Skip to main content

Research Repository

Advanced Search

All Outputs (27)

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). https://doi.org

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching (2022)
Presentation / Conference Contribution
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2021, December). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. Presented at 14th International Conference on Security of Information and Networks,

The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructur... Read More about PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Presentation / Conference Contribution
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., Domalis, G., Karacapilidis, N., Tsakalidis, D., & Tsolis, D. (2021, October). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. Presented at 7th

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports (2022)
Presentation / Conference Contribution
Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2022). A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports. In UCC '21: Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. https://doi.or

Digital vaccination passports are being proposed by various governments internationally. Trust, scalability and security are all key challenges in implementing an online vaccine passport. Initial approaches attempt to solve this problem by using cent... Read More about A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports.

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT (2021)
Presentation / Conference Contribution
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021). Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205)

Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel appr... Read More about Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT.

Identifying Vulnerabilities Using Internet-wide Scanning Data (2019)
Presentation / Conference Contribution
O'Hare, J., Macfarlane, R., & Lo, O. (2019). Identifying Vulnerabilities Using Internet-wide Scanning Data. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (1-10). https://doi.org/10.1109/ICGS3.2019.868801

Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provided through associated websites. The Internet-wide scanning data can be used... Read More about Identifying Vulnerabilities Using Internet-wide Scanning Data.

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018)
Presentation / Conference Contribution
Lo, O., Buchanan, W. J., & Carson, D. (2018). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. https://doi.org/10.1145/3

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing a... Read More about Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.

Secret shares to protect health records in Cloud-based infrastructures (2016)
Presentation / Conference Contribution
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Servi

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Presentation / Conference Contribution
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015, August). RESCUE: Resilient Secret Sharing Cloud-based Architecture. Presented at TrustCom 2015 The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Commu

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

A scaleable and trusted e-Health eco-system: safi.re (2013)
Presentation / Conference Contribution
Buchanan, W. J., Burns, N., Lo, O., Lewis, R., Uthmani, O., & Fan, L. (2013, April). A scaleable and trusted e-Health eco-system: safi.re. Paper presented at Cyber Security and Privacy EU Forum 2013

At present most health and social care systems do not have extendable trust and governance. This presentation outlines the safi.re architecture which uses three main components: a trust framework; governance rules; and strong access controls. The sys... Read More about A scaleable and trusted e-Health eco-system: safi.re.

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012). Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Towards simulation of patient data for evaluation of E-health platform and services. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., Thuemmler, C., & Lawson, A. (2012, June). Towards simulation of patient data for evaluation of E-health platform and services. Paper presented at 13th Annual Post Graduate Symposium on the Convergence of Telecommunication

This paper presents the design and implementation of the Patient Simulator, a software application used for the simulation of patient data. The simulator aims to evaluate e- Health platforms and services in regards to efficiency, reliability, securit... Read More about Towards simulation of patient data for evaluation of E-health platform and services..

Information sharing around child protection. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Uthmani, O., Lewis, R., Steyven, A., Fan, L., Thuemmler, C., …Lawson, A. (2012, June). Information sharing around child protection. Paper presented at Information Sharing in the Public Sector

Background This presentation focuses on creating a scaleable, robust and secure information architecture for social and health care. At its core is the sa.FIRE (Secure Analysis and FIltering Risk Engine) architecture, which uses SPoC (Single Point of... Read More about Information sharing around child protection..

Cloud4Health. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., & Lo, O. (2012, May). Cloud4Health. Paper presented at Symposium on the Future of e-Health

The cloud4health platform focuses on creating a next generation infrastructure which aims to integrate assisted living with primary and secondary health care, in order to reduce patient risks. This presentation outlines how it integrates assisted liv... Read More about Cloud4Health..

Integrating assisted living with primary and secondary health care. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., Uthmani, O., & Thuemmler, C. (2012, May). Integrating assisted living with primary and secondary health care. Paper presented at Data Handling in Health and Social Care: Striking the balance between confiden

This presentation outlines the Cloud4Health platform.

Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February). Case Study: moving towards an e-health platform to store NHS patient Information in the cloud. Paper presented at Cloud Computing in the Public Sector: The Way Forward

Case Study: Moving Towards an e-health Platform to Store NHS Patient Information in the Cloud The NHS pilot scheme to store patient information in the Cloud How can the health sector can gain greater value from its infrastructure by moving services i... Read More about Case Study: moving towards an e-health platform to store NHS patient Information in the cloud..

Patient centric health care: an integrated and secure, cloud-based, e-Health platform. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Ekonomou, E., Lo, O., & Thuemmler, C. (2012, February). Patient centric health care: an integrated and secure, cloud-based, e-Health platform. Paper presented at BCS Branch Meeting

There are many issues related to health care infrastructure within the UK, including the lack of integration of data between the different parts of the health and social care system, and around an aging population. This presentation outlines a new Cl... Read More about Patient centric health care: an integrated and secure, cloud-based, e-Health platform..