., Geetha, G., Thomas, R., Rai, M. K., Kim, T., & Alazab, M. (2020). Decentralized Accessibility of e-commerce Products through Blockchain Technology. Sustainable Cities and Society, 62, Article 102361. https://doi.org/10.1016/j.scs.2020.102361

A distributed and transparent ledger system is considered for various \textit{e}-commerce products including health medicines, electronics, security appliances, food products and many more to ensure technological and e-commerce sustainability. This s... Read More about Decentralized Accessibility of e-commerce Products through Blockchain Technology.