Skip to main content

Research Repository

Advanced Search

Outputs (682)

Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs? (2013)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., Schafer, B., & Rauhofer, J. (2013). Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?. In INFORMATIK 2013

Technologies, der seine rechtstheoretische Motivation aus einem Verständnis der Privatsphäre als kollektivem Gut gewinnt. In diesem Modell willigen alle Mitglieder einer Gruppe in eine theoretisches Risiko ein, um gegenseitig ihre Anonymität und dami... Read More about Schutz der Anonymität als Gemeinschaftsaufgabe – eine neue Generation von PETs?.

Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, November). Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem

In late 1990s. the multi-application initiative was put forward to have multiple applications on a single smart card. This would have enabled a cardholder to accumulate all of her smart card based applications (e.g. banking, telecom, and transport et... Read More about Building the bridges -- a proposal for merging different paradigms in mobile NFC ecosystem..

Towards OWL 2 Natively Supported Fuzzy Cloud Ontology (2012)
Presentation / Conference Contribution
Fang, D., Liu, X., Romdhani, I., & Zhao, H. (2012, July). Towards OWL 2 Natively Supported Fuzzy Cloud Ontology. Presented at 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops

Cloud Computing introduces a revolutionary paradigm of computing to Service Oriented Architecture (SOA), by provisioning various types of computational resources and applications as on-demand services. While presenting cloud services semantically usi... Read More about Towards OWL 2 Natively Supported Fuzzy Cloud Ontology.

New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Abed, M. (2012). New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks. In IEEE 20th Int. Conference on Software, Telecommunications and Computer Networks-(SoftCOM 2012) (1-6)

In this paper, we investigate efficient strategies for supporting velocity aware probabilistic route discovery in Mobile Ad hoc Networks (MANETs). MANETs usually use broadcast mechanisms to discover routes between nodes by flooding the network with R... Read More about New Velocity-Aware Probabilistic route discovery schemes for Mobile Ad hoc Networks..

Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, October). Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture

Near Field Communication (NFC) has reinvigorated the multi-application smart card initiative. The NFC trials are relying on an extension of Issuer Centric Smart Card Model (ICOM) referred as Trusted Service Manager (TSM) architecture, which may creat... Read More about Coopetitive architecture to support a dynamic and scalable NFC based mobile services architecture..

Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, May). Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis

Smart cards rely on pseudorandom number generators to provide uniqueness and freshness in their cryptographic services i.e. encryption and digital signatures. Their implementations are kept proprietary by smart card manufacturers in order to remain c... Read More about Pseudorandom number generation in smart cards: an Implementation, performance and randomness analysis..

A privacy preserving application acquisition protocol. (2012)
Presentation / Conference Contribution
Akram, R. N., Markantonakis, K., & Mayes, K. (2012, June). A privacy preserving application acquisition protocol

In the smart card industry, the application acquisition process involves the card issuers and application providers. During this process, the respective card issuer reveals the identity of the smart card user to the individual application providers.... Read More about A privacy preserving application acquisition protocol..

Experimental investigation of link layer adaptation in IEEE 802.11n WLANs (2012)
Presentation / Conference Contribution
Al-Adhami, M., Al-Dubai, A. Y., & Romdhani, I. (2012). Experimental investigation of link layer adaptation in IEEE 802.11n WLANs. In 11th IEEE International Wireless Telecommunications Symposium (1-7). https://doi.org/10.1109/wts.2012.6266144

Due to its low cost wireless communication methodology and improvements in both its physical (PHY) and MAC (Link) layers, the IEEE 802.11n wireless LAN (WLAN) technology has been adopted widely. However, fairness of current 802.11n rate adaptation (R... Read More about Experimental investigation of link layer adaptation in IEEE 802.11n WLANs.

A new efficient distributed route discovery for wireless mobile ad hoc networks. (2012)
Presentation / Conference Contribution
Bani Khalaf, M., Al-Dubai, A., & Buchanan, W. J. (2012). A new efficient distributed route discovery for wireless mobile ad hoc networks. In Wireless Telecommunications Symposium (WTS), 2012 (1-6). https://doi.org/10.1109/WTS.2012.6266129

High performance group communication, such as broadcast, requires matching efficient broadcast algorithms to effective route discovery approach. Broadcast communication in MANETs is essential for a wide range of important applications. Nevertheless,... Read More about A new efficient distributed route discovery for wireless mobile ad hoc networks..

Future risks – Including the rise of the hacktivism. (2012)
Presentation / Conference Contribution
Buchanan, W. J. (2012). Future risks – Including the rise of the hacktivism. In National Information Security Conference (NISC)

As organisations move towards infrastructures which are highly dependent on their Web infrastructure, they are now at great risk from external parties who can use a number of motivations, such as for a political agenda, to compromise their activities... Read More about Future risks – Including the rise of the hacktivism..

Computational data protection law: trusting each other offline and online. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Fan, L., Lawson, A., Schafer, B., Scott, R., Thuemmler, C., & Uthmani, O. (2012, December). Computational data protection law: trusting each other offline and online

The paper reports of a collaborative project between computer scientists, lawyers, police officers, medical professionals and social workers to develop a communication in infrastructure that allows information sharing while observing Data Protection... Read More about Computational data protection law: trusting each other offline and online..

SPoC: Protecting Patient Privacy for e-Health Services in the Cloud (2012)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Lo, O., Thuemmler, C., Lawson, A., Uthmani, O., …Khedim, A. S. (2012). SPoC: Protecting Patient Privacy for e-Health Services in the Cloud. In eTELEMED 2012 (99-104)

The use of digital technologies in providing health care services is in general subsumed under the term e-Health. The Data Capture and Auto Identification Reference (DACAR) project provides an open e-Health service platform that reinforces the integr... Read More about SPoC: Protecting Patient Privacy for e-Health Services in the Cloud.

Technical evaluation of an e-health platform. (2012)
Presentation / Conference Contribution
Lo, O., Fan, L., Buchanan, W. J., & Thuemmler, C. (2012). Technical evaluation of an e-health platform. In M. Macedo (Ed.), Proceedings of the IADIS International Conference e-Health 2012

Methodologies for evaluation of e-Health platforms are still lacking. We propose an e-Health evaluation framework that aims to provide a concise methodology for the evaluation of e-Health platforms under three main categories: usability evaluation, l... Read More about Technical evaluation of an e-health platform..

Many-to-Many embedded multicast addressing and access control method. (2012)
Patent
Romdhani, I. (2012). Many-to-Many embedded multicast addressing and access control method

A new addressing scheme for multicast IP with an extended scope field to include access rights. A new addressing scheme for multicast communications is disclosed. A new extended scope field is used which embeds a plurality of hierarchical scopes and... Read More about Many-to-Many embedded multicast addressing and access control method..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012). A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

DACAR platform for eHealth services cloud. (2011)
Presentation / Conference Contribution
Fan, L., Buchanan, W. J., Thuemmler, C., Lo, O., Khedim, A. S., Uthmani, O., …Bell, D. (2011). DACAR platform for eHealth services cloud. . https://doi.org/10.1109/CLOUD.2011.31

The use of digital technologies in providing health care services is collectively known as eHealth. Considerable progress has been made in the development of eHealth services, but concerns over service integration, large scale deployment, and securit... Read More about DACAR platform for eHealth services cloud..

Affliate advertising fraud and an investigatory fraud framework. (2011)
Presentation / Conference Contribution
Miehling, M. J., Buchanan, W. J., & Lawson, A. (2011). Affliate advertising fraud and an investigatory fraud framework. In CyberForensics 2011

This paper outlines the details of a real-life scam, which involves creating fraudulent Web sites which pretend to sell goods, but are actually used to perform click-through crime or use identity fraud to claim commission on the sale of goods. It inv... Read More about Affliate advertising fraud and an investigatory fraud framework..