Skip to main content

Research Repository

Advanced Search

Prof Bill Buchanan's Outputs (410)

FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures (2020)
Journal Article
Popov, S., & Buchanan, W. J. (2021). FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures. Journal of Parallel and Distributed Computing, 147, 77-86. https://doi.org/10.1016/j.jpdc.2020.09.002

This paper presents a novel leaderless protocol (FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures) with a low communicational complexity and which allows a set of nodes to come to a consensus on a value of a single bit. The paper... Read More about FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures.

Performance Evaluation of Threshold Signing Schemes in Cryptography (2025)
Presentation / Conference Contribution
Faneela, Ahmad, J., Ghaleb, B., Khan, I. U., Buchanan, W. J., Jan, S. U., & Khan, M. S. (2024, December). Performance Evaluation of Threshold Signing Schemes in Cryptography. Presented at 4th International Conference of Advanced Computing and Informatics (ICACIN 2024), Birmingham, UK

Threshold Signature Scheme (TSS) protocols have gained significant attention over the past Ten years due to their widespread adoption in cryptocurrencies. The adoption is mainly boosted by Gennaro and Goldfedder’s TSS protocol. Since then, various TS... Read More about Performance Evaluation of Threshold Signing Schemes in Cryptography.

RNA-TransCrypt: Image encryption using chaotic RNA encoding, novel transformative substitution, and tailored cryptographic operations (2025)
Presentation / Conference Contribution
Khan, M. S., Ahmad, J., Al-Dubai, A., Ghaleb, B., Pitropakis, N., & Buchanan, W. J. (2023, December). RNA-TransCrypt: Image encryption using chaotic RNA encoding, novel transformative substitution, and tailored cryptographic operations. Presented at Second International Conference on Cybersecurity, Cybercrimes, and Smart Emerging Technologies (CCSET 2023), Riyadh, Saudi Arabia

Given the security concerns of Internet of Things (IoT) networks and limited computational resources of IoT devices, this paper presents RNA-TransCrypt, a novel image encryption scheme that is not only highly secure but also efficient and lightweight... Read More about RNA-TransCrypt: Image encryption using chaotic RNA encoding, novel transformative substitution, and tailored cryptographic operations.

Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey (2025)
Journal Article
Saeed, U., Jan, S. U., Ahmad, J., Shah, S. A., Alshehri, M. S., Ghadi, Y. Y., Pitropakis, N., & Buchanan, W. J. (2026). Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey. Expert Systems with Applications, 296(B), Article 128978. https://doi.org/10.1016/j.eswa.2025.128978

Anomaly Detection (AD) is an important area of research because it helps identify outliers in data, enabling early detection of errors, fraud, and potential security breaches. Machine Learning (ML) can be utilized for distinct AD systems, and Generat... Read More about Generative Adversarial Networks-enabled Anomaly Detection Systems: A Survey.

Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices (2025)
Journal Article
Patterson, J. C., Buchanan, W. J., & Turino, C. (2025). Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices. Journal of Cybersecurity and Privacy, 5(3), Article 42. https://doi.org/10.3390/jcp5030042

The emergence of quantum computing and Shor's algorithm necessitates an imminent shift from current public key cryptography techniques to post-quantum-robust techniques. The NIST has responded by standardising Post-Quantum Cryptography (PQC) algorith... Read More about Energy Consumption Framework and Analysis of Post-Quantum Key-Generation on Embedded Devices.

Privacy-aware White and Black List Searching for Fraud Analysis (2025)
Presentation / Conference Contribution
Buchanan, W. J., Gilchrist, J., Jaroucheh, Z., Timosenko, D., Ramchandani, N., & Ali, H. (2025, September). Privacy-aware White and Black List Searching for Fraud Analysis. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In many areas of cybersecurity, we require access to Personally Identifiable Information (PII), such as names, postal addresses and email addresses. Unfortunately, this can lead to data breaches, especially in relation to data compliance regulations... Read More about Privacy-aware White and Black List Searching for Fraud Analysis.

Anamorphic Cryptography using Baby-Step Giant-Step Recovery (2025)
Presentation / Conference Contribution
Buchanan, W. J., & Gilchrist, J. (2025, September). Anamorphic Cryptography using Baby-Step Giant-Step Recovery. Presented at 14th International Conference on Cryptography and Information Security, Copenhagen, Denmark

In 2022, Persianom, Phan and Yung outlined the creation of Anamor-phic Cryptography. With this, we can create a public key to encrypt data, and then have two secret keys. These secret keys are used to decrypt the cipher into different messages. So, o... Read More about Anamorphic Cryptography using Baby-Step Giant-Step Recovery.

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing (2025)
Journal Article
Ali, H., Buchanan, W. J., Ahmad, J., Abubakar, M., Khan, M. S., & Wadhaj, I. (2025). TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing. Future Internet, 17(7), Article 289. https://doi.org/10.3390/fi17070289

We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries. Leveraging Hyperledger Fabric, the architecture suppo... Read More about TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing.

Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption (2025)
Journal Article
Buchanan, W. J., & Ali, H. (2025). Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption. Cryptography, 9(2), Article 33. https://doi.org/10.3390/cryptography9020033

The requirement for privacy-aware machine learning increases as we continue to use PII (personally identifiable information) within machine training. To overcome the existing privacy issues, we can apply fully homomorphic encryption (FHE) to encrypt... Read More about Evaluation of Privacy-Preserving Support Vector Machine (SVM) Learning Using Homomorphic Encryption.

Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE (2025)
Presentation / Conference Contribution
Faneela, Ahmad, J., Ghaleb, B., Jan, S. U., & Buchanan, W. J. (2025, April). Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE. Presented at 2025 International Conference on New Trends in Computing Sciences (ICTCS), Amman, Jordan

The rapid growth of cloud computing and data-driven applications has amplified privacy concerns, driven by the increasing demand to process sensitive data securely. Homomorphic encryption (HE) enables computation on encrypted data while maintaining p... Read More about Cross-Platform Benchmarking of the FHE Libraries: Novel Insights into SEAL and OpenFHE.

Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems (2025)
Presentation / Conference Contribution
Korac, S., Maglaras, L., Moradpoor, N., Kioskli, K., Buchanan, W., & Canberk, B. (2025, June). Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems. Presented at IEEE DCOSS-IoT 2025, Tuscany (Lucca), Italy

Ransomware has been predominantly a threat to Windows systems. But, Linux systems became interesting for cybercriminals and this trend is expected to continue. This endangers IoT ecosystems, whereas many IoT systems are based on Linux (e.g. cloud inf... Read More about Ransomware: Analysis and Evaluation of Live Forensic Techniques and the Impact on Linux Based IoT Systems.

vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election (2025)
Presentation / Conference Contribution
Elnour, S., Buchanan, W. J., Keating, P., Abubakar, M., & Elnour, S. (2024, June). vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election. Presented at Cyber Science 2024, Edinburgh

The vSPACE experimental proof-of-concept (PoC) on a TrueElect extended protocol presents a novel approach to secure, private, and scalable elections, extending the TrueElect and other related protocols with the integration of Self-Sovereign Identity... Read More about vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election.

Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0 (2025)
Presentation / Conference Contribution
Connell, J., Kasimatis, D., Papadopoulos, P., Buchanan, W. J., Sarigiannidis, P., & Pitropakis, N. (2024, June). Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0. Presented at International Conference on Cybersecurity, Situational Awareness and Social Media (Cyber Science 2024), Edinburgh, UK

Recent instances have brought to light the inherent vulnerability of the manufacturing sector to cyber security threats, particularly within the food and beverage industries. With the rapid adoption of Industry 4.0, supply chains are exposed to an ex... Read More about Towards a Secure Manufacturing Framework for Single Malt Whisky in Industry 4.0.

LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts (2025)
Journal Article
Kumar, G., Saha, R., Conti, M., & Buchanan, W. J. (2025). LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Transactions on Services Computing, 18(3), 1529-1542. https://doi.org/10.1109/tsc.2025.3562323

Smart contracts are integral to decentralized systems like blockchains and enable the automation of processes through programmable conditions. However, their immutability, once deployed, poses challenges when addressing errors or bugs. Existing solut... Read More about LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts.

Post-Quantum Migration of the Tor Application (2025)
Journal Article
Berger, D., Lemoudden, M., & Buchanan, W. J. (2025). Post-Quantum Migration of the Tor Application. Journal of Cybersecurity and Privacy, 5(2), Article 13. https://doi.org/10.3390/jcp5020013

The efficiency of Shor's and Grover's algorithms and the advancement of quantum computers implies that the cryptography used until now to protect one's privacy is potentially vulnerable to retrospective decryption, also known as the harvest now, decr... Read More about Post-Quantum Migration of the Tor Application.

Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques (2025)
Journal Article
Konstantinou, A., Kasimatis, D., Buchanan, W. J., Ullah Jan, S., Ahmad, J., Politis, I., & Pitropakis, N. (2025). Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques. Machine Learning and Knowledge Extraction, 7(2), Article 31. https://doi.org/10.3390/make7020031

This paper explores the potential use of Large Language Models (LLMs), such as ChatGPT, Google Gemini, and Microsoft Copilot, in threat hunting, specifically focusing on Living off the Land (LotL) techniques. LotL methods allow threat actors to blend... Read More about Leveraging LLMs for Non-Security Experts in Threat Hunting: Detecting Living off the Land Techniques.

Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform (2025)
Presentation / Conference Contribution
Batool, F., Kureshi, N., Marie, R. R., Ahmad, F., Khan, M. S., Lemoudden, M., Buchanan, W. J., & Ahmad, J. (2024, June). Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform. Presented at 4th International Conference on Intelligent Systems and Pattern Recognition, Istanbul, Turkey

In the era of rapid digitization and extensive data exchange, security of transmitted data has become a significant concern. To overcome this issue, this paper proposes an image encryption scheme comprising of the integration of multiple chaotic maps... Read More about Image Encryption in Frequency Domain Using Hybrid Chaotic Maps, Hashing, and Lifting Wavelet Transform.

A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification (2025)
Presentation / Conference Contribution
Abubakar, M. A., Onyeashie, B. I., Wadhaj, I., Leimich, P., Ali, H., & Buchanan, W. J. (2024, November). A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification. Presented at 6th International Conference on Blockchain Computing and Applications (BCCA 2024), Dubai, UAE

This study provides a comprehensive overview of blockchain technology, discusses its characteristics, and explains the hierarchical structure of the blockchain. Additionally, the study provides an in-depth analysis of various security threats and vul... Read More about A Systematic Review of the Blockchain Technology Security Challenges and Threats Classification.

Quantum agents (2025)
Preprint / Working Paper
Sultanow, E., Tehrani, M., Dutta, S., Buchanan, W. J., & Khan, S. (2025). Quantum agents

This paper explores the intersection of quantum computing and agentic AI by examining how quantum technologies can enhance the capabilities of autonomous agents, and, conversely, how agentic AI can support the advancement of quantum systems. We analy... Read More about Quantum agents.

Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode (2024)
Presentation / Conference Contribution
Buchanan, W., Grierson, S., & Uribe, D. (2024, February). Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode. Presented at 10th International Conference on Information Systems Security and Privacy, Rome, Italy

Biometric data is often highly sensitive, and a leak of this data can lead to serious privacy breaches. Some of the most sensitive of this type of data relates to the usage of DNA data on individuals. A leak of this type of data without consent could... Read More about Privacy-Aware Single-Nucleotide Polymorphisms (SNPs) Using Bilinear Group Accumulators in Batch Mode.