Abel, Yeboah-Ofori ORCID: https://orcid.org/0000-0001-8055-9274, Umar, Mukhtar Ismail, Tymoteusz, Swidurski and Francisca, Opoku-Boateng (2021) Cyberattack ontology: a knowledge representation for cyber supply chain security. In: 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), 14-16 Jul 2021, Brest, France.
Aiash, Mahdi and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems, 27 (12). pp. 3600-3618. ISSN 1074-5351
Anwar, S., Al-Obeidat, Feras, Tubaishat, A., Din, S., Ahmad, A., Khan, A.F., Jeo, G. and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2019) Countering malicious URLs in Internet-of-Thing (IoT) using a knowledge-based approach and simulated expert. IEEE Internet of Things Journal.
Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Azad, Muhammad Ajmal, Abdeltaif, Muhammad Mahmoud and Salah, Khaled (2019) An intrusion detection framework for energy constrained IoT devices. Mechanical Systems and Signal Processing, 136. ISSN 0888-3270
Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Abdellatif, Muhammad, Khan, Muhammad and Azad, Muhammad Ajmal (2018) A novel framework for collaborative intrusion detection for M2M networks. In: 9th International Conference onInformation and Communication Systems, 3-5 April,2018, Irbid, Jordan. (Unpublished)
Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050, Khaliq Qureshi, Hassaan and Rajarajan, Muttukrishnan (2013) Variable rate adaptive modulation (VRAM) for introducing small-world model into WSNs. In: 47th Annual Conference on Information Sciences and Systems (CISS), 20-22 Mar 2013, USA.
Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050 and Qaisar, Saad (2011) Energy and path aware clustering algorithm (EPAC) for mobile ad hoc networks. In: International Conference on Computational Science and Its Applications, 20-23 Jun 2011, Spain.
Azad, Muhammad Ajmal, Alazab, Mamoun, Riaz, Farhan, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Abdullah, Tariq (2019) Socioscope: I know who you are, a robo, human caller or service number. Future Generation Computer Systems, 105. pp. 297-307. ISSN 0167-739X
Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Mahmoud, Shazia, Salah, Khaled and Imran, Muhammad (2019) A privacy‐preserving framework for smart context‐aware healthcare applications. Transactions on Emerging Telecommunications Technologies.
Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Farhan, Riaz (2018) SOCIO-LENS: spotting unsolicited caller through network analysis. In: Guide to Vulnerability Analysis for Computer Networks and Systems. Springer, Cham, Switzerland. ISBN 9783319926230
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George and Tennakoon, Hemamali (2015) Information disclosure of social media users : does control over personal information, user awareness and security notices matter? Information Technology & People, 28 (3). pp. 426-441. ISSN 0959-3845
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George and Tennakoon, Hemamali (2015) Purpose of social networking use and victimisation: are there any differences between university students and those not in HE? Computers in Human Behavior, 51 (B). pp. 867-872. ISSN 0747-5632
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Saridakis, George, Tennakoon, Hemamali and Jean-Noel, Ezingeard (2015) The role of security notices and online consumer behaviour: an empirical study of social networking users. International Journal of Human-Computer Studies, 80. pp. 36-44. ISSN 1071-5819
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2018) Psychological and Behavioral Examinations in Cyber Security. IGI Global, Hershey, USA. ISBN 9781522540533
Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2011) Social networking and trust: is personalisation the only defence technique? In: Semantic Web Personalization and Context Awareness: Management of Personal Identities and Social Networking. IGI Global, Hershey, USA, pp. 32-41. ISBN 9781615209217
Brooks, Graham ORCID: https://orcid.org/0000-0002-1220-2932 (2018) Internet fraud. In: The SAGE Encyclopedia Of The Internet. Sage, pp. 488-493. ISBN 9781473926615
Edris, E.K.K., M., Aiash and Jonathan, Loo ORCID: https://orcid.org/0000-0002-2197-8126 (2021) Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics, 10 (13).
Edris, Ed Kamya Kiyemba, Aiash, Mahdi, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 and Alhakeem, Mohammad Shadi (2021) Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks, 16 (4). pp. 223-234. ISSN 1747-8405
Faiz, Mohamed Falah, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498, Alazab, Mamoun and Shalaginov, Andrii (2020) Predicting likelihood of legitimate data loss in email DLP. Future Generation Computer Systems, 110. pp. 744-757. ISSN 0167-739X
Fiaz, Mahzeb, Yousaf, Roomana, Hanfi, Maryam, Asif, Waqar ORCID: https://orcid.org/0000-0001-6774-3050, Khaliq Qureshi, Hassaan and Rajarajan, Muttukrishnan (2014) Adding the reliability on tree based topology construction algorithms for wireless sensor networks. Wireless Personal Communications, 74 (2). pp. 989-1004. ISSN 0929-6212
Huang, Yongfeng, Liu, Chenghao, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Bai, Sen (2012) Steganography integration into a low-bit rate speech codec. IEEE Transactions on Information Forensics and Security, 7 (6). pp. 1865-1875. ISSN 1556-6013
Huang, Yongfeng and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) Covert Voice over Internet Protocol communications based on spatial model. Science China Technological Sciences, 59 (1). pp. 117-127. ISSN 1674-7321
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Bao, Chunlan and Yip, Yau Jim (2011) Steganalysis of compressed speech to detect covert Voice over Internet Protocol channels. IET Information Security, 5 (1). pp. 26-32. ISSN 1751-8709
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yang, Wanxia (2013) An information - theoretical model for streaming media based stegosystems. Computing and Informatics, 32 (1). pp. 47-62. ISSN 1335-9150
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yip, Yau Jim (2008) A new security architecture for SIP-based P2P computer networks. Journal of Computer Science, Informatics and Electrical Engineering, 2 (1). pp. 1-11.
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Yuan, Jian (2011) Steganography in inactive frames of VoIP streams encoded by source codec. IEEE Transactions on Information Forensics and Security, 6 (2). pp. 296-306. ISSN 1556-6013
Huang, Yongfeng, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Yuan (2011) Detection of covert Voice over Internet Protocol communications using sliding window-based steganalysis. IET Communications, 5 (7). pp. 929-936. ISSN 1751-8628
Jiang, Yijing and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) An efficient and secure VoIP communication system with chaotic mapping and message digest. Multimedia Systems, 24 (3). ISSN 0942-4962
Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Xiong, Muzhou and Yip, Yau Jim (2016) Covert voice over internet protocol communications with packet loss based on fractal interpolation. ACM Transactions on Multimedia Computing, Communications and Applications, 12 (4). 54:1-54:20. ISSN 1551-6857
Khan, Kashif Mehboob, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Khan, Muhammad Mubashir (2019) Investigating performance constraints for blockchain based secure e-voting system. Future Generation Computer Systems, 105. pp. 13-26. ISSN 0167-739X
Khan, Kashif Mehboob, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Khan, Muhammad Mubashir (2020) Simulation of transaction malleability attack for blockchain-based e-voting. Computers & Electrical Engineering, 83. p. 106583. ISSN 0045-7906
Kos, Jernej, Aiash, Mahdi, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 and Trček, Denis (2015) U-Sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks, 89. pp. 14-31. ISSN 1389-1286
Le, Anhtuan, Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126, Chai, Kok Keong and Aiash, Mahdi (2016) A specification-based IDS for detecting attacks on RPL-based network topology. Information, 7 (2). p. 25. ISSN 2078-2489
Li, H. and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) Enhanced bidirectional authentication scheme for RFID communications in Internet of Things environment. International Journal of Simulation: Systems, Science & Technology, 17 (36). 58.1-58.13. ISSN 1473-8031
Li, Haixia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2016) An improved authentication mechanism based on dynamic game behavior in cloud computing. Journal of Computational and Theoretical Nanoscience, 13 (2). pp. 1211-1219. ISSN 1546-1955
Liu, Ran, Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Multiple-negative survey method for enhancing the accuracy of negative survey-based cloud data privacy: applications and extensions. Engineering Applications of Artificial Intelligence, 62. pp. 350-358. ISSN 0952-1976
Liu, Ran, Peng, Jinghui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2015) An efficient approximation method for calculating confidence level of negative survey. Mathematical Problems in Engineering, 2015. p. 958154. ISSN 1024-123X
Liu, Yang, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Liu, Ran, Zhang, Liping and Ma, Zhao (2018) Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Systems with Applications, 97. pp. 95-105. ISSN 0957-4174
Luszczyszyn, Hubert (2022) Development of a turn-based game using Blockchain and Smart Contracts technology. In: School of Computing and Engineering Research and Industry Day 2022, 29 Jun 2022, London, United Kingdom. (Unpublished)
Lyamin, Nikita, Vinel, Alexey, Jonsson, Magnus and Loo, Jonathan ORCID: https://orcid.org/0000-0002-2197-8126 (2014) Real-time detection of denial-of-service attacks in IEEE 802.11p vehicular networks. IEEE Communications Letters, 18 (1). pp. 110-113. ISSN 1089-7798
Mirto, Aimee (2022) Detecting cyberstalking from social media platform(s) using data mining analytics. Doctoral thesis, University of West London.
Nazar, Nauman, Darvishi, Iman and Yeboah-ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2022) Cyber threat analysis on online learning and its mitigation techniques amid Covid-19. In: 2022 IEEE International Smart Cities Conference (ISC2), 26-29 Sep 2022, Pafos, Cyprus.
Ngalo, Tamsanqa, Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2018) Threat Analysis of Software Agents in Online Banking and Payments. In: The 16th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2018), 12-15 August 2018, Athens, Greece.
Nizamuddin, N., Salah, K., Azad, Muhammad Ajmal, Arshad, Junaid ORCID: https://orcid.org/0000-0003-0424-9498 and Rehman, M.H. (2019) Decentralized document version control using ethereum blockchain and IPFS. Computers & Electrical Engineering, 76. 183 - 197. ISSN 0045-7906
Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2022) Cyber threat actors. In: Encyclopedia of Tourism Management and Marketing. Edward Elgar Publishing, Cheltenham, UK, pp. 750-753. ISBN 9781800377479
Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2022) Cyberattacks. In: Encyclopedia of Tourism Management and Marketing. Edward Elgar Publishing, Cheltenham, UK, pp. 747-750. ISBN 9781800377479
Paraskevas, Alexandros ORCID: https://orcid.org/0000-0003-1556-5293 (2020) Cybersecurity in travel and tourism: a risk-based approach. In: Handbook of e-Tourism. Springer Nature, Cham, Switzerland. ISBN 978303005324 6 (In Press)
Peng, Jinghui, Jiang, Yijing, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Meziane, Farid (2019) Security of streaming media communications with logistic map and self-adaptive detection-based steganography. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971
Peng, Jinghui, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Jia, Li (2019) Fast Fourier Transform-based steganalysis of covert communications over streaming media. International Journal of Computer and Information Engineering, 13 (7). pp. 362-367. ISSN 2010-376X
Peng, Jinghui, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping and Liu, Ran (2017) Information retrieval of mass encrypted data over multimedia networking with N-level vector model-based relevancy ranking. Multimedia Tools and Applications, 76 (2). pp. 2569-2589. ISSN 1380-7501
Peng, Jinghui (2020) Secure covert communications over streaming media using dynamic steganography. Doctoral thesis, University of West London.
Puttaroo, Mohammad Ally Rehaz (2017) A behavioural study in runtime analysis environments and drive-by download attacks. Doctoral thesis, University of West London.
Qureshi, Muhammad Bilal, Qureshi, Muhammad Shuaib, Tahir, Saqib, Anwar, Aamir and Chen, Chin-Ling (2022) Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry, 14 (4). p. 695.
Sample, Char, Bakdash, Jonathan, Abdelnour-Nocera, Jose ORCID: https://orcid.org/0000-0001-7935-7368 and Maple, Carsten (2017) What's in a name? Cultural observations on nationally named hacking groups. In: 12th International Conference on Cyber Warfare and Security (ICCWS 2017), 2-3 Mar 2017, Dayton, USA.
Sanders, Kevin (2018) Technology has changed the face of privacy: here’s what you need to do next. Rights Info.
Saridakis, George, Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525, Ezingeard, Jean-Noel and Tennakoon, Hemamali (2015) Individual information security, user behaviour and cyber victimisation: An empirical study of social networking users. Technological Forecasting and Social Change, 102. pp. 320-330. ISSN 0040-1625
Song, Jun, He, Chunjiao, Zhang, Lei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhang, Huanguo (2014) Toward an RSU-unavailable lightweight certificateless key agreement scheme for VANETs. China Communications, 11 (9). pp. 93-103. ISSN 1673-5447
Song, Xinxia, Chen, Zhigang and Chen, Liang (2019) A multi-bit fully homomorphic encryption with shorter public key from LWE. IEEE Access, 7. pp. 50588-50594.
Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Qing, Zhang, Wei and Huang, Yongfeng (2016) Universal steganography model for low bit-rate speech codec. Security and Communication Networks, 9 (8). pp. 747-754. ISSN 1939-0114
Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Jiang, Yijing, Zhang, Liping and Zhou, Zhangbing (2014) Audio steganography with AES for real-time covert Voice over Internet Protocol communications. Science China Information Sciences, 57 (3). pp. 1-14. ISSN 1674-733X
Tennakoon, Hemamali, Ezingeard, Jean-Noel and Benson, Vladlena ORCID: https://orcid.org/0000-0001-5940-0525 (2012) Social networks and information security: extant research and future perspectives. In: British Academy of Management (BAM) Conference 2012: Management Research Revisited: Prospects for Theory and Practice, 11-13 Sep 2012, Cardiff, UK. (Unpublished)
Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2009) A purchase protocol with multichannel authentication. Journal of Information Assurance and Security, 4 (4). pp. 361-371. ISSN 1554-1010
Xiao, Hannan, Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2008) A purchase protocol with live cardholder authentication for online credit card payment. In: The Fourth International Conference on Information Assurance and Security, 8-10 September 2008, Napoli, Italy.
Xiao, Hannan, Malcolm, James A., Christianson, Bruce and Zhang, Ying ORCID: https://orcid.org/0000-0002-6669-1671 (2007) Hierarchical trustworthy authentication for pervasive computing. In: The 4th Annual International Conference on Mobile and Ubiquitous System: Computing, Networking and Services, 6-10 August 2007, Philadelphia, USA.
Yang, Su ORCID: https://orcid.org/0000-0002-6618-7483, Deravi, Farzin and Hoque, Sanaul (2018) Task sensitivity in EEG biometric recognition. Pattern Analysis and Applications, 21 (1). pp. 105-117. ISSN 1433-7541
Yang, Su ORCID: https://orcid.org/0000-0002-6618-7483, Hoque, Sanaul and Deravi, Farzin (2019) Improved time-frequency features and electrode placement for EEG-based biometric person recognition. IEEE Access, 7. pp. 49604-49613.
Yang, Wanxia and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Steganalysis of low embedding rates LSB speech based on histogram moments in frequency domain. Chinese Journal of Electronics, 26 (6). pp. 1254-1260. ISSN 1022-4653
Yang, Wanxia, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Li, Miaoqi, Zhou, Beibei and Jiang, Yijing (2018) Markov bidirectional transfer matrix for detecting LSB speech steganography with low embedding rates. Multimedia Tools and Applications, 77 (14). pp. 17937-17952. ISSN 1380-7501
Yang, Wanxia, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Wang, GuanPing (2018) RTP timestamp steganography detection method. IETE Technical Review, 35 (1). pp. 59-67. ISSN 0256-4602
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2020) Classification of malware attacks using machine learning in decision tree. International Journal of Security, 11 (2). pp. 10-25. ISSN 1985-2320
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 (2020) Software reliability and quality assurance challenges in cyber physical systems security. International Journal of Computer Science and Security (IJCSS), 14 (3). pp. 115-130. ISSN 1985-1553
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Addo-Quaye, Ronald, Oseni, Waheed, Amorin, Prince and Agangmikre, Conrad (2021) Cyber supply chain security a cost benefit analysis using net present value. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Addo-Quaye, Ronald, Oseni, Waheed, Amorin, Prince and Agangmikre, Conrad (2022) Cyber supply chain security: a cost benefit analysis using net present value. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Agbodza, Christian Kwame, Opoku-Boateng, Francisca Afua, Darvishi, Iman and Sbai, Fatim (2021) Applied cryptography in network systems security for cyberattack prevention. In: 2021 International Conference on Cyber Security and Internet of Things (ICSIoT), 15-17 Dec 2021, France.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Islam, Shareeful (2019) Cyber security threat modeling for supply chain organizational environments. Future Internet, 11 (3). p. 63.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Islam, Shareeful, Lee, Sin Wee, Shamszaman, Zia Ush, Muhammad, Khan, Altaf, Meteb and Al-Rakhami, Mabrook S. (2021) Cyber threat predictive analytics for improving cyber supply chain security. IEEE Access.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Swart, Cameron, Opoku-Boateng, Francisca and Islam, Shareeful (2022) Cyber resilience in supply chain system security using machine learning for threat predictions. Continuity & Resilience Review. ISSN 2516-7502
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Boachie, Charles (2019) Malware attack predictive analytics in a cyber supply chain context using machine learning. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Haralambos, Mouratidis, Ismai, Umar, Islam, Shareeful and Spyridon, Papastergiou (2021) Cyber supply chain threat analysis and prediction using machine learning and ontology. In: AIAI 2021: Artificial Intelligence Applications and Innovations, 25-27 Jun 2021, Greece.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Islam, Shareeful and Brimicombe, Allan (2019) Detecting cyber supply chain attacks on cyber physical systems using Bayesian belief network. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Islam, Shareeful and Yeboah-Boateng, Ezer (2019) Cyber threat intelligence for improving cyber supply chain security. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274, Ismail, Umar Makhtar, Swidurski, Tymoteusz and Opoku-Boateng, Francisca (2021) Cyber threat ontology and adversarial machine learning attacks: analysis and prediction perturbance. In: 2021 International Conference on Computing, Computational Modelling and Applications (ICCMA), 14-16 Jul 2021, Brest, France.
Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Opoku-Akyea, Daniel (2019) Mitigating cyber supply chain risks in cyber physical systems organizational landscape. In: 2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 29-31 May 2019, Accra, Ghana.
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards. Security and Communication Networks, 7 (12). pp. 2405-2411. ISSN 1939-0114
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Efficient and flexible password authenticated key agreement for Voice over Internet Protocol session initiation protocol using smart card. International Journal of Communication Systems, 27 (11). pp. 2691-2702. ISSN 1074-5351
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Cai, Zhihua (2014) Robust and efficient password authenticated key agreement with user anonymity for session initiation protocol-based communications. IET Communications, 8 (1). pp. 83-91. ISSN 1751-8628
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Chen, Jing and Zhu, Shaohui (2015) Two-factor remote authentication protocol with user anonymity based on elliptic curve cryptography. Wireless Personal Communications, 81 (1). pp. 53-75. ISSN 0929-6212
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Luo, He (2016) Elliptic curve cryptography-based authentication with identity protection for smart grids. PLoS ONE, 11 (3). pp. 1-15.
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shanyu (2016) An energy efficient authenticated key agreement protocol for SIP-based green VoIP networks. Journal of Network and Computer Applications, 59. pp. 126-133. ISSN 1084-8045
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shaohui (2017) Privacy-preserving authenticated key agreement scheme based on biometrics for session initiation protocol. Wireless Networks, 23 (6). pp. 1901-1916. ISSN 1022-0038
Zhang, Liping, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Zhu, Shaohui (2016) A lightweight privacy preserving authenticated key agreement protocol for SIP-based VoIP. Peer-to-Peer Networking and Applications, 9 (1). pp. 108-126. ISSN 1936-6442
Zhang, Liping, Zhang, Yixin, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 and Luo, He (2018) Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement. IEEE Transactions on Industrial Electronics, 65 (3). pp. 2795-2805. ISSN 0278-0046
Zhang, Liping, Zhu, Shaohui and Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135 (2017) Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE Journal of Biomedical and Health Informatics, 21 (2). pp. 465-475. ISSN 2168-2194
Zhang, Wei, Tang, Shanyu ORCID: https://orcid.org/0000-0002-2447-8135, Zhang, Liping, Ma, Zhao and Song, Jun (2015) Chaotic stream cipher-based secure data communications over intelligent transportation network. International Journal of Antennas and Propagation, 2015. p. 315721. ISSN 1687-5869
Zhang, Zhiyong, Choo, Kim-Kwang Raymond, Sangaiah, Arun Kumar and Chen, Liang (2018) Crowd computing for social media ecosystems. Applied Soft Computing, 66. pp. 492-494. ISSN 1568-4946