Items where Subject is "Computing > Information security > Cyber security"

Up a level
Export as [feed] RSS
Group by: Creators | Item Type
Jump to: A | B | H | J | K | L | M | P | S | T | Y | Z
Number of items at this level: 41.


Aiash, Mahdi and Loo, Jonathan (2014) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems, 27 (12). pp. 3600-3618. ISSN 1074-5351


Benson, Vladlena (2011) Social networking and trust: is personalisation the only defence technique? In: Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking. IGI Global, Hershey, USA, pp. 32-41. ISBN 9781615209217

Benson, Vladlena, Saridakis, George and Tennakoon, Hemamali (2015) Information disclosure of social media users : does control over personal information, user awareness and security notices matter? Information Technology & People, 28 (3). pp. 426-441. ISSN 0959-3845

Benson, Vladlena, Saridakis, George and Tennakoon, Hemamali (2015) Purpose of social networking use and victimisation: are there any differences between university students and those not in HE? Computers in Human Behavior, 51 (B). pp. 867-872. ISSN 0747-5632

Benson, Vladlena, Saridakis, George, Tennakoon, Hemamali and Jean-Noel, Ezingeard (2015) The role of security notices and online consumer behaviour: an empirical study of social networking users. International Journal of Human-Computer Studies, 80. pp. 36-44. ISSN 1071-5819


Huang, Yongfeng, Liu, Chenghao, Tang, Shanyu and Bai, Sen (2012) Steganography integration into a low-bit rate speech codec. IEEE Transactions on Information Forensics and Security, 7 (6). pp. 1865-1875. ISSN 1556-6013

Huang, Yongfeng and Tang, Shanyu (2016) Covert Voice over Internet Protocol communications based on spatial model. Science China Technological Sciences, 59 (1). pp. 117-127. ISSN 1674-7321

Huang, Yongfeng, Tang, Shanyu, Bao, Chunlan and Yip, Yau Jim (2011) Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels. IET Information Security, 5 (1). pp. 26-32. ISSN 1751-8709

Huang, Yongfeng, Tang, Shanyu and Yang, Wanxia (2013) An information - theoretical model for streaming media based stegosystems. Computing and Informatics, 32 (1). pp. 47-62. ISSN 1335-9150

Huang, Yongfeng, Tang, Shanyu and Yip, Yau Jim (2008) A new security architecture for SIP-based P2P computer networks. Journal of Computer Science, Informatics and Electrical Engineering, 2 (1). pp. 1-11.

Huang, Yongfeng, Tang, Shanyu and Yuan, Jian (2011) Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Transactions on Information Forensics and Security, 6 (2). pp. 296-306. ISSN 1556-6013

Huang, Yongfeng, Tang, Shanyu and Zhang, Yuan (2011) Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis. IET Communications, 5 (7). pp. 929-936. ISSN 1751-8628


Jiang, Yijing and Tang, Shanyu (2017) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems. ISSN 0942-4962

Jiang, Yijing, Tang, Shanyu, Zhang, Liping, Xiong, Muzhou and Yip, Yau Jim (2016) Covert Voice over Internet Protocol communications with packet loss based on fractal interpolation. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4). 54:1-54:20. ISSN 1551-6857


Kos, Jernej, Aiash, Mahdi, Loo, Jonathan and Trček, Denis (2015) U-Sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89. pp. 14-31. ISSN 1389-1286


Le, Anhtuan, Loo, Jonathan, Chai, Kok Keong and Aiash, Mahdi (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7 (2). p. 25. ISSN 2078-2489

Li, H. and Tang, Shanyu (2016) Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment. International Journal of Simulation: Systems, Science & Technology, 17 (36). 58.1-58.13. ISSN 1473-8031

Li, Haixia and Tang, Shanyu (2016) An improved authentication mechanism based on dynamic game behavior in cloud computing. Journal of Computational and Theoretical Nanoscience, 13 (2). pp. 1211-1219. ISSN 1546-1955

Liu, Ran, Peng, Jinghui and Tang, Shanyu (2017) Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: applications and extensions. Engineering Applications of Artificial Intelligence, 62. pp. 350-358. ISSN 0952-1976

Liu, Ran, Peng, Jinghui and Tang, Shanyu (2015) An efficient approximation method for calculating confidence level of negative survey. Mathematical Problems in Engineering, 2015. p. 958154. ISSN 1024-123X

Lyamin, Nikita, Vinel, Alexey, Jonsson, Magnus and Loo, Jonathan (2014) Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications Letters, 18 (1). pp. 110-113. ISSN 1089-7798


McAlaney, John, Frumkin, Lara and Benson, Vladlena (2018) Psychological and behavioral examinations in cyber security. IGI Global, Hershey, USA. ISBN 9781522540533 (In Press)


Peng, Jinghui, Tang, Shanyu, Zhang, Liping and Liu, Ran (2017) Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking. Multimedia Tools and Applications, 76 (2). pp. 2569-2589. ISSN 1380-7501


Sample, Char, Bakdash, Jonathan, Abdelnour-Nocera, Jose and Maple, Carsten (2017) What's in a name? Cultural observations on nationally named hacking groups. In: 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2-3 Mar 2017, Dayton, USA.

Song, Jun, He, Chunjiao, Zhang, Lei, Tang, Shanyu and Zhang, Huanguo (2014) Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11 (9). pp. 93-103. ISSN 1673-5447


Tang, Shanyu, Chen, Qing, Zhang, Wei and Huang, Yongfeng (2016) Universal steganography model for low bit-rate speech codec. Security and Communication Networks, 9 (8). pp. 747-754. ISSN 1939-0114

Tang, Shanyu, Jiang, Yijing, Zhang, Liping and Zhou, Zhangbing (2014) Audio steganography with AES for real-time covert Voice over Internet Protocol communications. Science China Information Sciences, 57 (3). pp. 1-14. ISSN 1674-733X

Tennakoon, Hemamali, Ezingeard, Jean-Noel and Benson, Vladlena (2012) Social networks and information security: extant research and future perspectives. In: British Academy of Management (BAM) Conference 2012: Management Research Revisited: Prospects for Theory and Practice, 11-13 Sep 2012, Cardiff, UK. (Unpublished)


Yang, W. and Tang, Shanyu (2017) Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain. Chinese Journal of Electronics, 26 (6). pp. 1254-1260. ISSN 1022-4653

Yang, Wanxia, Tang, Shanyu, Li, Miaoqi, Zhou, Beibei and Jiang, Yijing (2017) Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates. Multimedia Tools and Applications. ISSN 1380-7501 (In Press)


Zhang, Liping, Tang, Shanyu and Cai, Zhihua (2014) Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. Security and Communication Networks, 7 (12). pp. 2405-2411. ISSN 1939-0114

Zhang, Liping, Tang, Shanyu and Cai, Zhihua (2014) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card. International Journal of Communication Systems, 27 (11). pp. 2691-2702. ISSN 1074-5351

Zhang, Liping, Tang, Shanyu and Cai, Zhihua (2014) Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Communications, 8 (1). pp. 83-91. ISSN 1751-8628

Zhang, Liping, Tang, Shanyu, Chen, Jing and Zhu, Shaohui (2015) Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81 (1). pp. 53-75. ISSN 0929-6212

Zhang, Liping, Tang, Shanyu and Luo, He (2016) Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE, 11 (3). pp. 1-15.

Zhang, Liping, Tang, Shanyu and Zhu, Shanyu (2016) An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications, 59. pp. 126-133. ISSN 1084-8045

Zhang, Liping, Tang, Shanyu and Zhu, Shaohui (2017) Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks, 23 (6). pp. 1901-1916. ISSN 1022-0038

Zhang, Liping, Tang, Shanyu and Zhu, Shaohui (2016) A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Peer-to-Peer Networking and Applications, 9 (1). pp. 108-126. ISSN 1936-6442

Zhang, Liping, Zhang, Yixin, Tang, Shanyu and Luo, He (2017) Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics. ISSN 0278-0046

Zhang, Liping, Zhu, Shaohui and Tang, Shanyu (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics, 21 (2). pp. 465-475. ISSN 2168-2194

Zhang, Wei, Tang, Shanyu, Zhang, Liping, Ma, Zhao and Song, Jun (2015) Chaotic stream cipher-based secure data communications over intelligent transportation network. International Journal of Antennas and Propagation, 2015. p. 315721. ISSN 1687-5869

This list was generated on Fri Dec 15 10:23:45 2017 UTC.