Items where Subject is "Cyber security"

Group by: Creators | Item Type
Jump to: A | B | E | F | H | J | K | L | M | N | P | S | T | X | Y | Z
Number of items at this level: 94.

A

Abel, Yeboah-Ofori ORCID: https://orcid.org/0000-0001-8055-9274, Umar, Mukhtar Ismail, Tymoteusz, Swidurski and Francisca, Opoku-Boateng (2021) Cyberattack ontology: a knowledge representation for cyber supply chain security. In: 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), 14-16 Jul 2021, Brest, France.

Aiash, Mahdi and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems, 27 (12). pp. 3600-3618. ISSN 1074-5351

Anwar, S., Al-Obeidat, Feras, Tubaishat, A., Din, S., Ahmad, A., Khan, A.F., Jeo, G. and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2019) Countering malicious URLs in Internet-of-Thing (IoT) using a knowledge-based approach and simulated expert. IEEE Internet of Things Journal.

Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Azad, Muhammad Ajmal, Abdeltaif, Muhammad Mahmoud and Salah, Khaled (2019) An intrusion detection framework for energy constrained IoT devices. Mechanical Systems and Signal Processing, 136. ISSN 0888-3270

Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Abdellatif, Muhammad, Khan, Muhammad and Azad, Muhammad Ajmal (2018) A novel framework for collaborative intrusion detection for M2M networks. In: 9th International Conference onInformation and Communication Systems, 3-5 April,2018, Irbid, Jordan. (Unpublished)

Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050, Khaliq Qureshi, Hassaan and Rajarajan, Muttukrishnan (2013) Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs. In: 47th Annual Conference on Information Sciences and Systems (CISS), 20-22 Mar 2013, USA.

Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050 and Qaisar, Saad (2011) Energy and path aware clustering algorithm (EPAC) for mobile ad hoc networks. In: International Conference on Computational Science and Its Applications, 20-23 Jun 2011, Spain.

Azad, Muhammad Ajmal, Alazab, Mamoun, Riaz, Farhan, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Abdullah, Tariq (2019) Socioscope: I know who you are, a robo, human caller or service number. Future Generation Computer Systems, 105. pp. 297-307. ISSN 0167-739X

Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Mahmoud, Shazia, Salah, Khaled and Imran, Muhammad (2019) A privacy‐preserving framework for smart context‐aware healthcare applications. Transactions on Emerging Telecommunications Technologies.

Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Farhan, Riaz (2018) SOCIO-LENS: spotting unsolicited caller through network analysis. In: Guide to Vulnerability Analysis for Computer Networks and Systems. Springer, Cham, Switzerland. ISBN 9783319926230

B

Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George and Tennakoon, Hemamali (2015) Information disclosure of social media users : does control over personal information, user awareness and security notices matter? Information Technology & People, 28 (3). pp. 426-441. ISSN 0959-3845

Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George and Tennakoon, Hemamali (2015) Purpose of social networking use and victimisation: are there any differences between university students and those not in HE? Computers in Human Behavior, 51 (B). pp. 867-872. ISSN 0747-5632

Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George, Tennakoon, Hemamali and Jean-Noel, Ezingeard (2015) The role of security notices and online consumer behaviour: an empirical study of social networking users. International Journal of Human-Computer Studies, 80. pp. 36-44. ISSN 1071-5819

Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2018) Psychological and Behavioral Examinations in Cyber Security. IGI Global, Hershey, USA. ISBN 9781522540533

Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2011) Social networking and trust: is personalisation the only defence technique? In: Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking. IGI Global, Hershey, USA, pp. 32-41. ISBN 9781615209217

Brooks, Graham ORCID: https://orcid.org/0000-0002-1220-2932 (2018) Internet fraud. In: The SAGE Encyclopedia Of The Internet. Sage, pp. 488-493. ISBN 9781473926615

E

Edris, E.K.K., M., Aiash and Jonathan, Loo ORCID: https://orcid.org/0000-0002-2197-8126 (2021) Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics, 10 (13).

Edris, Ed Kamya Kiyemba, Aiash, Mahdi, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 and Alhakeem, Mohammad Shadi (2021) Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks, 16 (4). pp. 223-234. ISSN 1747-8405

F

Faiz, Mohamed Falah, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Alazab, Mamoun and Shalaginov, Andrii (2020) Predicting likelihood of legitimate data loss in email DLP. Future Generation Computer Systems, 110. pp. 744-757. ISSN 0167-739X

Fiaz, Mahzeb, Yousaf, Roomana, Hanfi, Maryam, Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050, Khaliq Qureshi, Hassaan and Rajarajan, Muttukrishnan (2014) Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74 (2). pp. 989-1004. ISSN 0929-6212

H

Huang, Yongfeng, Liu, Chenghao, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Bai, Sen (2012) Steganography integration into a low-bit rate speech codec. IEEE Transactions on Information Forensics and Security, 7 (6). pp. 1865-1875. ISSN 1556-6013

Huang, Yongfeng and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) Covert Voice over Internet Protocol communications based on spatial model. Science China Technological Sciences, 59 (1). pp. 117-127. ISSN 1674-7321

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Bao, Chunlan and Yip, Yau Jim (2011) Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels. IET Information Security, 5 (1). pp. 26-32. ISSN 1751-8709

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yang, Wanxia (2013) An information - theoretical model for streaming media based stegosystems. Computing and Informatics, 32 (1). pp. 47-62. ISSN 1335-9150

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yip, Yau Jim (2008) A new security architecture for SIP-based P2P computer networks. Journal of Computer Science, Informatics and Electrical Engineering, 2 (1). pp. 1-11.

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yuan, Jian (2011) Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Transactions on Information Forensics and Security, 6 (2). pp. 296-306. ISSN 1556-6013

Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Yuan (2011) Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis. IET Communications, 5 (7). pp. 929-936. ISSN 1751-8628

J

Jiang, Yijing and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems, 24 (3). ISSN 0942-4962

Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Xiong, Muzhou and Yip, Yau Jim (2016) Covert voice over internet protocol communications with packet loss based on fractal interpolation. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4). 54:1-54:20. ISSN 1551-6857

K

Khan, Kashif Mehboob, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Khan, Muhammad Mubashir (2019) Investigating performance constraints for blockchain based secure e-voting system. Future Generation Computer Systems, 105. pp. 13-26. ISSN 0167-739X

Khan, Kashif Mehboob, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Khan, Muhammad Mubashir (2020) Simulation of transaction malleability attack for blockchain-based e-voting. Computers & Electrical Engineering, 83. p. 106583. ISSN 0045-7906

Kos, Jernej, Aiash, Mahdi, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 and Trček, Denis (2015) U-Sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89. pp. 14-31. ISSN 1389-1286

L

Le, Anhtuan, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126, Chai, Kok Keong and Aiash, Mahdi (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7 (2). p. 25. ISSN 2078-2489

Li, H. and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment. International Journal of Simulation: Systems, Science & Technology, 17 (36). 58.1-58.13. ISSN 1473-8031

Li, Haixia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) An improved authentication mechanism based on dynamic game behavior in cloud computing. Journal of Computational and Theoretical Nanoscience, 13 (2). pp. 1211-1219. ISSN 1546-1955

Liu, Ran, Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: applications and extensions. Engineering Applications of Artificial Intelligence, 62. pp. 350-358. ISSN 0952-1976

Liu, Ran, Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2015) An efficient approximation method for calculating confidence level of negative survey. Mathematical Problems in Engineering, 2015. p. 958154. ISSN 1024-123X

Liu, Yang, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Liu, Ran, Zhang, Liping and Ma, Zhao (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications, 97. pp. 95-105. ISSN 0957-4174

Luszczyszyn, Hubert (2022) Development of a turn-based game using Blockchain and Smart Contracts technology. In: School of Computing and Engineering Research and Industry Day 2022, 29 Jun 2022, London, United Kingdom. (Unpublished)

Lyamin, Nikita, Vinel, Alexey, Jonsson, Magnus and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications Letters, 18 (1). pp. 110-113. ISSN 1089-7798

M

Mirto, Aimee (2022) Detecting cyberstalking from social media platform(s) using data mining analytics. Doctoral thesis, University of West London.

N

Nazar, Nauman, Darvishi, Iman and Yeboah-ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2022) Cyber threat analysis on online learning and its mitigation techniques amid Covid-19. In: 2022 IEEE International Smart Cities Conference (ISC2), 26-29 Sep 2022, Pafos, Cyprus.

Ngalo, Tamsanqa, Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2018) Threat Analysis of Software Agents in Online Banking and Payments. In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), 12-15 August 2018, Athens, Greece.

Nizamuddin, N., Salah, K., Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Rehman, M.H. (2019) Decentralized document version control using ethereum blockchain and IPFS. Computers & Electrical Engineering, 76. 183 - 197. ISSN 0045-7906

P

Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2022) Cyber threat actors. In: Encyclopedia of Tourism Management and Marketing. Edward Elgar Publishing, Cheltenham, UK. ISBN 9781800377479 (In Press)

Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2022) Cyberattacks. In: Encyclopedia of Tourism Management and Marketing. Edward Elgar Publishing, Cheltenham, UK. ISBN 9781800377479 (In Press)

Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2020) Cybersecurity in travel and tourism: a risk-based approach. In: Handbook of e-Tourism. Springer Nature, Cham, Switzerland. ISBN 978303005324 6 (In Press)

Peng, Jinghui, Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Meziane, Farid (2019) Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971

Peng, Jinghui, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Jia, Li (2019) Fast Fourier Transform-based steganalysis of covert communications over streaming media. International Journal of Computer and Information Engineering, 13 (7). pp. 362-367. ISSN 2010-376X

Peng, Jinghui, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping and Liu, Ran (2017) Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking. Multimedia Tools and Applications, 76 (2). pp. 2569-2589. ISSN 1380-7501

Peng, Jinghui (2020) Secure covert communications over streaming media using dynamic steganography. Doctoral thesis, University of West London.

Puttaroo, Mohammad Ally Rehaz (2017) A behavioural study in runtime analysis environments and drive-by download attacks. Doctoral thesis, University of West London.

S

Sample, Char, Bakdash, Jonathan, Abdelnour-Nocera, Jose ORCID: https://orcid.org/0000-0001-7935-7368 and Maple, Carsten (2017) What's in a name? Cultural observations on nationally named hacking groups. In: 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2-3 Mar 2017, Dayton, USA.

Sanders, Kevin ORCID: https://orcid.org/0000-0003-1217-0149 (2018) Technology has changed the face of privacy: here’s what you need to do next. Rights Info.

Saridakis, George, Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Ezingeard, Jean-Noel and Tennakoon, Hemamali (2015) Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change, 102. pp. 320-330. ISSN 0040-1625

Song, Jun, He, Chunjiao, Zhang, Lei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Huanguo (2014) Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11 (9). pp. 93-103. ISSN 1673-5447

Song, Xinxia, Chen, Zhigang and Chen, Liang (2019) A multi-bit fully homomorphic encryption with shorter public key from LWE. IEEE Access, 7. pp. 50588-50594.

T

Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Qing, Zhang, Wei and Huang, Yongfeng (2016) Universal steganography model for low bit-rate speech codec. Security and Communication Networks, 9 (8). pp. 747-754. ISSN 1939-0114

Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Jiang, Yijing, Zhang, Liping and Zhou, Zhangbing (2014) Audio steganography with AES for real-time covert Voice over Internet Protocol communications. Science China Information Sciences, 57 (3). pp. 1-14. ISSN 1674-733X

Tennakoon, Hemamali, Ezingeard, Jean-Noel and Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2012) Social networks and information security: extant research and future perspectives. In: British Academy of Management (BAM) Conference 2012: Management Research Revisited: Prospects for Theory and Practice, 11-13 Sep 2012, Cardiff, UK. (Unpublished)

X

Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2009) A purchase protocol with multichannel authentication. Journal of Information Assurance and Security, 4 (4). pp. 361-371. ISSN 1554-1010

Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2008) A purchase protocol with live cardholder authentication for online credit card payment. In: The Fourth International Conference on Information Assurance and Security, 8-10 September 2008, Napoli, Italy.

Xiao, Hannan, Malcolm, James A., Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2007) Hierarchical trustworthy authentication for pervasive computing. In: The 4th Annual International Conference on Mobile and Ubiquitous System: Computing, Networking and Services, 6-10 August 2007, Philadelphia, USA.

Y

Yang, Su ORCID: https://orcid.org/0000-0002-6618-7483, Deravi, Farzin and Hoque, Sanaul (2018) Task sensitivity in EEG biometric recognition. Pattern Analysis and Applications, 21 (1). pp. 105-117. ISSN 1433-7541

Yang, Su ORCID: https://orcid.org/0000-0002-6618-7483, Hoque, Sanaul and Deravi, Farzin (2019) Improved time-frequency features and electrode placement for EEG-based biometric person recognition. IEEE Access, 7. pp. 49604-49613.

Yang, Wanxia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain. Chinese Journal of Electronics, 26 (6). pp. 1254-1260. ISSN 1022-4653

Yang, Wanxia, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Li, Miaoqi, Zhou, Beibei and Jiang, Yijing (2018) Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates. Multimedia Tools and Applications, 77 (14). pp. 17937-17952. ISSN 1380-7501

Yang, Wanxia, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Wang, GuanPing (2018) RTP timestamp steganography detection method. IETE Technical Review, 35 (1). pp. 59-67. ISSN 0256-4602

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2020) Classification of malware attacks using machine learning in decision tree. International Journal of Security, 11 (2). pp. 10-25. ISSN 1985-2320

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2020) Software reliability and quality assurance challenges in cyber physical systems security. International Journal of Computer Science and Security (IJCSS), 14 (3). pp. 115-130. ISSN 1985-1553

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Islam, Shareeful (2019) Cyber security threat modeling for supply chain organizational environments. Future Internet, 11 (3). p. 63.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Islam, Shareeful, Lee, Sin Wee, Shamszaman, Zia Ush, Muhammad, Khan, Altaf, Meteb and Al-Rakhami, Mabrook S. (2021) Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Swart, Cameron, Opoku-Boateng, Francisca and Islam, Shareeful (2022) Cyber resilience in supply chain system security using machine learning for threat predictions. Continuity & Resilience Review. ISSN 2516-7502

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Addo-Quaye, Ronald, Oseni, Waheed, Amorin, Prince and Agangmikre, Conrad (2021) Cyber supply chain security a cost benefit analysis using net present value. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Addo-Quaye, Ronald, Oseni, Waheed, Amorin, Prince and Agangmikre, Conrad (2022) Cyber supply chain security: a cost benefit analysis using net present value. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Agbodza, Christian Kwame, Opoku-Boateng, Francisca Afua, Darvishi, Iman and Sbai, Fatim (2021) Applied cryptography in network systems security for cyberattack prevention. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Boachie, Charles (2019) Malware attack predictive analytics in a cyber supply chain context using machine learning. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Haralambos, Mouratidis, Ismai, Umar, Islam, Shareeful and Spyridon, Papastergiou (2021) Cyber supply chain threat analysis and prediction using machine learning and ontology. In: AIAI 2021: Artificial Intelligence Applications and Innovations, 25-27 Jun 2021, Greece.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Islam, Shareeful and Brimicombe, Allan (2019) Detecting cyber supply chain attacks on cyber physical systems using Bayesian belief network. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Islam, Shareeful and Yeboah-Boateng, Ezer (2019) Cyber threat intelligence for improving cyber supply chain security. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Ismail, Umar Makhtar, Swidurski, Tymoteusz and Opoku-Boateng, Francisca (2021) Cyber threat ontology and adversarial machine learning attacks: analysis and prediction perturbance. In: 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), 14-16 Jul 2021, Brest, France.

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Opoku-Akyea, Daniel (2019) Mitigating cyber supply chain risks in cyber physical systems organizational landscape. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.

Z

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. Security and Communication Networks, 7 (12). pp. 2405-2411. ISSN 1939-0114

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card. International Journal of Communication Systems, 27 (11). pp. 2691-2702. ISSN 1074-5351

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Communications, 8 (1). pp. 83-91. ISSN 1751-8628

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Jing and Zhu, Shaohui (2015) Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81 (1). pp. 53-75. ISSN 0929-6212

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Luo, He (2016) Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE, 11 (3). pp. 1-15.

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shanyu (2016) An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications, 59. pp. 126-133. ISSN 1084-8045

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shaohui (2017) Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks, 23 (6). pp. 1901-1916. ISSN 1022-0038

Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shaohui (2016) A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Peer-to-Peer Networking and Applications, 9 (1). pp. 108-126. ISSN 1936-6442

Zhang, Liping, Zhang, Yixin, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Luo, He (2018) Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics, 65 (3). pp. 2795-2805. ISSN 0278-0046

Zhang, Liping, Zhu, Shaohui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics, 21 (2). pp. 465-475. ISSN 2168-2194

Zhang, Wei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Ma, Zhao and Song, Jun (2015) Chaotic stream cipher-based secure data communications over intelligent transportation network. International Journal of Antennas and Propagation, 2015. p. 315721. ISSN 1687-5869

Zhang, Zhiyong, Choo, Kim-Kwang Raymond, Sangaiah, Arun Kumar and Chen, Liang (2018) Crowd computing for social media ecosystems. Applied Soft Computing, 66. pp. 492-494. ISSN 1568-4946

This list was generated on Tue Mar 19 08:14:55 2024 UTC.

Menu