Kim-Kwang Raymond Choo

Orcid: 0000-0001-9208-5336

Affiliations:
  • University of Texas at San Antonio, USA
  • University of South Australia, Australia


According to our database1, Kim-Kwang Raymond Choo authored at least 1,139 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SSpose: Self-Supervised Spatial-Aware Model for Human Pose Estimation.
IEEE Trans. Artif. Intell., November, 2024

Efficient Secure Inference Scheme in Multiparty Settings for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, October, 2024

Hiding in Plain Sight: Adversarial Attack via Style Transfer on Image Borders.
IEEE Trans. Computers, October, 2024

PASSP: A Private Authorization Scheme Oriented Service Providers.
IEEE Trans. Netw. Serv. Manag., August, 2024

Detecting and Mitigating the Dissemination of Fake News: Challenges and Future Research Opportunities.
IEEE Trans. Comput. Soc. Syst., August, 2024

Privacy-Preserving Arbitrary Geometric Range Query in Mobile Internet of Vehicles.
IEEE Trans. Mob. Comput., July, 2024

A privacy protection scheme for green communication combining digital steganography.
Peer Peer Netw. Appl., July, 2024

Analyzing the Impact of Personalization on Fairness in Federated Learning for Healthcare.
J. Heal. Informatics Res., June, 2024

Privacy-Preserving Serverless Federated Learning Scheme for Internet of Things.
IEEE Internet Things J., June, 2024

A Detection Method Against Selfish Mining-Like Attacks Based on Ensemble Deep Learning in IoT.
IEEE Internet Things J., June, 2024

A Lightweight and Anonymous Application-Aware Authentication and Key Agreement Protocol for the Internet of Drones.
IEEE Internet Things J., June, 2024

Time-Controllable Keyword Search Scheme With Efficient Revocation in Mobile E-Health Cloud.
IEEE Trans. Mob. Comput., May, 2024

Cryptographic Primitives in Privacy-Preserving Machine Learning: A Survey.
IEEE Trans. Knowl. Data Eng., May, 2024

Trustworthy Access Control for Multiaccess Edge Computing in Blockchain-Assisted 6G Systems.
IEEE Trans. Ind. Informatics, May, 2024

VMEMDA: Verifiable Multidimensional Encrypted Medical Data Aggregation Scheme for Cloud-Based Wireless Body Area Networks.
IEEE Internet Things J., May, 2024

liteGAP: Lightweight Group Authentication Protocol for Internet of Drones Systems.
IEEE Trans. Veh. Technol., April, 2024

An Efficient and Secure Health Data Propagation Scheme Using Steganography-Based Approach for Electronic Health Networks.
IEEE/ACM Trans. Netw., April, 2024

Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition.
IEEE Trans. Artif. Intell., April, 2024

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing.
IEEE Trans. Ind. Informatics, March, 2024

Segmenting foreground objects in a multi-modal background using modified Z-score.
J. Ambient Intell. Humaniz. Comput., February, 2024

AdvEWM: Generating image adversarial examples by embedding digital watermarks.
J. Inf. Secur. Appl., February, 2024

A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.
IEEE Internet Things J., February, 2024

GPU Accelerated Full Homomorphic Encryption Cryptosystem, Library, and Applications for IoT Systems.
IEEE Internet Things J., February, 2024

Graph neural networks: a survey on the links between privacy and security.
Artif. Intell. Rev., February, 2024

1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

A Deep Learning Approach to Discover Router Firmware Vulnerabilities.
IEEE Trans. Ind. Informatics, January, 2024

A Combinatorial Optimization Analysis Method for Detecting Malicious Industrial Internet Attack Behaviors.
ACM Trans. Cyber Phys. Syst., January, 2024

PpNNT: Multiparty Privacy-Preserving Neural Network Training System.
IEEE Trans. Artif. Intell., January, 2024

A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest.
IEEE Internet Things J., January, 2024

TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles.
IEEE Internet Things J., January, 2024

Encrypted Domain Secret Medical-Image Sharing With Secure Outsourcing Computation in IoT Environment.
IEEE Internet Things J., January, 2024

A Method for Detecting Phishing Websites Based on Tiny-Bert Stacking.
IEEE Internet Things J., January, 2024

Oasis: Online All-Phase Quality-Aware Incentive Mechanism for MCS.
IEEE Trans. Serv. Comput., 2024

Practical Privacy-Preserving Convolutional Neural Network Inference Framework With Edge Computing for Health Monitoring.
IEEE Trans. Netw. Sci. Eng., 2024

Efficient Crypto Engine for Authenticated Encryption, Data Traceability, and Replay Attack Detection Over CAN Bus Network.
IEEE Trans. Netw. Sci. Eng., 2024

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

Updatable Private Set Intersection With Forward Privacy.
IEEE Trans. Inf. Forensics Secur., 2024

Optimal Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Joint Cost Learning and Payload Allocation With Image-Wise Attention for Batch Steganography.
IEEE Trans. Inf. Forensics Secur., 2024

An Efficient and Dynamic Privacy-Preserving Federated Learning System for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2024

CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs.
IEEE Trans. Inf. Forensics Secur., 2024

Privacy-Preserving Asynchronous Federated Learning Under Non-IID Settings.
IEEE Trans. Inf. Forensics Secur., 2024

RVE-PFL: Robust Variational Encoder-Based Personalized Federated Learning Against Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2024

Double-Layer Detection of Internal Threat in Enterprise Systems Based on Deep Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Toward Secure and Verifiable Hybrid Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Backdoor Attack on Deep Learning-Based Medical Image Encryption and Decryption Network.
IEEE Trans. Inf. Forensics Secur., 2024

PRBFPT: A Practical Redactable Blockchain Framework With a Public Trapdoor.
IEEE Trans. Inf. Forensics Secur., 2024

A Game-Theory-Based Contract Mechanism to Facilitate Technology Spillover in Emerging Electric Vehicle Markets.
IEEE Trans. Engineering Management, 2024

How do Governments Leverage the Use of Social Media? A Systematic Review.
IEEE Trans. Engineering Management, 2024

PrFAHP-GT: A New Privacy Risk Analysis Framework Using FAHP and Game Theory for Digital Supply Chain Management.
IEEE Trans. Engineering Management, 2024

On the Applications of Blockchain in FinTech: Advancements and Opportunities.
IEEE Trans. Engineering Management, 2024

CrowdFAB: Intelligent Crowd-Forecasting Using Blockchains and its Use in Security.
IEEE Trans. Dependable Secur. Comput., 2024

Efficient and Secure Federated Learning Against Backdoor Attacks.
IEEE Trans. Dependable Secur. Comput., 2024

Verifiable Outsourced Attribute-Based Encryption Scheme for Cloud-Assisted Mobile E-Health System.
IEEE Trans. Dependable Secur. Comput., 2024

Robust Asynchronous Federated Learning With Time-Weighted and Stale Model Aggregation.
IEEE Trans. Dependable Secur. Comput., 2024

REKS: Role-Based Encrypted Keyword Search With Enhanced Access Control for Outsourced Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2024

Blockchain-Based Shared Data Integrity Auditing and Deduplication.
IEEE Trans. Dependable Secur. Comput., 2024

V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network.
IEEE Trans. Dependable Secur. Comput., 2024

Source Inference Attacks: Beyond Membership Inference Attacks in Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2024

Forward Private Verifiable Dynamic Searchable Symmetric Encryption With Efficient Conjunctive Query.
IEEE Trans. Dependable Secur. Comput., 2024

A Lightweight and Secure Communication Protocol for the IoT Environment.
IEEE Trans. Dependable Secur. Comput., 2024

Differentially Private Non-Negative Consistent Release for Large-Scale Hierarchical Trees.
IEEE Trans. Dependable Secur. Comput., 2024

SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024

DFier: A directed vulnerability verifier for Ethereum smart contracts.
J. Netw. Comput. Appl., 2024

Editorial: Special issue on software protection and attacks.
J. Inf. Secur. Appl., 2024

IB-IADR: Enabling Identity-Based Integrity Auditing and Data Recovery With Fault Localization for Multicloud Storage.
IEEE Internet Things J., 2024

Practical Revocable Keyword Search Over Mobile Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2024

CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption.
Future Gener. Comput. Syst., 2024

An incentive compatible ZD strategy-based data sharing model for federated learning: A perspective of iterated prisoner's dilemma.
Eur. J. Oper. Res., 2024

Compiler-provenance identification in obfuscated binaries using vision transformers.
Forensic Sci. Int. Digit. Investig., 2024

Artificial intelligence in physiological characteristics recognition for internet of things authentication.
Digit. Commun. Networks, 2024

Survey on digital twins for Internet of Vehicles: Fundamentals, challenges, and opportunities.
Digit. Commun. Networks, 2024

Network traffic classification: Techniques, datasets, and challenges.
Digit. Commun. Networks, 2024

A Deep Dive into Fairness, Bias, Threats, and Privacy in Recommender Systems: Insights and Future Research.
CoRR, 2024

Beyond Text-to-SQL for IoT Defense: A Comprehensive Framework for Querying and Classifying IoT Threats.
CoRR, 2024

A2-DIDM: Privacy-preserving Accumulator-enabled Auditing for Distributed Identity of DNN Model.
CoRR, 2024

Holistic Evaluation Metrics: Use Case Sensitive Evaluation Metrics for Federated Learning.
CoRR, 2024

A secure and lightweight cloud data deduplication scheme with efficient access control and key management.
Comput. Commun., 2024

A Robust Physical Layer IDS for Intra-Vehicle Communication Security.
Proceedings of the International Conference on Smart Applications, 2024

GE-AdvGAN: Improving the transferability of adversarial samples by gradient editing-based adversarial generative model.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024

Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Two-sided Long Tails on Blockchain-Based Crowdsourcing Platforms.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Trustworthy and Responsible AI for Information and Knowledge Management System.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

Chebyshev Polynomial and Private Blockchain Based Cross-Domain Authentication Protocol for IoD Networks.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

A Lightweight Aggregate Authentication Protocol for Internet of Drones.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

MFABA: A More Faithful and Accelerated Boundary-Based Attribution Method for Deep Neural Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Adaptive Beamforming for Cascaded Sparse Diversely Polarized Planar Array.
IEEE Trans. Veh. Technol., December, 2023

Comprehensive Survey on Privacy-Preserving Spatial Data Query in Transportation Systems.
IEEE Trans. Intell. Transp. Syst., December, 2023

BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice.
Frontiers Comput. Sci., December, 2023

BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023

Secure Battery Swapping: A Reservation Scheme With Conditional Privacy-Preserving Bidirectional Heterogeneous Aggregate Signcryption and Incentive Mechanism.
IEEE Trans. Veh. Technol., November, 2023

MKSS: An Effective Multi-authority Keyword Search Scheme for edge-cloud collaboration.
J. Syst. Archit., November, 2023

A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.
Eng. Appl. Artif. Intell., November, 2023

Efficient Location-Based Skyline Queries With Secure R-Tree Over Encrypted Data.
IEEE Trans. Knowl. Data Eng., October, 2023

EPRICE: An Efficient and Privacy-Preserving Real-Time Incentive System for Crowdsensing in Industrial Internet of Things.
IEEE Trans. Computers, September, 2023

Guest Editorial: Ubiquitous Intelligence for Internet of Vehicles.
IEEE Internet Things Mag., September, 2023

Quantum Learning on Structured Code With Computing Traps for Secure URLLC in Industrial IoT Scenarios.
IEEE Internet Things J., September, 2023

A Privacy-Preserving Hybrid Range Search Scheme Over Encrypted Electronic Medical Data in IoT Systems.
IEEE Internet Things J., September, 2023

Towards CRISP-BC: 3TIC specification framework for Blockchain use-cases.
IET Blockchain, September, 2023

AI-enabled IoT penetration testing: state-of-the-art and research challenges.
Enterp. Inf. Syst., September, 2023

Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed.
Comput. Secur., September, 2023

Improve individual fairness in federated learning via adversarial training.
Comput. Secur., September, 2023

A Blockchain-Based Access Control Scheme for Zero Trust Cross-Organizational Data Sharing.
ACM Trans. Internet Techn., August, 2023

Badoo Android and iOS Dating Application Analysis.
Mob. Networks Appl., August, 2023

Sickly Apps: A Forensic Analysis of Medical Device Smartphone Applications on Android and iOS Devices.
Mob. Networks Appl., August, 2023

Privacy-Preserving Asynchronous Federated Learning Framework in Distributed IoT.
IEEE Internet Things J., August, 2023

ALPS: Achieving accuracy-aware location privacy service via assisted regions.
Future Gener. Comput. Syst., August, 2023

Forecasting call center arrivals using temporal memory networks and gradient boosting algorithm.
Expert Syst. Appl., August, 2023

Big data in healthcare: Conceptual network structure, key challenges and opportunities.
Digit. Commun. Networks, August, 2023

S-DeepTrust: A deep trust prediction method based on sentiment polarity perception.
Inf. Sci., July, 2023

An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles.
Internet Things, July, 2023

Understanding the Trends in Blockchain Domain Through an Unsupervised Systematic Patent Analysis.
IEEE Trans. Engineering Management, June, 2023

Blockchain for unmanned underwater drones: Research issues, challenges, trends and future directions.
J. Netw. Comput. Appl., June, 2023

A learned spatial textual index for efficient keyword queries.
J. Intell. Inf. Syst., June, 2023

An empirical study of content-based recommendation systems in mobile app markets.
Decis. Support Syst., June, 2023

Internet of things: Conceptual network structure, main challenges and future directions.
Digit. Commun. Networks, June, 2023

Verifiable Fuzzy Multi-Keyword Search Over Encrypted Data With Adaptive Security.
IEEE Trans. Knowl. Data Eng., May, 2023

AsyFed: Accelerated Federated Learning With Asynchronous Communication Mechanism.
IEEE Internet Things J., May, 2023

An Efficient Multilayered Linkable Ring Signature Scheme With Logarithmic Size for Anonymous Payment in Vehicle-to-Grid Networks.
IEEE Trans. Intell. Veh., April, 2023

Disinformation Propagation Trend Analysis and Identification Based on Social Situation Analytics and Multilevel Attention Network.
IEEE Trans. Comput. Soc. Syst., April, 2023

Confluence of Blockchain and Artificial Intelligence Technologies for Secure and Scalable Healthcare Solutions: A Review.
IEEE Internet Things J., April, 2023

From puzzles to portraits: Enhancing situation awareness during natural disasters using a design science approach.
Decis. Sci., April, 2023

2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT.
Comput. Secur., April, 2023

A Multi-Objective Approach Based on Differential Evolution and Deep Learning Algorithms for VANETs.
IEEE Trans. Veh. Technol., March, 2023

Blockchain Use Case in Ballistics and Crime Gun Tracing and Intelligence: Toward Overcoming Gun Violence.
ACM Trans. Manag. Inf. Syst., March, 2023

EPNS: Efficient Privacy-Preserving Intelligent Traffic Navigation From Multiparty Delegated Computation in Cloud-Assisted VANETs.
IEEE Trans. Mob. Comput., March, 2023

CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., March, 2023

Provable Multiple-Copy Integrity Auditing Scheme for Cloud-Based IoT.
IEEE Syst. J., March, 2023

Family locating sharing app forensics: Life360 as a case study.
Forensic Sci. Int. Digit. Investig., March, 2023

Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.
IEEE Trans. Computers, February, 2023

Achieving Lightweight and Privacy-Preserving Object Detection for Connected Autonomous Vehicles.
IEEE Internet Things J., February, 2023

COVID-19 pandemic and the cyberthreat landscape: Research challenges and opportunities.
Digit. Commun. Networks, February, 2023

BCGS: Blockchain-assisted privacy-preserving cross-domain authentication for VANETs.
Veh. Commun., 2023

An Efficient Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for VANETs.
IEEE Trans. Veh. Technol., 2023

Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems.
IEEE Trans. Serv. Comput., 2023

MU-TEIR: Traceable Encrypted Image Retrieval in the Multi-User Setting.
IEEE Trans. Serv. Comput., 2023

Ranked Keyword Search Over Encrypted Cloud Data Through Machine Learning Method.
IEEE Trans. Serv. Comput., 2023

Defending Against Membership Inference Attack by Shielding Membership Signals.
IEEE Trans. Serv. Comput., 2023

VRFMS: Verifiable Ranked Fuzzy Multi-Keyword Search Over Encrypted Data.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving Top-$k$k Spatial Keyword Queries in Fog-Based Cloud Computing.
IEEE Trans. Serv. Comput., 2023

A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.
IEEE Trans. Serv. Comput., 2023

Privacy-Preserving and Reliable Decentralized Federated Learning.
IEEE Trans. Serv. Comput., 2023

Regulatable and Hardware-Based Proof of Stake to Approach Nothing at Stake and Long Range Attacks.
IEEE Trans. Serv. Comput., 2023

A Survey on Redactable Blockchain: Challenges and Opportunities.
IEEE Trans. Netw. Sci. Eng., 2023

Guest Editorial Introduction to the Special Section on AI-Driven Cybersecurity for Healthcare Cyber Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2023

Efficient Resource Management of Micro-Services in VANETs.
IEEE Trans. Intell. Transp. Syst., 2023

Generative Steganography via Auto-Generation of Semantic Object Contours.
IEEE Trans. Inf. Forensics Secur., 2023

Multi-Domain Virtual Network Embedding Algorithm Based on Horizontal Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

A Dynamic-Efficient Structure for Secure and Verifiable Location-Based Skyline Queries.
IEEE Trans. Inf. Forensics Secur., 2023

A Certificateless Provable Data Possession Scheme for Cloud-Based EHRs.
IEEE Trans. Inf. Forensics Secur., 2023

Secure Model-Contrastive Federated Learning With Improved Compressive Sensing.
IEEE Trans. Inf. Forensics Secur., 2023

Efficient Privacy-Preserving Spatial Range Query Over Outsourced Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2023

PERCE: A Permissioned Redactable Credentials Scheme for a Period of Membership.
IEEE Trans. Inf. Forensics Secur., 2023

Generalized Autonomous Path Proxy Re-Encryption Scheme to Support Branch Functionality.
IEEE Trans. Inf. Forensics Secur., 2023

Differentially Private Deep Learning With Dynamic Privacy Budget Allocation and Adaptive Optimization.
IEEE Trans. Inf. Forensics Secur., 2023

BPVSE: Publicly Verifiable Searchable Encryption for Cloud-Assisted Electronic Health Records.
IEEE Trans. Inf. Forensics Secur., 2023

Technical, Temporal, and Spatial Research Challenges and Opportunities in Blockchain-Based Healthcare: A Systematic Literature Review.
IEEE Trans. Engineering Management, 2023

Assessment of the Blockchain Technology Adoption for the Management of the Electronic Health Record Systems.
IEEE Trans. Engineering Management, 2023

A Differentially Private Federated Learning Model Against Poisoning Attacks in Edge Computing.
IEEE Trans. Dependable Secur. Comput., 2023

Lightweight Privacy-Preserving Distributed Recommender System Using Tag-Based Multikey Fully Homomorphic Data Encapsulation.
IEEE Trans. Dependable Secur. Comput., 2023

Dynamic Authenticated Asymmetric Group Key Agreement With Sender Non-Repudiation and Privacy for Group-Oriented Applications.
IEEE Trans. Dependable Secur. Comput., 2023

VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems.
IEEE Trans. Dependable Secur. Comput., 2023

Inference of User Desires to Spread Disinformation Based on Social Situation Analytics and Group Effect.
IEEE Trans. Dependable Secur. Comput., 2023

Interpreting Universal Adversarial Example Attacks on Image Classification Models.
IEEE Trans. Dependable Secur. Comput., 2023

NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023

Towards an Interpretable Autoencoder: A Decision-Tree-Based Autoencoder and its Application in Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

A2UA: An Auditable Anonymous User Authentication Protocol Based on Blockchain for Cloud Services.
IEEE Trans. Cloud Comput., 2023

Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2023

Verifiable and Dynamic Multi-Keyword Search Over Encrypted Cloud Data Using Bitmap.
IEEE Trans. Cloud Comput., 2023

An Identity-Based Adaptor Signature Scheme and its Applications in the Blockchain System.
IEEE Open J. Comput. Soc., 2023

BESIFL: Blockchain-Empowered Secure and Incentive Federated Learning Paradigm in IoT.
IEEE Internet Things J., 2023

BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things.
IEEE Internet Things J., 2023

Cross-Chain-Based Trustworthy Node Identity Governance in Internet of Things.
IEEE Internet Things J., 2023

Technical Requirements and Approaches in Personal Data Control.
ACM Comput. Surv., 2023

FairCompass: Operationalising Fairness in Machine Learning.
CoRR, 2023

Ethical Considerations and Policy Implications for Large Language Models: Guiding Responsible Development and Deployment.
CoRR, 2023

Towards Understanding the Generalization of Medical Text-to-SQL Models and Datasets.
CoRR, 2023

Edge Learning for 6G-Enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses.
IEEE Commun. Surv. Tutorials, 2023

Preserving data privacy in federated learning through large gradient pruning.
Comput. Secur., 2023

AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms.
Comput. Secur., 2023

Towards Minimising Perturbation Rate for Adversarial Machine Learning with Pruning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Research Track, 2023

Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Security Analysis of Google Authenticator, Microsoft Authenticator, and Authy.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Password Managers and Vault Application Security and Forensics: Research Challenges and Future Opportunities.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Poisoning Attacks in Federated Edge Learning for Digital Twin 6G-Enabled IoTs: An Anticipatory Study.
Proceedings of the IEEE International Conference on Communications, 2023

Voters' Impacts on Creators' Popularity Disparity and Network Size in Two-sided Decentralized User-Generated Content Market.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

A Blockchain Patient-Centric Records Framework for Older Adult Healthcare.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2023

Empirical Evaluations of Machine Learning Effectiveness in Detecting Web Application Attacks.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2023

Enabling Privacy-Preserving Prediction for Length of Stay in ICU - A Multimodal Federated-Learning-based Approach.
Proceedings of the 31st European Conference on Information Systems, 2023

Improving Adversarial Transferability via Frequency-based Stationary Point Search.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

FVW: Finding Valuable Weight on Deep Neural Network for Model Pruning.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023

Efficiency-enhanced Blockchain-based Client Selection in Heterogeneous Federated Learning.
Proceedings of the IEEE International Conference on Blockchain, 2023

On Deploying Quantum-Resistant Cybersecurity in Intelligent Infrastructures.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
A hybrid XSS attack (H<i><sub>Y</sub></i>XSS<i><sub>A</sub></i>) based on fusion approach: Challenges, threats and implications in cybersecurity.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Blockchain for Cybersecurity: Systematic Literature Review and Classification.
J. Comput. Inf. Syst., November, 2022

Deep Federated Learning Enhanced Secure POI Microservices for Cyber-Physical Systems.
IEEE Wirel. Commun., 2022

Blockchain-Based Secure and Cooperative Private Charging Pile Sharing Services for Vehicular Networks.
IEEE Trans. Veh. Technol., 2022

Lattice-Based Conditional Privacy-Preserving Authentication Protocol for the Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., 2022

Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities.
IEEE Trans. Serv. Comput., 2022

VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings.
IEEE Trans. Serv. Comput., 2022

Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing.
IEEE Trans. Serv. Comput., 2022

Pocket Diagnosis: Secure Federated Learning Against Poisoning Attack in the Cloud.
IEEE Trans. Serv. Comput., 2022

Verifiable Semantic-Aware Ranked Keyword Search in Cloud-Assisted Edge Computing.
IEEE Trans. Serv. Comput., 2022

A Generic Secure Transmission Scheme Based on Random Linear Network Coding.
IEEE/ACM Trans. Netw., 2022

A Cost-Sensitive Deep Learning-Based Approach for Network Traffic Classification.
IEEE Trans. Netw. Serv. Manag., 2022

Federated Anomaly Detection on System Logs for the Internet of Things: A Customizable and Communication-Efficient Approach.
IEEE Trans. Netw. Serv. Manag., 2022

AI-Assisted Energy-Efficient and Intelligent Routing for Reconfigurable Wireless Networks.
IEEE Trans. Netw. Sci. Eng., 2022

A Privacy-Preserving Semisupervised Algorithm Under Maximum Correntropy Criterion.
IEEE Trans. Neural Networks Learn. Syst., 2022

DeepKeyGen: A Deep Learning-Based Stream Cipher Generator for Medical Image Encryption and Decryption.
IEEE Trans. Neural Networks Learn. Syst., 2022

Social Media Event Prediction using DNN with Feedback Mechanism.
ACM Trans. Manag. Inf. Syst., 2022

Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks.
IEEE Trans. Mob. Comput., 2022

MAS-Encryption and its Applications in Privacy-Preserving Classifiers.
IEEE Trans. Knowl. Data Eng., 2022

Privacy-Preserving Feature Extraction via Adversarial Training.
IEEE Trans. Knowl. Data Eng., 2022

SAVE: Efficient Privacy-Preserving Location-Based Service Bundle Authentication in Self-Organizing Vehicular Social Networks.
IEEE Trans. Intell. Transp. Syst., 2022

MVFusFra: A Multi-View Dynamic Fusion Framework for Multimodal Brain Tumor Segmentation.
IEEE J. Biomed. Health Informatics, 2022

Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System.
IEEE Trans. Ind. Informatics, 2022

Verifiable Data Mining Against Malicious Adversaries in Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids.
IEEE Trans. Ind. Informatics, 2022

A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks.
IEEE Trans. Ind. Informatics, 2022

Privacy-Preserving Aggregation-Authentication Scheme for Safety Warning System in Fog-Cloud Based VANET.
IEEE Trans. Inf. Forensics Secur., 2022

SDoS: Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2022

Towards Privacy-Preserving Spatial Distribution Crowdsensing: A Game Theoretic Approach.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems.
IEEE Trans. Inf. Forensics Secur., 2022

On Message Authentication Channel Capacity Over a Wiretap Channel.
IEEE Trans. Inf. Forensics Secur., 2022

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges: Part II.
IEEE Trans. Engineering Management, 2022

CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

Social Characteristic-Based Propagation-Efficient PBFT Protocol to Broadcast in Unstructured Overlay Networks.
IEEE Trans. Dependable Secur. Comput., 2022

A Hardware-Assisted Heartbeat Mechanism for Fault Identification in Large-Scale IoT Systems.
IEEE Trans. Dependable Secur. Comput., 2022

DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Privacy-Preserving Outsourced Discrete Wavelet Transform in the Encrypted Domain.
IEEE Trans. Cloud Comput., 2022

Lightweight Public/Private Auditing Scheme for Resource-Constrained End Devices in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

VPSL: Verifiable Privacy-Preserving Data Search for Cloud-Assisted Internet of Things.
IEEE Trans. Cloud Comput., 2022

Designing Secure and Efficient Biometric-Based Access Mechanism for Cloud Services.
IEEE Trans. Cloud Comput., 2022

Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

Threshold Multi-Keyword Search for Cloud-Based Group Data Sharing.
IEEE Trans. Cloud Comput., 2022

Practical Multi-Keyword Ranked Search With Access Control Over Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2022

Traceable and Controllable Encrypted Cloud Image Search in Multi-User Settings.
IEEE Trans. Cloud Comput., 2022

Similarity Search for Encrypted Images in Secure Cloud Computing.
IEEE Trans. Cloud Comput., 2022

Multi-Access Filtering for Privacy-Preserving Fog Computing.
IEEE Trans. Cloud Comput., 2022

An Automated Task Scheduling Model Using Non-Dominated Sorting Genetic Algorithm II for Fog-Cloud Systems.
IEEE Trans. Cloud Comput., 2022

DVREI: Dynamic Verifiable Retrieval Over Encrypted Images.
IEEE Trans. Computers, 2022

Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud.
IEEE Trans. Big Data, 2022

Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing.
IEEE Trans. Big Data, 2022

A Memory Network Information Retrieval Model for Identification of News Misinformation.
IEEE Trans. Big Data, 2022

DssP: Efficient Dual-Server Secret Sharing Protocol Based on Password Authentication for Cloud Storage Services.
IEEE Syst. J., 2022

EAFS: An Efficient, Accurate, and Forward Secure Searchable Encryption Scheme Supporting Range Search.
IEEE Syst. J., 2022

A Global Secure Ranked Multikeyword Search Based on the Multiowner Model for Cloud-Based Systems.
IEEE Syst. J., 2022

FabricFL: Blockchain-in-the-Loop Federated Learning for Trusted Decentralized Systems.
IEEE Syst. J., 2022

The Security of Blockchain-Based Medical Systems: Research Challenges and Opportunities.
IEEE Syst. J., 2022

An Efficient Privacy-Preserving Credit Score System Based on Noninteractive Zero-Knowledge Proof.
IEEE Syst. J., 2022

Finite state machine for cloud forensic readiness as a service (CFRaaS) events.
Secur. Priv., 2022

Blockchain-Empowered Efficient Data Sharing in Internet of Things Settings.
IEEE J. Sel. Areas Commun., 2022

Coordinate-based efficient indexing mechanism for intelligent IoT systems in heterogeneous edge computing.
J. Parallel Distributed Comput., 2022

FELIDS: Federated learning-based intrusion detection system for agricultural Internet of Things.
J. Parallel Distributed Comput., 2022

Misinformation Detection on Social Media: Challenges and the Road Ahead.
IT Prof., 2022

CovertSYS: A systematic covert communication approach for providing secure end-to-end conversation via social networks.
J. Inf. Secur. Appl., 2022

Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".
Inf. Syst. Frontiers, 2022

Segmentation mask and feature similarity loss guided GAN for object-oriented image-to-image translation.
Inf. Process. Manag., 2022

A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings.
IEEE Internet Things J., 2022

Privacy-Preserving Threshold Spatial Keyword Search in Cloud-Assisted IIoT.
IEEE Internet Things J., 2022

Service Migration Across Edge Devices in 6G-Enabled Internet of Vehicles Networks.
IEEE Internet Things J., 2022

Consumer, Commercial, and Industrial IoT (In)Security: Attack Taxonomy and Case Studies.
IEEE Internet Things J., 2022

A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things.
IEEE Internet Things J., 2022

SCS-WoT: Secure Communication Scheme for Web of Things Deployment.
IEEE Internet Things J., 2022

A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022

Privacy-Preserving Threshold-Based Image Retrieval in Cloud-Assisted Internet of Things.
IEEE Internet Things J., 2022

Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT.
IEEE Internet Things J., 2022

Demand-Supply-Based Economic Model for Resource Provisioning in Industrial IoT Traffic.
IEEE Internet Things J., 2022

A Lightweight and Anonymous Authentication and Key Agreement Protocol for Wireless Body Area Networks.
IEEE Internet Things J., 2022

A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment.
IEEE Internet Things J., 2022

PUF-Based Authentication and Key Agreement Protocols for IoT, WSNs, and Smart Grids: A Comprehensive Survey.
IEEE Internet Things J., 2022

RESAT: A Utility-Aware Incentive Mechanism-Based Distributed Spatial Cloaking.
IEEE Internet Things J., 2022

Time-Controlled Hierarchical Multikeyword Search Over Encrypted Data in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

CAN Bus Messages Abnormal Detection Using Improved SVDD in Internet of Vehicles.
IEEE Internet Things J., 2022

A Redesigned Identity-Based Anonymous Authentication Scheme for Mobile-Edge Computing.
IEEE Internet Things J., 2022

A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems.
IEEE Internet Things J., 2022

Edge Computing and Lightning Network Empowered Secure Food Supply Management.
IEEE Internet Things J., 2022

Attacking the Edge-of-Things: A Physical Attack Perspective.
IEEE Internet Things J., 2022

Transparent Ciphertext Retrieval System Supporting Integration of Encrypted Heterogeneous Database in Cloud-Assisted IoT.
IEEE Internet Things J., 2022

Blockchain-Based Cross-Domain Authentication for Intelligent 5G-Enabled Internet of Drones.
IEEE Internet Things J., 2022

HAPPS: A Hidden Attribute and Privilege-Protection Data-Sharing Scheme With Verifiability.
IEEE Internet Things J., 2022

Boosting-Based DDoS Detection in Internet of Things Systems.
IEEE Internet Things J., 2022

Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT.
IEEE Internet Things J., 2022

Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey.
IEEE Internet Things J., 2022

An efficient IoT forensic approach for the evidence acquisition and analysis based on network link.
Log. J. IGPL, 2022

Editorial: The Inaugural Issue of ACM Distributed Ledger Technologies: Research and Practice.
Distributed Ledger Technol. Res. Pract., 2022

Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges.
ACM Comput. Surv., 2022

The Application of the Blockchain Technology in Voting Systems: A Review.
ACM Comput. Surv., 2022

Multi-Domain Virtual Network Embedding Algorithm based on Horizontal Federated Learning.
CoRR, 2022

Forensic Artefact Discovery and Attribution from Android Cryptocurrency Wallet Applications.
CoRR, 2022

BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis.
CoRR, 2022

On authenticated skyline query processing over road networks.
Concurr. Comput. Pract. Exp., 2022

A privacy preservation method for multiple-source unstructured data in online social networks.
Comput. Secur., 2022

Black-box adversarial attacks on XSS attack detection model.
Comput. Secur., 2022

Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function.
Comput. Secur., 2022

Rethinking maximum-margin softmax for adversarial robustness.
Comput. Secur., 2022

Privacy, accuracy, and model fairness trade-offs in federated learning.
Comput. Secur., 2022

Cyber security challenges in aviation communication, navigation, and surveillance.
Comput. Secur., 2022

The role of national cybersecurity strategies on the improvement of cybersecurity education.
Comput. Secur., 2022

A New Code-Based Blind Signature Scheme.
Comput. J., 2022

Artificial intelligence in cyber security: research advances, challenges, and opportunities.
Artif. Intell. Rev., 2022

Blockchain-based vehicular ad-hoc networks: A comprehensive survey.
Ad Hoc Networks, 2022

Blind Camcording-Resistant Video Watermarking in the DTCWT and SVD Domain.
IEEE Access, 2022

On the Efficiency and Security of Quantum-resistant Key Establishment Mechanisms on FPGA Platforms.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones.
Proceedings of the 23rd IEEE International Conference on Mobile Data Management, 2022

Lightweight Privacy-Preserving Spatial Keyword Query over Encrypted Cloud Data.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Forward and Backward Private Searchable Symmetric Encryption with Efficient Updates.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

BSCI 2022: The 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Reliable and Secure e-Health Networks.
Wirel. Pers. Commun., 2021

Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services.
IEEE Trans. Veh. Technol., 2021

Secure Semantic-Aware Search Over Dynamic Spatial Data in VANETs.
IEEE Trans. Veh. Technol., 2021

On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System.
IEEE Trans. Veh. Technol., 2021

Are You Dating Danger? An Interdisciplinary Approach to Evaluating the (In)Security of Android Dating Apps.
IEEE Trans. Sustain. Comput., 2021

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics.
IEEE Trans. Sustain. Comput., 2021

Signcryption Based Authenticated and Key Exchange Protocol for EI-Based V2G Environment.
IEEE Trans. Smart Grid, 2021

CryptCloud$^+$+: Secure and Expressive Data Access Control for Cloud Storage.
IEEE Trans. Serv. Comput., 2021

Privacy-Preserving Outsourced Clinical Decision Support System in the Cloud.
IEEE Trans. Serv. Comput., 2021

A Software/Hardware Co-Design of Crystals-Dilithium Signature Scheme.
ACM Trans. Reconfigurable Technol. Syst., 2021

A Flow-based Multi-agent Data Exfiltration Detection Architecture for Ultra-low Latency Networks.
ACM Trans. Internet Techn., 2021

Introduction to the Special Issue on Decentralized Blockchain Applications and Infrastructures for Next Generation Cyber-Physical Systems.
ACM Trans. Internet Techn., 2021

Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing.
ACM Trans. Internet Techn., 2021

SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks.
IEEE Trans. Netw. Sci. Eng., 2021

Blockchain-Enabled Authentication Handover With Efficient Privacy Protection in SDN-Based 5G Networks.
IEEE Trans. Netw. Sci. Eng., 2021

A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems.
IEEE Trans. Netw. Sci. Eng., 2021

Multi-Area Throughput and Energy Optimization of UAV-Aided Cellular Networks Powered by Solar Panels and Grid.
IEEE Trans. Mob. Comput., 2021

A Novel Privacy Preserving Framework for Large Scale Graph Data Publishing.
IEEE Trans. Knowl. Data Eng., 2021

BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2021

Blockchain-Enabled Trustworthy Group Communications in UAV Networks.
IEEE Trans. Intell. Transp. Syst., 2021

Fault-Tolerant Multisubset Aggregation Scheme for Smart Grid.
IEEE Trans. Ind. Informatics, 2021

Secure and Verifiable Multikey Image Search in Cloud-Assisted Edge Computing.
IEEE Trans. Ind. Informatics, 2021

Enabling Privacy-Assured Fog-Based Data Aggregation in E-Healthcare Systems.
IEEE Trans. Ind. Informatics, 2021

A Fast Nearest Neighbor Search Scheme Over Outsourced Encrypted Medical Images.
IEEE Trans. Ind. Informatics, 2021

Semantic Learning Based Cross-Platform Binary Vulnerability Search For IoT Devices.
IEEE Trans. Ind. Informatics, 2021

OBFP: Optimized Blockchain-Based Fair Payment for Outsourcing Computations in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2021

Efficient and Privacy-Preserving Multi-Party Skyline Queries Over Encrypted Data.
IEEE Trans. Inf. Forensics Secur., 2021

CRSA: A Cryptocurrency Recovery Scheme Based on Hidden Assistance Relationships.
IEEE Trans. Inf. Forensics Secur., 2021

A Fuzzy Authentication System Based on Neural Network Learning and Extreme Value Statistics.
IEEE Trans. Fuzzy Syst., 2021

Privacy-Preserving Reinforcement Learning Design for Patient-Centric Dynamic Treatment Regimes.
IEEE Trans. Emerg. Top. Comput., 2021

Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.
IEEE Trans. Emerg. Top. Comput., 2021

PVOPM: Verifiable Privacy-Preserving Pattern Matching with Efficient Outsourcing in the Malicious Setting.
IEEE Trans. Dependable Secur. Comput., 2021

A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data.
IEEE Trans. Dependable Secur. Comput., 2021

Optimized Verifiable Fine-Grained Keyword Search in Dynamic Multi-Owner Settings.
IEEE Trans. Dependable Secur. Comput., 2021

DeepFuzzer: Accelerated Deep Greybox Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2021

Classification-Based and Energy-Efficient Dynamic Task Scheduling Scheme for Virtualized Cloud Data Center.
IEEE Trans. Cloud Comput., 2021

Provably Secure and Lightweight Identity-Based Authenticated Data Sharing Protocol for Cyber-Physical Cloud Environment.
IEEE Trans. Cloud Comput., 2021

A Game-based Thermal-Aware Resource Allocation Strategy for Data Centers.
IEEE Trans. Cloud Comput., 2021

PPChain: A Privacy-Preserving Permissioned Blockchain Architecture for Cryptocurrency and Other Regulated Applications.
IEEE Syst. J., 2021

A Survey of Blockchain Applications in the Energy Sector.
IEEE Syst. J., 2021

The Applications of Blockchain in Artificial Intelligence.
Secur. Commun. Networks, 2021

Digital forensic readiness intelligence crime repository.
Secur. Priv., 2021

Artificial Intelligence Technologies for COVID-19-Like Epidemics: Methods and Challenges.
IEEE Netw., 2021

Blockchain-Based Privacy Preservation for 5G-Enabled Drone Communications.
IEEE Netw., 2021

Blockchain-Based Secure Communication for Space Information Networks.
IEEE Netw., 2021

Semi-supervised anomaly detection algorithms: A comparative summary and future research directions.
Knowl. Based Syst., 2021

Spatial self-attention network with self-attention distillation for fine-grained image recognition.
J. Vis. Commun. Image Represent., 2021

Blockchain-enabled secure communications in smart cities.
J. Parallel Distributed Comput., 2021

A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.
J. Netw. Comput. Appl., 2021

Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions.
J. Netw. Comput. Appl., 2021

A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS).
J. Netw. Comput. Appl., 2021

Group trip planning and information seeking behaviours by mobile social media users: A study of tourists in Australia, Bangladesh and China.
J. Inf. Sci., 2021

A Special Section on Deep & Advanced Machine Learning Approaches for Human Behavior Analysis.
J. Inf. Process. Syst., 2021

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks.
KSII Trans. Internet Inf. Syst., 2021

Blockchain-based multi-party proof of assets with privacy preservation.
Inf. Sci., 2021

FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021

Forward and backward secure keyword search with flexible keyword shielding.
Inf. Sci., 2021

An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments.
IEEE Internet Things J., 2021

Efficient Policy-Hiding and Large Universe Attribute-Based Encryption With Public Traceability for Internet of Medical Things.
IEEE Internet Things J., 2021

An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021

IoTCop: A Blockchain-Based Monitoring Framework for Detection and Isolation of Malicious Devices in Internet-of-Things Systems.
IEEE Internet Things J., 2021

Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey.
IEEE Internet Things J., 2021

Efficient Certificateless Online/Offline Signature Scheme for Wireless Body Area Networks.
IEEE Internet Things J., 2021

PSL-MAAKA: Provably Secure and Lightweight Mutual Authentication and Key Agreement Protocol for Fully Public Channels in Internet of Medical Things.
IEEE Internet Things J., 2021

Toward Detection and Attribution of Cyber-Attacks in IoT-Enabled Cyber-Physical Systems.
IEEE Internet Things J., 2021

A Multikernel and Metaheuristic Feature Selection Approach for IoT Malware Threat Hunting in the Edge Layer.
IEEE Internet Things J., 2021

Edge Computing and Deep Learning Enabled Secure Multitier Network for Internet of Vehicles.
IEEE Internet Things J., 2021

SBBS: A Secure Blockchain-Based Scheme for IoT Data Credibility in Fog Environment.
IEEE Internet Things J., 2021

Blockchain-Based Key Management Scheme in Fog-Enabled IoT Systems.
IEEE Internet Things J., 2021

PADP: Efficient Privacy-Preserving Data Aggregation and Dynamic Pricing for Vehicle-to-Grid Networks.
IEEE Internet Things J., 2021

A Deep Blockchain Framework-Enabled Collaborative Intrusion Detection for Protecting IoT and Cloud Networks.
IEEE Internet Things J., 2021

Guest Editorial for Special Issue on Blockchain for Internet-of-Things and Cyber-Physical Systems.
IEEE CAA J. Autom. Sinica, 2021

Fighting COVID-19 and Future Pandemics With the Internet of Things: Security and Privacy Perspectives.
IEEE CAA J. Autom. Sinica, 2021

Analysis and Improvement of a Certificateless Signature Scheme for Resource-Constrained Scenarios.
IEEE Commun. Lett., 2021

DAD: A Distributed Anomaly Detection system using ensemble one-class statistical learning in edge networks.
Future Gener. Comput. Syst., 2021

Discovering communities from disjoint complex networks using Multi-Layer Ant Colony Optimization.
Future Gener. Comput. Syst., 2021

Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.
Future Gener. Comput. Syst., 2021

Editorial for accountability and privacy issues in blockchain and cryptocurrency.
Future Gener. Comput. Syst., 2021

Resurrecting anti-virtualization and anti-debugging: Unhooking your hooks.
Future Gener. Comput. Syst., 2021

PBC4occ: A novel contrast pattern-based classifier for one-class classification.
Future Gener. Comput. Syst., 2021

Ethereum smart contract security research: survey and future research opportunities.
Frontiers Comput. Sci., 2021

Security and privacy solutions in edge envisioned connected things environment.
Trans. Emerg. Telecommun. Technol., 2021

On the need for AI to triage encrypted data containers in U.S. law enforcement applications.
Digit. Investig., 2021

Capability-based IoT access control using blockchain.
Digit. Commun. Networks, 2021

A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.
CoRR, 2021

A design science approach to developing an integrated mobile app forensic framework.
Comput. Secur., 2021

NLP-based digital forensic investigation platform for online communications.
Comput. Secur., 2021

A survey of machine learning techniques in adversarial image forensics.
Comput. Secur., 2021

A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities.
Comput. Secur., 2021

A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management.
Comput. Secur., 2021

Universal location referencing and homomorphic evaluation of geospatial query.
Comput. Secur., 2021

A secure and trustworthy medical record sharing scheme based on searchable encryption and blockchain.
Comput. Networks, 2021

A secure and computationally efficient authentication and key agreement scheme for Internet of Vehicles.
Comput. Electr. Eng., 2021

Introduction to the special section on application of artificial intelligence in security of cyber physical systems (VSI-aicps).
Comput. Electr. Eng., 2021

An Efficient Access Control Scheme With Outsourcing and Attribute Revocation for Fog-Enabled E-Health.
IEEE Access, 2021

Secure, Robust and Flexible Cooperative Downloading Scheme for Highway VANETs.
IEEE Access, 2021

A Systematic Review of Bio-Cyber Interface Technologies and Security Issues for Internet of Bio-Nano Things.
IEEE Access, 2021

A Stochastic Packet Forwarding Algorithm in Flying Ad Hoc Networks: Design, Analysis, and Evaluation.
IEEE Access, 2021

Digital Forensics Subdomains: The State of the Art and Future Directions.
IEEE Access, 2021

A Digital Forensics Investigation of a Smart Scale IoT Ecosystem.
Proceedings of the 20th IEEE International Conference on Trust, 2021

BinDeep: Binary to Source Code Matching Using Deep Learning.
Proceedings of the 20th IEEE International Conference on Trust, 2021

Digital Forensics Education: Challenges and Future Opportunities.
Proceedings of the National Cyber Summit (NCS) Research Track 2021, 2021

Cross-domain authentication for 5G-enabled UAVs: a blockchain approach.
Proceedings of the DroneCom '21: Proceedings of the 4th ACM MobiCom Workshop on Drone Assisted Wireless Communications for 5G and Beyond, 2021

Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

DIEF: An Autopsy Module for Distributed Identification of E-mail Files from Disk Images.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

Do Dark Web and Cryptocurrencies Empower Cybercriminals?
Proceedings of the Digital Forensics and Cyber Crime - 12th EAI International Conference, 2021

Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Cyber Operations, Defence, and Forensics.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Effectiveness of Mobile Wiping Applications.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

Investigating Protected Health Information Leakage from Android Medical Applications.
Proceedings of the Future Access Enablers for Ubiquitous and Intelligent Infrastructures, 2021

Enhancing Challenge-based Collaborative Intrusion Detection Against Insider Attacks using Spatial Correlation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

Internet of Things (IoT) Security and Forensics: Challenges and Opportunities.
Proceedings of the CPSIoTSec '21: Proceedings of the 2th Workshop on CPS&IoT Security and Privacy, 2021

Investigating formation of Collective Identity driving the Black Lives Matter movement during COVID-19.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Public Blockchains Scalability: An Examination of Sharding and Segregated Witness.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

Blockchain in Cybersecurity Realm: An Overview.
Proceedings of the Blockchain Cybersecurity, Trust and Privacy, 2020

A multiview learning method for malware threat hunting: windows, IoT and android as case studies.
World Wide Web, 2020

Unified Biometric Privacy Preserving Three-Factor Authentication and Key Agreement for Cloud-Assisted Autonomous Vehicles.
IEEE Trans. Veh. Technol., 2020

BloCkEd: Blockchain-Based Secure Data Processing Framework in Edge Envisioned V2X Environment.
IEEE Trans. Veh. Technol., 2020

An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security.
IEEE Trans. Serv. Comput., 2020

Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain.
IEEE J. Biomed. Health Informatics, 2020

Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020

Smart Collaborative Automation for Receive Buffer Control in Multipath Industrial Networks.
IEEE Trans. Ind. Informatics, 2020

A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks.
IEEE Trans. Ind. Informatics, 2020

A Big Data-Enabled Consolidated Framework for Energy Efficient Software Defined Data Centers in IoT Setups.
IEEE Trans. Ind. Informatics, 2020

Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities.
IEEE Trans. Ind. Informatics, 2020

A Two-Dimensional Vectorized Secure Transmission Scheme for Wireless Communications.
IEEE Trans. Inf. Forensics Secur., 2020

Comments on "Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources".
IEEE Trans. Inf. Forensics Secur., 2020

BAS-VAS: A Novel Secure Protocol for Value Added Service Delivery to Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2020

DCAP: A Secure and Efficient Decentralized Conditional Anonymous Payment System Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2020

SecureNLP: A System for Multi-Party Privacy-Preserving Natural Language Processing.
IEEE Trans. Inf. Forensics Secur., 2020

SDTE: A Secure Blockchain-Based Data Trading Ecosystem.
IEEE Trans. Inf. Forensics Secur., 2020

An Ontological Graph Identification Method for Improving Localization of IP Prefix Hijacking in Network Systems.
IEEE Trans. Inf. Forensics Secur., 2020

An Enhanced Stacked LSTM Method With No Random Initialization for Malware Threat Hunting in Safety and Time-Critical Systems.
IEEE Trans. Emerg. Top. Comput. Intell., 2020

Guest Editorial: Introduction to the Special Section on Cyber Security Threats and Defense Advance.
IEEE Trans. Emerg. Top. Comput., 2020

Editorial: Blockchain Ecosystem - Technological and Management Opportunities and Challenges.
IEEE Trans. Engineering Management, 2020

Privacy-Preserving Cloud Establishment and Data Dissemination Scheme for Vehicular Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

BVPSMS: A Batch Verification Protocol for End-to-End Secure SMS for Mobile Users.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Outsourced Calculation Toolkit in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment.
IEEE Trans. Dependable Secur. Comput., 2020

Toward Artificial Emotional Intelligence for Cooperative Social Human-Machine Interaction.
IEEE Trans. Comput. Soc. Syst., 2020

Introduction to the Special Issue on User-Centric Security and Safety for CPS.
ACM Trans. Cyber Phys. Syst., 2020

A Provably Secure Two-Factor Authentication Scheme for USB Storage Devices.
IEEE Trans. Consumer Electron., 2020

A Secure Spectrum Handoff Mechanism in Cognitive Radio Networks.
IEEE Trans. Cogn. Commun. Netw., 2020

Privacy-Preserving Outsourced Support Vector Machine Design for Secure Drug Discovery.
IEEE Trans. Cloud Comput., 2020

Geospatial Event Detection by Grouping Emotion Contagion in Social Media.
IEEE Trans. Big Data, 2020

Efficient Obfuscation for Encrypted Identity-Based Signatures in Wireless Body Area Networks.
IEEE Syst. J., 2020

An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.
IEEE Syst. J., 2020

A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing.
IEEE Syst. J., 2020

White-Box Implementation of Shamir's Identity-Based Signature Scheme.
IEEE Syst. J., 2020

Efficient Certificateless Aggregate Signature Scheme for Performing Secure Routing in VANETs.
Secur. Commun. Networks, 2020

Machine Learning Empowered Content Delivery: Status, Challenges, and Opportunities.
IEEE Netw., 2020

Blockchain-Based Self-Tallying Voting System with Software Updates in Decentralized IoT.
IEEE Netw., 2020

AI4SAFE-IoT: an AI-powered secure architecture for edge layer of Internet of things.
Neural Comput. Appl., 2020

MMDA: Multidimensional and multidirectional data aggregation for edge computing-enhanced IoT.
J. Syst. Archit., 2020

A high-performance framework for a network programmable packet processor using P4 and FPGA.
J. Netw. Comput. Appl., 2020

FSFC: An input filter-based secure framework for smart contract.
J. Netw. Comput. Appl., 2020

Sidechain technologies in blockchain networks: An examination and state-of-the-art review.
J. Netw. Comput. Appl., 2020

Detecting Internet of Things attacks using distributed deep learning.
J. Netw. Comput. Appl., 2020

Blockchain-based identity management systems: A review.
J. Netw. Comput. Appl., 2020

R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity.
J. Netw. Comput. Appl., 2020

An efficient reinforcement learning-based Botnet detection approach.
J. Netw. Comput. Appl., 2020

Efficient NTRU Lattice-Based Certificateless Signature Scheme for Medical Cyber-Physical Systems.
J. Medical Syst., 2020

An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks.
J. Circuits Syst. Comput., 2020

A novel proxy-oriented public auditing scheme for cloud-based medical cyber physical systems.
J. Inf. Secur. Appl., 2020

CsiIBS: A post-quantum identity-based signature scheme based on isogenies.
J. Inf. Secur. Appl., 2020

An Ontology and Multi-Agent Based Decision Support Framework for Prefabricated Component Supply Chain.
Inf. Syst. Frontiers, 2020

Understanding Factors Influencing Employees' Consumptive and Contributive Use of Enterprise Social Networks.
Inf. Syst. Frontiers, 2020

A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services.
Inf. Sci., 2020

WOTS-S: A Quantum Secure Compact Signature Scheme for Distributed Ledger.
Inf. Sci., 2020

Blockchain-based system for secure outsourcing of bilinear pairings.
Inf. Sci., 2020

Differentially private publication of streaming trajectory data.
Inf. Sci., 2020

A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

Large-Universe Attribute-Based Encryption With Public Traceability for Cloud Storage.
IEEE Internet Things J., 2020

A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
IEEE Internet Things J., 2020

Blockchain-Based Lightweight Certificate Authority for Efficient Privacy-Preserving Location-Based Service in Vehicular Social Networks.
IEEE Internet Things J., 2020

An Ensemble of Deep Recurrent Neural Networks for Detecting IoT Cyber Attacks Using Network Traffic.
IEEE Internet Things J., 2020

Certificateless-Signcryption-Based Three-Factor User Access Control Scheme for IoT Environment.
IEEE Internet Things J., 2020

HomeChain: A Blockchain-Based Secure Mutual Authentication System for Smart Homes.
IEEE Internet Things J., 2020

Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment.
IEEE Internet Things J., 2020

Key-Free Authentication Protocol Against Subverted Indoor Smart Devices for Smart Home.
IEEE Internet Things J., 2020

BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020

Enabling Secure Cross-Modal Retrieval Over Encrypted Heterogeneous IoT Databases With Collective Matrix Factorization.
IEEE Internet Things J., 2020

Toward Secure and Provable Authentication for Internet of Things: Realizing Industry 4.0.
IEEE Internet Things J., 2020

Guest Editorial Special Issue on Edge-Cloud Interplay Based on SDN and NFV for Next-Generation IoT Applications.
IEEE Internet Things J., 2020

Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks.
IEEE Internet Things J., 2020

Imaging and fusing time series for wearable sensor-based human activity recognition.
Inf. Fusion, 2020

A framework for hierarchical division of retinal vascular networks.
Neurocomputing, 2020

Distributed signing protocol for IEEE P1363-compliant identity-based signature scheme.
IET Inf. Secur., 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

A crowdsourcing method for online social networks security assessment based on human-centric computing.
Hum. centric Comput. Inf. Sci., 2020

A Review of Supervised Classification based on Contrast Patterns: Applications, Trends, and Challenges.
J. Grid Comput., 2020

Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis.
J. Grid Comput., 2020

A task scheduling algorithm considering game theory designed for energy management in cloud computing.
Future Gener. Comput. Syst., 2020

Driverless vehicle security: Challenges and future research opportunities.
Future Gener. Comput. Syst., 2020

Sharpening the edge: Towards improved edge computing environment for mobile and IoT applications.
Future Gener. Comput. Syst., 2020

PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting.
Future Gener. Comput. Syst., 2020

Smart vehicle forensics: Challenges and case study.
Future Gener. Comput. Syst., 2020

Energy Management for Cyber-Physical Cloud Systems.
Future Gener. Comput. Syst., 2020

Lightweight privacy preserving data aggregation with batch verification for smart grid.
Future Gener. Comput. Syst., 2020

A provable-secure and practical two-party distributed signing protocol for SM2 signature algorithm.
Frontiers Comput. Sci., 2020

IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers.
Digit. Investig., 2020

A systematic literature review of blockchain cyber security.
Digit. Commun. Networks, 2020

A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions.
ACM Comput. Surv., 2020

Efficiently Constructing Adversarial Examples by Feature Watermarking.
CoRR, 2020

Cyberbullying detection in social media text based on character-level convolutional neural network with shortcuts.
Concurr. Comput. Pract. Exp., 2020

An opcode-based technique for polymorphic Internet of Things malware detection.
Concurr. Comput. Pract. Exp., 2020

Secure search for encrypted personal health records from big data NoSQL databases in cloud.
Computing, 2020

P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking.
Comput. Secur., 2020

Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities.
Comput. Secur., 2020

Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey.
Comput. Secur., 2020

Query-efficient label-only attacks against black-box machine learning models.
Comput. Secur., 2020

A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Comput. Secur., 2020

What's really '<i>Happn</i>ing'? A forensic analysis of Android and iOS <i>Happn</i> dating apps.
Comput. Secur., 2020

An improved two-hidden-layer extreme learning machine for malware hunting.
Comput. Secur., 2020

FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems.
Comput. Secur., 2020

Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images.
Comput. Secur., 2020

LinkedLegal: Investigating social media as evidence in courtrooms.
Comput. Law Secur. Rev., 2020

An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.
Sci. China Inf. Sci., 2020

Privacy concerns and benefits of engagement with social media-enabled apps: A privacy calculus perspective.
Comput. Hum. Behav., 2020

Consumer IoT: Security Vulnerability Case Studies and Solutions.
IEEE Consumer Electron. Mag., 2020

Introduction to the special section on blockchain technologies for industrial Internet of Things (SI-bciot).
Comput. Electr. Eng., 2020

Game theoretic resource allocation model for designing effective traffic safety solution against drunk driving.
Appl. Math. Comput., 2020

Lightweight Certificate-Based Public/Private Auditing Scheme Based on Bilinear Pairing for Cloud Storage.
IEEE Access, 2020

A Contrast Pattern-Based Scientometric Study of the QS World University Ranking.
IEEE Access, 2020

IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities.
IEEE Access, 2020

Have You Been a Victim of COVID-19-Related Cyber Incidents? Survey, Taxonomy, and Mitigation Strategies.
IEEE Access, 2020

A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks.
IEEE Access, 2020

A Flexible SDN-Based Architecture for Identifying and Mitigating Low-Rate DDoS Attacks Using Machine Learning.
IEEE Access, 2020

A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing.
IEEE Access, 2020

Categorization and Organization of Database Forensic Investigation Processes.
IEEE Access, 2020

Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Efficient and Secure Two-Party Distributed Signing Protocol for the GOST Signature Algorithm.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Specification-based Distributed Detection of Rank-related Attacks in RPL-based Resource-Constrained Real-Time Wireless Networks.
Proceedings of the IEEE Conference on Industrial Cyberphysical Systems, 2020

Efficient and Intelligent Attack Detection in Software Defined IoT Networks.
Proceedings of the 2020 IEEE International Conference on Embedded Software and Systems, 2020

Introduction to the Minitrack on Cybersecurity Investigations and Digital Forensics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Introduction to the Minitrack on Machine Learning and Cyber Threat Intelligence and Analytics.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Blockchain-Based Programmable Fog Architecture for Future Internet of Things Applications.
Proceedings of the IEEE Global Communications Conference, 2020

How Helpful are Comparative Reviews for Predicting Product demand?
Proceedings of the 28th European Conference on Information Systems, 2020

Propagation of Fake News on Social Media: Challenges and Opportunities.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

Evidence Identification and Acquisition Based on Network Link in an Internet of Things Environment.
Proceedings of the 13th International Conference on Computational Intelligence in Security for Information Systems, 2020

Experiential Learning in Digital Forensics.
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020

The Way Forward.
Proceedings of the Digital Forensic Education, An Experiential Learning Approach., 2020

Forensic Investigation of Ransomware Activities - Part 1.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

The Bitcoin-Network Protocol from a Forensic Perspective.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Forensic Investigation of PayPal Accounts.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Digital Forensic Approaches for Cloud Service Models: A Survey.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Long Term Evolution Network Security and Real-Time Data Extraction.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Defending IoT Devices from Malware.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

So, What's Next?
Proceedings of the Cyber and Digital Forensic Investigations, 2020

The Increasing Importance of Digital Forensics and Investigations in Law Enforcement, Government and Commercial Sectors.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Towards an Automated Process to Categorise Tor's Hidden Services.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Digital Forensic Investigation of Internet of Thing Devices: A Proposed Model and Case Studies.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

CCTV Forensics in the Big Data Era: Challenges and Approaches.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

Forensic Investigation of Ransomware Activities - Part 2.
Proceedings of the Cyber and Digital Forensic Investigations, 2020

2019
Authenticated key agreement scheme for fog-driven IoT healthcare system.
Wirel. Networks, 2019

Blockchain based secure data sharing system for Internet of vehicles: A position paper.
Veh. Commun., 2019

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
IEEE Trans. Sustain. Comput., 2019

Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
IEEE Trans. Sustain. Comput., 2019

Are you emotional or depressed? Learning about your emotional state from your music using machine learning.
J. Supercomput., 2019

Anonymity Preserving and Lightweight Multimedical Server Authentication Protocol for Telecare Medical Information System.
IEEE J. Biomed. Health Informatics, 2019

Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud.
IEEE Trans. Ind. Informatics, 2019

Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks.
IEEE Trans. Ind. Informatics, 2019

Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog.
IEEE Trans. Inf. Forensics Secur., 2019

HEDGE: Efficient Traffic Classification of Encrypted and Compressed Packets.
IEEE Trans. Inf. Forensics Secur., 2019

A Two-Layer Dimension Reduction and Two-Tier Classification Model for Anomaly-Based Intrusion Detection in IoT Backbone Networks.
IEEE Trans. Emerg. Top. Comput., 2019

Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Secur. Comput., 2019

A Crowdsensing-based Cyber-physical System for Drone Surveillance Using Random Finite Set Theory.
ACM Trans. Cyber Phys. Syst., 2019

On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
ACM Trans. Cyber Phys. Syst., 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 2.
IEEE Trans. Big Data, 2019

Special Issue on Big Data Applications in Cyber Security and Threat Intelligence - Part 1.
IEEE Trans. Big Data, 2019

A fuzzy-PSO system for indoor localization based on visible light communications.
Soft Comput., 2019

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks.
Secur. Commun. Networks, 2019

Improved t-SNE based manifold dimensional reduction for remote sensing data processing.
Multim. Tools Appl., 2019

A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method.
Mob. Networks Appl., 2019

Editorial: Security and Privacy in Internet of Things.
Mob. Networks Appl., 2019

Privacy-aware smart city: A case study in collaborative filtering recommender systems.
J. Parallel Distributed Comput., 2019

Cooperative unmanned aerial vehicles with privacy preserving deep vision for real-time object identification and tracking.
J. Parallel Distributed Comput., 2019

A provably secure and anonymous message authentication scheme for smart grids.
J. Parallel Distributed Comput., 2019

Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities.
J. Netw. Comput. Appl., 2019

Blockchain in healthcare applications: Research challenges and opportunities.
J. Netw. Comput. Appl., 2019

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Netw. Comput. Appl., 2019

Fog data analytics: A taxonomy and process model.
J. Netw. Comput. Appl., 2019

Using malware for the greater good: Mitigating data leakage.
J. Netw. Comput. Appl., 2019

Blockchain for smart communities: Applications, challenges and opportunities.
J. Netw. Comput. Appl., 2019

Cyber Kill Chain-Based Taxonomy of Advanced Persistent Threat Actors: Analogy of Tactics, Techniques, and Procedures.
J. Inf. Process. Syst., 2019

Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019

Convolutional Neural Network with Expert Knowledge for Hyperspectral Remote Sensing Imagery Classification.
KSII Trans. Internet Inf. Syst., 2019

Game theoretic security of quantum bit commitment.
Inf. Sci., 2019

Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data.
Inf. Sci., 2019

Intelligent temporal classification and fuzzy rough set-based feature selection algorithm for intrusion detection system in WSNs.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019

A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.
Inf. Sci., 2019

Privacy preserving similarity joins using MapReduce.
Inf. Sci., 2019

How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform.
IEEE Internet Things J., 2019

Learning-Aided User Identification Using Smartphone Sensors for Smart Homes.
IEEE Internet Things J., 2019

An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things.
IEEE Internet Things J., 2019

Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things.
IEEE Internet Things J., 2019

Fair and Dynamic Data Sharing Framework in Cloud-Assisted Internet of Everything.
IEEE Internet Things J., 2019

An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks.
IEEE Internet Things J., 2019

CL-CPPA: Certificate-Less Conditional Privacy-Preserving Authentication Protocol for the Internet of Vehicles.
IEEE Internet Things J., 2019

IoT Forensics: Amazon Echo as a Use Case.
IEEE Internet Things J., 2019

Secure and Efficient K Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem.
IEEE Internet Things J., 2019

Secure Range Search Over Encrypted Uncertain IoT Outsourced Data.
IEEE Internet Things J., 2019

Adaptive Fusion and Category-Level Dictionary Learning Model for Multiview Human Action Recognition.
IEEE Internet Things J., 2019

On Data Sovereignty in Cloud-Based Computation Offloading for Smart Cities Applications.
IEEE Internet Things J., 2019

Deep Belief Network for Meteorological Time Series Prediction in the Internet of Things.
IEEE Internet Things J., 2019

A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment.
IEEE Internet Things J., 2019

Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Int. J. Found. Comput. Sci., 2019

An IND-CCA2 secure post-quantum encryption scheme and a secure cloud storage use case.
Hum. centric Comput. Inf. Sci., 2019

Controllable and trustworthy blockchain-based cloud data management.
Future Gener. Comput. Syst., 2019

Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things.
Future Gener. Comput. Syst., 2019

Cracking Bitcoin wallets: I want what you have in the wallets.
Future Gener. Comput. Syst., 2019

A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise.
Future Gener. Comput. Syst., 2019

Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model.
Future Gener. Comput. Syst., 2019

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Gener. Comput. Syst., 2019

Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression.
Future Gener. Comput. Syst., 2019

Blockchain based searchable encryption for electronic health record sharing.
Future Gener. Comput. Syst., 2019

Comprehending the IoT cyber threat landscape: A data dimensionality reduction technique to infer and characterize Internet-scale IoT probing campaigns.
Digit. Investig., 2019

Designing Sensing as a Service (S2aaS) Ecosystem for Internet of Things.
CoRR, 2019

A relative privacy model for effective privacy preservation in transactional data.
Concurr. Comput. Pract. Exp., 2019

A hierarchical key pre-distribution scheme for fog networks.
Concurr. Comput. Pract. Exp., 2019

The role of the adversary model in applied security research.
Comput. Secur., 2019

<i>BEST</i>: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system.
Comput. Secur., 2019

Parking Management: A Blockchain-Based Privacy-Preserving System.
IEEE Consumer Electron. Mag., 2019

A post-quantum light weight 1-out-<i>n</i> oblivious transfer protocol.
Comput. Electr. Eng., 2019

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019

A systematic literature review and meta-analysis on artificial intelligence in penetration testing and vulnerability assessment.
Comput. Electr. Eng., 2019

An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems.
IEEE Access, 2019

A Novel Social Situation Analytics-Based Recommendation Algorithm for Multimedia Social Networks.
IEEE Access, 2019

IEEE Access Special Section Editorial: Internet-of-Things Big Data Trust Management.
IEEE Access, 2019

A Novel Internet of Things-Centric Framework to Mine Malicious Frequent Patterns.
IEEE Access, 2019

Detecting Malicious Social Bots Based on Clickstream Sequences.
IEEE Access, 2019

Hierarchical Adversarial Network for Human Pose Estimation.
IEEE Access, 2019

A Deep and Scalable Unsupervised Machine Learning System for Cyber-Attack Detection in Large-Scale Smart Grids.
IEEE Access, 2019

Joint Optimization of Area Throughput and Grid-Connected Microgeneration in UAV-Based Mobile Networks.
IEEE Access, 2019

Blockchain Applications for Industry 4.0 and Industrial IoT: A Review.
IEEE Access, 2019

Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers.
IEEE Access, 2019

Deep Android Malware Classification with API-Based Feature Graph.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Graph Database-Based Approach to Analyze Network Log Files.
Proceedings of the Network and System Security - 13th International Conference, 2019

Unmanned Aerial Vehicles (UAVs) Threat Analysis and a Routine Activity Theory Based Mitigation Approach.
Proceedings of the National Cyber Summit, 2019

Anomaly Detection with Graph Convolutional Networks for Insider Threat and Fraud Detection.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Warder: Online Insider Threat Detection System Using Multi-Feature Modeling and Graph-Based Correlation.
Proceedings of the 2019 IEEE Military Communications Conference, 2019

Data Sharing and Privacy for Patient IoT Devices Using Blockchain.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications.
Proceedings of the IEEE International Conference on Industrial Internet, 2019

Where Does My Product Stand? A Social Network Perspective on Online Product Reviews.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Energy Efficient Decentralized Authentication in Internet of Underwater Things Using Blockchain.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019

Practical Bayesian Poisoning Attacks on Challenge-Based Collaborative Intrusion Detection Networks.
Proceedings of the Computer Security - ESORICS 2019, 2019

Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on Smartphones.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

A Blockchain-based Framework for Detecting Malicious Mobile Applications in App Stores.
Proceedings of the 2019 IEEE Canadian Conference of Electrical and Computer Engineering, 2019

BlockIPFS - Blockchain-Enabled Interplanetary File System for Forensic and Trusted Data Traceability.
Proceedings of the IEEE International Conference on Blockchain, 2019

Complex contagions of information diffusion across social networking platforms.
Proceedings of the 25th Americas Conference on Information Systems, 2019

AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Dynamic public opinion evolvement modeling and supervision in social networks.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Blockchain-based security and access control for BIM big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Privacy-aware digital forensics.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Privacy verification of PhotoDNA based on machine learning.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Security of marine-information system.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

A watermark-based in situ access-control model for image big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Chaos-based communication systems.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.
Wirel. Commun. Mob. Comput., 2018

Rethinking Authentication on Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2018

Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wirel. Commun. Mob. Comput., 2018

Intelligent OS X malware threat detection with code inspection.
J. Comput. Virol. Hacking Tech., 2018

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Veh. Commun., 2018

Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Veh. Technol., 2018

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.
IEEE Trans. Sustain. Comput., 2018

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Netw. Serv. Manag., 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomed. Health Informatics, 2018

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Ind. Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Secur. Comput., 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Secur. Comput., 2018

Reliable Inversion in GF(2<sup>8</sup>) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources.
IEEE Trans. Big Data, 2018

DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence.
Soft Comput., 2018

A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
Soft Comput., 2018

Applications of computational intelligence in vehicle traffic congestion problem: a survey.
Soft Comput., 2018

Heterogeneous investment in spatial public goods game with mixed strategy.
Soft Comput., 2018

A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Secur. Commun. Networks, 2018

Security Measurements of Cyber Networks.
Secur. Commun. Networks, 2018

Multimedia Security: Novel Steganography and Privacy Preserving.
Secur. Commun. Networks, 2018

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Secur. Commun. Networks, 2018

FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.
Peer-to-Peer Netw. Appl., 2018

Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks.
Multim. Tools Appl., 2018

E-government multimedia big data platform for disaster management.
Multim. Tools Appl., 2018

Signature-based three-factor authenticated key exchange for internet of things applications.
Multim. Tools Appl., 2018

DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.
J. Parallel Distributed Comput., 2018

Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distributed Comput., 2018

Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distributed Comput., 2018

Micro-blog topic recommendation based on knowledge flow and user selection.
J. Comput. Sci., 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Sci., 2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Sci., 2018

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Netw. Comput. Appl., 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Netw. Comput. Appl., 2018

Multimedia big data computing and Internet of Things applications: A taxonomy and process model.
J. Netw. Comput. Appl., 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Netw. Comput. Appl., 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intell. Humaniz. Comput., 2018

Jo-DPMF: Differentially private matrix factorization learning through joint optimization.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

Task aware hybrid DVFS for multi-core real-time systems using machine learning.
Inf. Sci., 2018

Designing the Sensing as a Service Ecosystem for the Internet of Things.
IEEE Internet Things Mag., 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018

A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds.
IEEE Internet Things J., 2018

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet Things J., 2018

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.
IEEE Internet Things J., 2018

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet Things J., 2018

Mobile crowd sensing of human-like intelligence using social sensors: A survey.
Neurocomputing, 2018

Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Commun. Syst., 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptol. ePrint Arch., 2018

Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Gener. Comput. Syst., 2018

Stag hunt and trust emergence in social networks.
Future Gener. Comput. Syst., 2018

Enhancing privacy through uniform grid and caching in location-based services.
Future Gener. Comput. Syst., 2018

HEPart: A balanced hypergraph partitioning algorithm for big data applications.
Future Gener. Comput. Syst., 2018

A cloud-based remote sensing data production system.
Future Gener. Comput. Syst., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Gener. Comput. Syst., 2018

QRFence: A flexible and scalable QR link security detection framework for Android devices.
Future Gener. Comput. Syst., 2018

Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix.
Future Gener. Comput. Syst., 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Gener. Comput. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Gener. Comput. Syst., 2018

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps.
Future Gener. Comput. Syst., 2018

Measurements and security of complex networks and systems: Research advances and challenges.
Future Gener. Comput. Syst., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Gener. Comput. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Gener. Comput. Syst., 2018

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerg. Telecommun. Technol., 2018

User influence analysis for Github developer social networks.
Expert Syst. Appl., 2018

Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wirel. Commun. Netw., 2018

A model for sentiment and emotion analysis of unstructured social media text.
Electron. Commer. Res., 2018

Digital forensic investigation of two-way radio communication equipment and services.
Digit. Investig., 2018

A blockchain future for internet of things security: a position paper.
Digit. Commun. Networks, 2018

Non-Reciprocity Compensation Combined with Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
CoRR, 2018

Ubuntu One Investigation: Detecting Evidences on Client Machines.
CoRR, 2018

Greening Cloud-Enabled Big Data Storage Forensics: Syncany as a Case Study.
CoRR, 2018

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing.
CoRR, 2018

CloudMe Forensics: A Case of Big-Data Investigation.
CoRR, 2018

IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study.
CoRR, 2018

CloudMe forensics: A case of big data forensic investigation.
Concurr. Comput. Pract. Exp., 2018

Visual Question Authentication Protocol (VQAP).
Comput. Secur., 2018

Identifying 3D printer residual data via open-source documentation.
Comput. Secur., 2018

Internet- and cloud-of-things cybersecurity research challenges and advances.
Comput. Secur., 2018

An efficient privacy mechanism for electronic health records.
Comput. Secur., 2018

Cyber-physical systems information gathering: A smart home case study.
Comput. Networks, 2018

Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Commun. Mag., 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Commun. Mag., 2018

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.
IEEE Commun. Mag., 2018

Performance prediction of parallel computing models to analyze cloud-based big data applications.
Clust. Comput., 2018

Cloud forecasting: Legal visibility issues in saturated environments.
Comput. Law Secur. Rev., 2018

Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security.
IEEE Cloud Comput., 2018

Blockchain-Enabled Reengineering of Cloud Datacenters.
IEEE Cloud Comput., 2018

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
IEEE Cloud Comput., 2018

Cloud Message Queueing and Notification: Challenges and Opportunities.
IEEE Cloud Comput., 2018

Cloud Reliability: Possible Sources of Security and Legal Issues?
IEEE Cloud Comput., 2018

Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications.
IEEE Cloud Comput., 2018

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.
IEEE Cloud Comput., 2018

Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018

Information privacy in online social networks: Uses and gratification perspective.
Comput. Hum. Behav., 2018

Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.
IEEE Consumer Electron. Mag., 2018

A smartphone-based wearable sensors for monitoring real-time physiological data.
Comput. Electr. Eng., 2018

Crowd computing for social media ecosystems.
Appl. Soft Comput., 2018

Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Appl. Math. Comput., 2018

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage.
IEEE Access, 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials.
IEEE Access, 2018

IoT Device Forensics and Data Reduction.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Lightweight Path Authentication Protocol for RFID-Based Supply Chains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Forensic Investigation Framework for Smart Home Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Browser Analysis of Residual Facebook Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018

User Relationship Classification of Facebook Messenger Mobile Data using WEKA.
Proceedings of the Network and System Security - 12th International Conference, 2018

Walking on the Cloud: Gait Recognition, a Wearable Solution.
Proceedings of the Network and System Security - 12th International Conference, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks.
Proceedings of the IEEE International Conference on Industrial Internet, 2018

Multi-item Passphrases: A Self-adaptive Approach Against Offline Guessing Attacks.
Proceedings of the Digital Forensics and Cyber Crime - 10th International EAI Conference, 2018

An Extended Exploration to the Epidemic Containment Game.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

Using Social Media Data to Improve Situational Awareness during Emergent Events.
Proceedings of the 24th Americas Conference on Information Systems, 2018

A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Intelligent Home Assistant Use in the Home Environment.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-13-0262-6, 2018

Big Digital Forensic Data - Volume 1: Data Reduction Framework and Selective Imaging
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7762-3, 2018

2017
Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications.
Wirel. Pers. Commun., 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
J. Supercomput., 2017

Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web.
IEEE Trans. Ind. Informatics, 2017

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Inf. Forensics Secur., 2017

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Inf. Forensics Secur., 2017

Social Sensors Based Online Attention Computing of Public Safety Events.
IEEE Trans. Emerg. Top. Comput., 2017

SIPF: A Secure Installment Payment Framework for Drive-Thru Internet.
ACM Trans. Embed. Comput. Syst., 2017

Embedded Device Forensics and Security.
ACM Trans. Embed. Comput. Syst., 2017

Emerging Embedded and Cyber Physical System Security Challenges and Innovations.
IEEE Trans. Dependable Secur. Comput., 2017

Cloud Security Engineering: Theory, Practice and Future Research.
IEEE Trans. Cloud Comput., 2017

Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data.
Softw. Pract. Exp., 2017

A cloud-based taxi trace mining framework for smart city.
Softw. Pract. Exp., 2017

Is the data on your wearable device secure? An Android Wear smartwatch case study.
Softw. Pract. Exp., 2017

Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification.
Soft Comput., 2017

SVM or deep learning? A comparative study on remote sensing image classification.
Soft Comput., 2017

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model".
Secur. Commun. Networks, 2017

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model.
Secur. Commun. Networks, 2017

Practical <i>m</i>-<i>k</i>-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Secur. Commun. Networks, 2017

Erratum to: Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

Special issue on security and privacy for smart cities.
Pers. Ubiquitous Comput., 2017

V2X security: A case study of anonymous authentication.
Pervasive Mob. Comput., 2017

Guest Editorial: Multimedia Social Network Security and Applications.
Multim. Tools Appl., 2017

A biologically inspired spatio-chromatic feature for color object recognition.
Multim. Tools Appl., 2017

Tamper detection and image recovery for BTC-compressed images.
Multim. Tools Appl., 2017

A password based authentication scheme for wireless multimedia systems.
Multim. Tools Appl., 2017

Forensic taxonomy of android productivity apps.
Multim. Tools Appl., 2017

The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.
Mob. Networks Appl., 2017

Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distributed Comput., 2017

EPLS: A novel feature extraction method for migration data clustering.
J. Parallel Distributed Comput., 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Netw. Comput. Appl., 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Netw. Comput. Appl., 2017

Pervasive social networking forensics: Intelligence and evidence from mobile device extracts.
J. Netw. Comput. Appl., 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Netw. Comput. Appl., 2017

Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017

Secure outsourcing of modular exponentiations under single untrusted programme model.
J. Comput. Syst. Sci., 2017

Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017

Building spatial temporal relation graph of concepts pair using web repository.
Inf. Syst. Frontiers, 2017

Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies.
IEEE Internet Things J., 2017

Air quality data clustering using EPLS method.
Inf. Fusion, 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptol. ePrint Arch., 2017

Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Gener. Comput. Syst., 2017

Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Gener. Comput. Syst., 2017

An optimized approach for massive web page classification using entity similarity based on semantic network.
Future Gener. Comput. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Gener. Comput. Syst., 2017

A technique to circumvent SSL/TLS validations on iOS devices.
Future Gener. Comput. Syst., 2017

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digit. Investig., 2017

Searchable Symmetric Encryption: Designs and Challenges.
ACM Comput. Surv., 2017

SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Comput. Stand. Interfaces, 2017

Mobile cloud security: An adversary model for lightweight browser security.
Comput. Stand. Interfaces, 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Comput. Stand. Interfaces, 2017

Performance of Android Forensics Data Recovery Tools.
CoRR, 2017

Forensic Investigation of P2P Cloud Storage: BitTorrent Sync as a Case Study.
CoRR, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
CoRR, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
CoRR, 2017

Honeypots for employee information security awareness and education training: A conceptual EASY training model.
CoRR, 2017

Cloud incident handling and forensic-by-design: cloud storage as a case study.
Concurr. Comput. Pract. Exp., 2017

Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.
Concurr. Comput. Pract. Exp., 2017

Astroturfing detection in social media: a binary n-gram-based approach.
Concurr. Comput. Pract. Exp., 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.
Concurr. Comput. Pract. Exp., 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurr. Comput. Pract. Exp., 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Comput. Secur., 2017

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Comput. Secur., 2017

Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review.
Comput. Secur., 2017

Resilient interconnection in cyber-physical control systems.
Comput. Secur., 2017

Secure hitch in location based social networks.
Comput. Commun., 2017

An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Comput. Commun., 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Comput. Networks, 2017

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Commun. Mag., 2017

Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging.
IEEE Cloud Comput., 2017

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Comput., 2017

Evidence and Forensics in the Cloud: Challenges and Future Research Directions.
IEEE Cloud Comput., 2017

Context Aware Ubiquitous Biometrics in Edge of Military Things.
IEEE Cloud Comput., 2017

Biometrics in the Cloud: Challenges and Research Opportunities.
IEEE Cloud Comput., 2017

I-Marks: An iris code embedding system for ownership identification of multimedia content.
Comput. Electr. Eng., 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Comput. Electr. Eng., 2017

Machine learning aided Android malware classification.
Comput. Electr. Eng., 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Comput. Electr. Eng., 2017

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Comput. Electr. Eng., 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Appl. Math. Comput., 2017

Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Appl. Math. Comput., 2017

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Appl. Math. Comput., 2017

Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.
IEEE Access, 2017

IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics.
IEEE Access, 2017

A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017

Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core.
IEEE Access, 2017

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things.
IEEE Access, 2017

Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Volkswagen Car Entertainment System Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Situational Crime Prevention and the Mitigation of Cloud Computing Threats.
Proceedings of the Security and Privacy in Communication Networks, 2017

Identification of Forensic Artifacts in VMWare Virtualized Computing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Manipulating the Five V's in the Next Generation Air Transportation System.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Visualization Scheme for Network Forensics Based on Attribute Oriented Induction Based Frequent Item Mining and Hyper Graph.
Proceedings of the Digital Forensics and Cyber Crime - 9th International Conference, 2017

Making Decisions about Self-Disclosure in Online Social Networks.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Investigating Mobile Social Media Users? Behaviors in Tourism Collaborative Information Seeking.
Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval, 2017

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Research Challenges and Opportunities in Big Forensic Data.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

The Effect of the Recommendation System in the Mobile App Market.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

A Study of the Effectiveness Abs Reliability of Android Free Anti-Mobile Malware Apps.
Proceedings of the Mobile Security and Privacy, 2017

Investigating America Online Instant Messaging Application: Data Remnants on Windows 8.1 Client Machine.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Forensic Visualization: Survey and Future Research Directions.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

The Role of Mobile Devices in Enhancing the Policing System to Improve Efficiency and Effectiveness.
Proceedings of the Mobile Security and Privacy, 2017

Implications of Emerging Technologies to Incident Handling and Digital Forensic Strategies: A Routine Activity Theory.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Performance of Android Forensics Data Recovery Tools.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Honeypots for Employee Information Security Awareness and Education Training: A Conceptual EASY Training Model.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

Contemporary Digital Forensics Investigations of Cloud and Mobile Applications.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

How Cyber-Savvy are Older Mobile Device Users?
Proceedings of the Mobile Security and Privacy, 2017

Mobile Security and Privacy.
Proceedings of the Mobile Security and Privacy, 2017

Forensic Readiness: A Case Study on Digital CCTV Systems Antiforensics.
Proceedings of the Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, 2017

2016
Internet of Things (IoT): Smart and Secure Service Delivery.
ACM Trans. Internet Techn., 2016

Intent-Based Extensible Real-Time PHP Supervision Framework.
IEEE Trans. Inf. Forensics Secur., 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Inf. Forensics Secur., 2016

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Inf. Forensics Secur., 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Inf. Forensics Secur., 2016

A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.
IEEE Trans. Inf. Forensics Secur., 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive Mob. Comput., 2016

Mobile security and privacy: Advances, challenges and future research directions.
Pervasive Mob. Comput., 2016

Guest Editorial: Network Forensics and Surveillance for Emerging Networks.
IEEE Netw., 2016

On the Analysis and Detection of Mobile Botnet Applications.
J. Univers. Comput. Sci., 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Netw. Comput. Appl., 2016

Web application protection techniques: A taxonomy.
J. Netw. Comput. Appl., 2016

User profiling in intrusion detection: A review.
J. Netw. Comput. Appl., 2016

Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles.
J. Netw. Comput. Appl., 2016

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.
J. Netw. Comput. Appl., 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016

Survey on key revocation mechanisms in wireless sensor networks.
J. Netw. Comput. Appl., 2016

Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016

Building the search pattern of web users using conceptual semantic space model.
Int. J. Web Grid Serv., 2016

An Improved Online/Offline Identity-Based Signature Scheme for WSNs.
Int. J. Netw. Secur., 2016

Cloud Cryptography: Theory, Practice and Future Research Directions.
Future Gener. Comput. Syst., 2016

Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media.
EURASIP J. Wirel. Commun. Netw., 2016

Internet data budget allocation policies for diverse smartphone applications.
EURASIP J. Wirel. Commun. Netw., 2016

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wirel. Commun. Netw., 2016

Android mobile VoIP apps: a survey and examination of their security and privacy.
Electron. Commer. Res., 2016

Cloud forensics: State-of-the-art and future directions.
Digit. Investig., 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digit. Investig., 2016

Windows Instant Messaging App Forensics: Facebook and Skype as Case Studies.
CoRR, 2016

Building knowledge base of urban emergency events based on crowdsourcing of social media.
Concurr. Comput. Pract. Exp., 2016

An adversary model to evaluate DRM protection of video contents on iOS devices.
Comput. Secur., 2016

Geographical information system parallelization for spatial big data processing: a review.
Clust. Comput., 2016

Big forensic data reduction: digital forensic images and electronic evidence.
Clust. Comput., 2016

PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment.
Clust. Comput., 2016

Forensic-by-Design Framework for Cyber-Physical Cloud Systems.
IEEE Cloud Comput., 2016

Live Migration in Emerging Cloud Paradigms.
IEEE Cloud Comput., 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Comput., 2016

Challenges in Delivering Software in the Cloud as Microservices.
IEEE Cloud Comput., 2016

Encryption-Based Solution for Data Sovereignty in Federated Clouds.
IEEE Cloud Comput., 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Comput., 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Comput., 2016

Context-oriented web application protection model.
Appl. Math. Comput., 2016

A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016

Tinder Me Softly - How Safe Are You Really on Tinder?
Proceedings of the Security and Privacy in Communication Networks, 2016

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

The role of mobile forensics in terrorism investigations involving the use of cloud apps.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Provably Secure Blind Signature Based on Coding Theory.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

An Android Social App Forensics Adversary Model.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Improving Security Awareness in the Government Sector.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Change-point cloud DDoS detection using packet inter-arrival time.
Proceedings of the 2016 8th Computer Science and Electronic Engineering Conference, 2016

Next Generation Aircraft Architecture and Digital Forensic.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Application of HAZOP to the Design of Cyber Security Experiments.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms.
J. Organ. Comput. Electron. Commer., 2015

A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles.
Informatica, 2015

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies.
Educ. Inf. Technol., 2015

Cyber security readiness in the South Australian Government.
Comput. Stand. Interfaces, 2015

Efficient and Anonymous Two-Factor User Authentication in Wireless Sensor Networks: Achieving User Anonymity with Lightweight Sensor Computation.
CoRR, 2015

Mobile Cloud Forensics: An Analysis of Seven Popular Android Apps.
CoRR, 2015

Conceptual evidence collection and analysis methodology for Android devices.
CoRR, 2015

A Forensically Sound Adversary Model for Mobile Devices.
CoRR, 2015

A survey of information security incident handling in the cloud.
Comput. Secur., 2015

Exfiltrating data from Android devices.
Comput. Secur., 2015

Trustworthy Processing of Healthcare Big Data in Hybrid Clouds.
IEEE Cloud Comput., 2015

Cloud Attack and Risk Assessment Taxonomy.
IEEE Cloud Comput., 2015

A Cloud-Focused Mobile Forensics Methodology.
IEEE Cloud Comput., 2015

Balancing Privacy with Legitimate Surveillance and Lawful Data Access.
IEEE Cloud Comput., 2015

A Review of Free Cloud-Based Anti-Malware Apps for Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Forensic Collection and Analysis of Thumbnails in Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Android Cache Taxonomy and Forensic Process.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

What Influences Employees to Use Enterprise Social Networks? A Socio-Technical Perspective.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

On Lightweight Security Enforcement in Cyber-Physical Systems.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis.
Proceedings of the 13th Australasian Information Security Conference, 2015

Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Privacy Risks in Mobile Dating Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Enterprise Social Networks: A Successful Implementation within a Telecommunication Company.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Forensic Taxonomy of Popular Android mHealth Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Online Social Networking Has a Greater Effect on Others than on Me: A Third-Person Effect Perspective.
Proceedings of the Australasian Conference on Information Systems, 2015

Using Multimedia Presentations to Improve Digital Forensic Understanding: A Pilot Study.
Proceedings of the Australasian Conference on Information Systems, 2015

Cloud security and forensic readiness: The current state of an IaaS provider.
Proceedings of the Cloud Security Ecosystem, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model.
Proceedings of the Cloud Security Ecosystem, 2015

Mobile cloud forensics: An analysis of seven popular Android apps.
Proceedings of the Cloud Security Ecosystem, 2015

Conceptual evidence collection and analysis methodology for Android devices.
Proceedings of the Cloud Security Ecosystem, 2015

Cloud security ecosystem.
Proceedings of the Cloud Security Ecosystem, 2015

CATRA: Conceptual cloud attack taxonomy and risk assessment framework.
Proceedings of the Cloud Security Ecosystem, 2015

2014
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption.
Secur. Commun. Networks, 2014

Google Drive: Forensic analysis of data remnants.
J. Netw. Comput. Appl., 2014

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014

Information security in the South Australian real estate industry: A study of 40 real estate organisations.
Inf. Manag. Comput. Secur., 2014

Impacts of increasing volume of digital forensic data: A survey and future research challenges.
Digit. Investig., 2014

Distributed filesystem forensics: XtreemFS as a case study.
Digit. Investig., 2014

Online child exploitation: Challenges and future research directions.
Comput. Law Secur. Rev., 2014

Cloud Forensic Technical Challenges and Solutions: A Snapshot.
IEEE Cloud Comput., 2014

Mobile Cloud Storage Users.
IEEE Cloud Comput., 2014

A Cloud Security Risk-Management Strategy.
IEEE Cloud Comput., 2014

Legal Issues in the Cloud.
IEEE Cloud Comput., 2014

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users.
Behav. Inf. Technol., 2014

Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Windows Event Forensic Process.
Proceedings of the Advances in Digital Forensics X, 2014

Enhancing User Privacy on Android Mobile Devices via Permissions Removal.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Building the Next Generation of Cyber Security Professionals.
Proceedings of the 22st European Conference on Information Systems, 2014

Should there be a New Body of Law for Cyber Space?
Proceedings of the 22st European Conference on Information Systems, 2014

Multi-sender Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Forensic Analysis of Windows Thumbcache files.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Cloud Storage Forensics.
Syngress Publishing / Elsevier, ISBN: 978-0-12-419970-5, 2014

2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
KSII Trans. Internet Inf. Syst., 2013

An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2013

On the security of a password-only authenticated three-party key exchange protocol.
IACR Cryptol. ePrint Arch., 2013

Digital droplets: Microsoft SkyDrive forensic data remnants.
Future Gener. Comput. Syst., 2013

Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Digit. Investig., 2013

Dropbox analysis: Data remnants on user machines.
Digit. Investig., 2013

Cloud storage forensics: ownCloud as a case study.
Digit. Investig., 2013

New payment methods: A review of 2010-2012 FATF mutual evaluation reports.
Comput. Secur., 2013

Cloud computing and its implications for cybercrime investigations in Australia.
Comput. Law Secur. Rev., 2013

Data Recovery from Proprietary Formatted Cctv Hard Disks.
Proceedings of the Advances in Digital Forensics IX, 2013

Digital Camcorder Forensics.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.
SIGACT News, 2012

An integrated conceptual digital forensic framework for cloud computing.
Digit. Investig., 2012

2011
The cyber threat landscape: Challenges and future research directions.
Comput. Secur., 2011

An ID-based digital watermarking protocol for copyright protection.
Comput. Electr. Eng., 2011

2010
On the security of an enhanced novel access control protocol for wireless sensor networks.
IEEE Trans. Consumer Electron., 2010

High tech criminal threats to the national information infrastructure.
Inf. Secur. Tech. Rep., 2010

Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Secure Key Establishment
Advances in Information Security 41, Springer, ISBN: 978-0-387-87968-0, 2009

An improved identity-based key agreement protocol and its security proof.
Inf. Sci., 2009

Security weakness in a dynamic program update protocol for wireless sensor networks.
IEEE Commun. Lett., 2009

On the anonymity of some authentication schemes for wireless communications.
IEEE Commun. Lett., 2009

Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Sci. China Ser. F Inf. Sci., 2009

2008
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols.
Int. J. Netw. Secur., 2008

Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2008

Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition.
Comput. J., 2008

2007
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker.
Informatica, 2007

Strongly-Secure Identity-based Key Agreement and Anonymous Extension.
IACR Cryptol. ePrint Arch., 2007

A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.
Comput. J., 2007

Secret Signatures: How to Achieve Business Privacy Efficiently?
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007

2006
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.
Informatica, 2006

Issue report on business adoption of Microsoft Passport.
Inf. Manag. Comput. Secur., 2006

Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol.
Int. J. Netw. Secur., 2006

On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol.
Int. J. Netw. Secur., 2006

New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptol. ePrint Arch., 2006

The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Comput. Commun., 2006

Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Formal analysis of secure contracting protocol for e-tendering.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols.
Int. J. Netw. Secur., 2005

Errors in Computational Complexity Proofs for Protocols.
IACR Cryptol. ePrint Arch., 2005

Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
IACR Cryptol. ePrint Arch., 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptol. ePrint Arch., 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols.
Proceedings of the Progress in Cryptology, 2005

Security of Two-Party Identity-Based Key Agreement.
Proceedings of the Progress in Cryptology, 2005

A Secure Anonymous Authorisation Architecture for E-Commerce.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
IACR Cryptol. ePrint Arch., 2004

Complementing Computational Protocol Analysis with Formal Specifications.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A user-centric anonymous authorisation framework in e-commerce environment.
Proceedings of the 6th International Conference on Electronic Commerce, 2004


  Loading...