Skip to main content

Research Repository

Advanced Search

All Outputs (16)

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher (2022)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022). Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). https://doi.org/10.1109/CSP55486.2022.00018

Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offers smaller cryptographic primitives such as shorter key sizes, block sizes... Read More about Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher.

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching (2022)
Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138

The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up with a test. The key entities involved within a contact tracing infrastructur... Read More about PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching.

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS (2022)
Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022). GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3

The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks.... Read More about GLASS: Towards Secure and Decentralized eGovernance Services using IPFS.

A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports (2022)
Conference Proceeding
Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2022). A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports. In UCC '21: Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. https://doi.org/10.1145/3492323.3495626

Digital vaccination passports are being proposed by various governments internationally. Trust, scalability and security are all key challenges in implementing an online vaccine passport. Initial approaches attempt to solve this problem by using cent... Read More about A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports.

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT (2021)
Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021). Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205)

Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associated with cryptographic functions. Lightweight cryptography is a novel appr... Read More about Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT.

Identifying Vulnerabilities Using Internet-wide Scanning Data (2019)
Conference Proceeding
O'Hare, J., Macfarlane, R., & Lo, O. (2019). Identifying Vulnerabilities Using Internet-wide Scanning Data. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (1-10). https://doi.org/10.1109/ICGS3.2019.8688018

Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provided through associated websites. The Internet-wide scanning data can be used... Read More about Identifying Vulnerabilities Using Internet-wide Scanning Data.

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device (2018)
Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018). Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Security. https://doi.org/10.1145/3230833.3232801

Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consumption or processing power is limited. Thus, there has been an increasing a... Read More about Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device.

Secret shares to protect health records in Cloud-based infrastructures (2016)
Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016). Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom). https://doi.org/10.1109/HealthCom.2015.7454589

Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This paper outlines a novel Cloud-based architecture (SECRET) which supports keyl... Read More about Secret shares to protect health records in Cloud-based infrastructures.

RESCUE: Resilient Secret Sharing Cloud-based Architecture. (2015)
Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015). RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1 (872-879). https://doi.org/10.1109/Trustcom.2015.459

This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without user’s intervention; and break-glass data recovery, with in-built failover pro... Read More about RESCUE: Resilient Secret Sharing Cloud-based Architecture..

Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. (2013)
Conference Proceeding
Buchanan, W. J., Uthmani, O., Fan, L., Burns, N., Lo, O., Lawson, A., …Anderson, C. (2013). Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture. In M. Felici (Ed.), Cyber Security and Privacy (91-101). https://doi.org/10.1007/978-3-642-41205-9_8

We live in a world where trust relationships are becoming ever more important. This paper outlines how an architecture which abstracts these relationships between domains, organisations and units, into a formal definition, and then implement these as... Read More about Modelling of integrated trust, governance and access safi.re: Information Sharing Architecture..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Conference Proceeding
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Technical evaluation of an e-health platform. (2012)
Conference Proceeding
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012). Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

DACAR platform for eHealth services cloud. (2011)
Conference Proceeding
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

Information sharing framework: next generation e-Health cloud. (2010)
Conference Proceeding
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010). Information sharing framework: next generation e-Health cloud.

This presentation outlines the novel e-Health Cloud. See: http://www.soc.napier.ac.uk/~bill/e_presentations/healthcloud01/healthcloud01.html

An e-Health cloud. (2010)
Conference Proceeding
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010). An e-Health cloud.

A significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security (190-200)

There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.