Browsing by Subject Security


jump to:
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 3 to 22 of 24 < previous   next >
Published DateTitleAuthor(s)
Oct-2011A Case Study of Collaboration and Reputation in Social Web Search.McNally, KevinO'Mahony, Michael P.Coyle, MauriceBriggs, PeterSmyth, Barry
6-Mar-2019A Delay-Tolerant Payment Scheme Based on the Ethereum BlockchainHu, YiningManzoor, AhsanEkparinya, ParinyaLiyanage, Madhusankaet al.
26-Nov-2020ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for HealthcareBraeken, AnPorambage, PawaniPuvaneswaran, AmirthanLiyanage, Madhusanka
14-Jun-2020The Future of EU-UK Security and Defence CooperationTonra, Ben
21-Apr-2021Gas Network's Impact on Power System Voltage SecurityRabiee, AbbasKamwa, InnocentKeane, AndrewSoroudi, Alireza
8-Sep-2020InSDN: A Novel SDN Intrusion DatasetElsayed, Mahmoud SaidLe-Khac, Nhien-AnJurcut, Anca Delia
22-Jun-2018Micro-Benchmarking Property Preserving Encryption: Balancing Performance, Security and FunctionalityDaniel, BeckerHines, Andrew
6-May-2019Novel 5G Authentication Protocol to Improve the Resistance Against Active Attacks and Malicious Serving NetworksBraeken, AnLiyanage, MadhusankaKumar, PardeepMurphy, John
9-Aug-2019On the Automated Management of Security Incidents in Smart SpacesAlrimawi, FaeqPasquale, LilianaNuseibeh, Bashar
May-2021Privacy Protected Blockchain Based Architecture and Implementation for Sharing of Students’ CredentialsMishra, Raaj AnandKalla, AnshumanBraeken, AnLiyanage, Madhusanka
20-Mar-2020Privacy-Aware Blockchain Innovation for 6G: Challenges and OpportunitiesNguyen, TriTran, NgocLoven, LauriKechadi, Tahar
15-Feb-2021Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchainManzoor, AhsanBraeken, AnKanhere, Salil S.Ylianttila, MikaLiyanage, Madhusanka
Feb-2020Resilience and the EU's Global Strategy: The Potential Promise of JusticeTonra, Ben
10-May-2021The Roadmap to 6G Security and PrivacyPorambage, PawaniGur, GurkanOsorio, Diana Pamela MoyaLiyanage, MadhusankaGurtov, AndreiYlianttila, Mika
20-Jul-2020Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0Gaba, Gurjot SinghKumar, GulshanMonga, HimanshuLiyanage, Madhusankaet al.
13-Dec-2020Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANsYadav, Awaneesh KumarMisra, ManojLiyanage, MadhusankaVarshney, Gaurav
11-Jun-2020Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure ProvisionsRanaweera, PasikaImrith, Vashish N.Liyanage, MadhusankaJurcut, Anca Delia
7-Jul-2015Security Threats of URL Shortening: A User's PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
Sep-2015Security Threats of URL Shortening: A Users PerspectiveLe-Khac, Nhien-AnKechadi, Tahar
23-Mar-2021Survey on Blockchain based Smart Contracts: Technical Aspects and Future ResearchHewa, TharakaHu, YiningLiyanage, MadhusankaKanhare, SalilYlianttila, Mika