Kim-Kwang Raymond Choo

According to our database1, Kim-Kwang Raymond Choo authored at least 447 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning.
T-SUSC, 2019

Fuzzy-Folded Bloom Filter-as-a-Service for Big Data Storage in the Cloud.
IEEE Trans. Industrial Informatics, 2019

Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Information Forensics and Security, 2019

Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems.
IEEE Trans. Dependable Sec. Comput., 2019

On Reliability Analysis of Smart Grids under Topology Attacks: A Stochastic Petri Net Approach.
TCPS, 2019

Improved t-SNE based manifold dimensional reduction for remote sensing data processing.
Multimedia Tools Appl., 2019

Privacy-aware smart city: A case study in collaborative filtering recommender systems.
J. Parallel Distrib. Comput., 2019

Implementation of deep packet inspection in smart grids and industrial Internet of Things: Challenges and opportunities.
J. Network and Computer Applications, 2019

Blockchain in healthcare applications: Research challenges and opportunities.
J. Network and Computer Applications, 2019

AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities.
J. Network and Computer Applications, 2019

Fog data analytics: A taxonomy and process model.
J. Network and Computer Applications, 2019

Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
J. Comput. Syst. Sci., 2019

Game theoretic security of quantum bit commitment.
Inf. Sci., 2019

A lightweight machine learning-based authentication framework for smart IoT devices.
Inf. Sci., 2019

Privacy-preserving model and generalization correlation attacks for 1: M data with multiple sensitive attributes.
Inf. Sci., 2019

A heuristic line piloting method to disclose malicious taxicab driver's privacy over GPS big data.
Inf. Sci., 2019

Controllable and trustworthy blockchain-based cloud data management.
Future Generation Comp. Syst., 2019

Multi-dimensional data indexing and range query processing via Voronoi diagram for internet of things.
Future Generation Comp. Syst., 2019

Cracking Bitcoin wallets: I want what you have in the wallets.
Future Generation Comp. Syst., 2019

DRTHIS: Deep ransomware threat hunting and intelligence system at the fog layer.
Future Generation Comp. Syst., 2019

Distributed machine learning cloud teleophthalmology IoT for predicting AMD disease progression.
Future Generation Comp. Syst., 2019

The role of the adversary model in applied security research.
Computers & Security, 2019

Detecting Malicious Social Bots Based on Clickstream Sequences.
IEEE Access, 2019

Where Does My Product Stand? A Social Network Perspective on Online Product Reviews.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Private Cloud Storage Forensics: Seafile as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Forensic Investigation of Cross Platform Massively Multiplayer Online Games: Minecraft as a Case Study.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Security in Online Games: Current Implementations and Challenges.
Proceedings of the Handbook of Big Data and IoT Security, 2019

Big Data and Internet of Things Security and Forensics: Challenges and Opportunities.
Proceedings of the Handbook of Big Data and IoT Security, 2019

2018
BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT.
Wireless Communications and Mobile Computing, 2018

Rethinking Authentication on Smart Mobile Devices.
Wireless Communications and Mobile Computing, 2018

Security and Privacy Challenges for Internet-of-Things and Fog Computing.
Wireless Communications and Mobile Computing, 2018

Intelligent OS X malware threat detection with code inspection.
J. Computer Virology and Hacking Techniques, 2018

EPA-CPPA: An efficient, provably-secure and anonymous conditional privacy-preserving authentication scheme for vehicular ad hoc networks.
Vehicular Communications, 2018

Three-Stage Stackelberg Game for Defending Against Full-Duplex Active Eavesdropping Attacks in Cooperative Communication.
IEEE Trans. Vehicular Technology, 2018

Efficient Identity-Based Encryption Scheme with Equality Test in Smart City.
T-SUSC, 2018

Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks.
IEEE Trans. Network and Service Management, 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
IEEE J. Biomedical and Health Informatics, 2018

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things.
IEEE Trans. Industrial Informatics, 2018

Cryptographic Solutions for Industrial Internet-of-Things: Research Challenges and Opportunities.
IEEE Trans. Industrial Informatics, 2018

Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers.
IEEE Trans. Dependable Sec. Comput., 2018

A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network.
IEEE Trans. Dependable Sec. Comput., 2018

Reliable Inversion in GF(28) With Redundant Arithmetic for Secure Error Detection of Cryptographic Architectures.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

From Latency, Through Outbreak, to Decline: Detecting Different States of Emergency Events Using Web Resources.
IEEE Trans. Big Data, 2018

DUK-SVD: dynamic dictionary updating for sparse representation of a long-time remote sensing image sequence.
Soft Comput., 2018

A novel fuzzy gaussian-based dissimilarity measure for discovering similarity temporal association patterns.
Soft Comput., 2018

Applications of computational intelligence in vehicle traffic congestion problem: a survey.
Soft Comput., 2018

Heterogeneous investment in spatial public goods game with mixed strategy.
Soft Comput., 2018

A General Architecture for Multiserver Authentication Key Agreement with Provable Security.
Security and Communication Networks, 2018

Security Measurements of Cyber Networks.
Security and Communication Networks, 2018

Multimedia Security: Novel Steganography and Privacy Preserving.
Security and Communication Networks, 2018

An Efficient and Provably-Secure Certificateless Proxy-Signcryption Scheme for Electronic Prescription System.
Security and Communication Networks, 2018

FGDA: Fine-grained data analysis in privacy-preserving smart grid communications.
Peer-to-Peer Networking and Applications, 2018

Feature extraction and classification of VHR images with attribute profiles and convolutional neural networks.
Multimedia Tools Appl., 2018

E-government multimedia big data platform for disaster management.
Multimedia Tools Appl., 2018

Signature-based three-factor authenticated key exchange for internet of things applications.
Multimedia Tools Appl., 2018

DADTA: A novel adaptive strategy for energy and performance efficient virtual machine consolidation.
J. Parallel Distrib. Comput., 2018

Efficient and secure searchable encryption protocol for cloud-based Internet of Things.
J. Parallel Distrib. Comput., 2018

Online task scheduling for edge computing based on repeated stackelberg game.
J. Parallel Distrib. Comput., 2018

Micro-blog topic recommendation based on knowledge flow and user selection.
J. Comput. Science, 2018

The convergence of new computing paradigms and big data analytics methodologies for online social networks.
J. Comput. Science, 2018

A cyber kill chain based taxonomy of banking Trojans for evolutionary computational intelligence.
J. Comput. Science, 2018

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0.
J. Network and Computer Applications, 2018

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments.
J. Network and Computer Applications, 2018

Multimedia big data computing and Internet of Things applications: A taxonomy and process model.
J. Network and Computer Applications, 2018

An untraceable and anonymous password authentication protocol for heterogeneous wireless sensor networks.
J. Network and Computer Applications, 2018

Detecting crypto-ransomware in IoT networks based on energy consumption footprint.
J. Ambient Intelligence and Humanized Computing, 2018

Jo-DPMF: Differentially private matrix factorization learning through joint optimization.
Inf. Sci., 2018

Enabling verifiable multiple keywords search over encrypted cloud data.
Inf. Sci., 2018

Task aware hybrid DVFS for multi-core real-time systems using machine learning.
Inf. Sci., 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet of Things Journal, 2018

A Privacy-Aware Architecture at the Edge for Autonomous Real-Time Identity Reidentification in Crowds.
IEEE Internet of Things Journal, 2018

A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things.
IEEE Internet of Things Journal, 2018

Privacy-Preserving Content-Oriented Wireless Communication in Internet-of-Things.
IEEE Internet of Things Journal, 2018

Nonreciprocity Compensation Combined With Turbo Codes for Secret Key Generation in Vehicular Ad Hoc Social IoT Networks.
IEEE Internet of Things Journal, 2018

Mobile crowd sensing of human-like intelligence using social sensors: A survey.
Neurocomputing, 2018

Efficient revocable ID-based encryption with cloud revocation server.
Int. J. Communication Systems, 2018

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IACR Cryptology ePrint Archive, 2018

The Role of the Adversary Model in Applied Security Research.
IACR Cryptology ePrint Archive, 2018

Efficiently and securely harnessing cloud to solve linear regression and other matrix operations.
Future Generation Comp. Syst., 2018

Stag hunt and trust emergence in social networks.
Future Generation Comp. Syst., 2018

Enhancing privacy through uniform grid and caching in location-based services.
Future Generation Comp. Syst., 2018

HEPart: A balanced hypergraph partitioning algorithm for big data applications.
Future Generation Comp. Syst., 2018

A cloud-based remote sensing data production system.
Future Generation Comp. Syst., 2018

PAT: A precise reward scheme achieving anonymity and traceability for crowdcomputing in public clouds.
Future Generation Comp. Syst., 2018

QRFence: A flexible and scalable QR link security detection framework for Android devices.
Future Generation Comp. Syst., 2018

Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix.
Future Generation Comp. Syst., 2018

A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting.
Future Generation Comp. Syst., 2018

A robust biometrics based three-factor authentication scheme for Global Mobility Networks in smart city.
Future Generation Comp. Syst., 2018

Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Generation Comp. Syst., 2018

Circumventing iOS security mechanisms for APT forensic investigations: A security taxonomy for cloud apps.
Future Generation Comp. Syst., 2018

Measurements and security of complex networks and systems: Research advances and challenges.
Future Generation Comp. Syst., 2018

A foggy research future: Advances and future opportunities in fog computing research.
Future Generation Comp. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Generation Comp. Syst., 2018

Secure policy execution using reusable garbled circuit in the cloud.
Future Generation Comp. Syst., 2018

Security analysis and improvement of a mutual authentication and key agreement solution for wireless sensor networks using chaotic maps.
Trans. Emerging Telecommunications Technologies, 2018

User influence analysis for Github developer social networks.
Expert Syst. Appl., 2018

Secure and privacy-preserving 3D vehicle positioning schemes for vehicular ad hoc network.
EURASIP J. Wireless Comm. and Networking, 2018

A model for sentiment and emotion analysis of unstructured social media text.
Electronic Commerce Research, 2018

Digital forensic investigation of two-way radio communication equipment and services.
Digital Investigation, 2018

CloudMe forensics: A case of big data forensic investigation.
Concurrency and Computation: Practice and Experience, 2018

Visual Question Authentication Protocol (VQAP).
Computers & Security, 2018

Identifying 3D printer residual data via open-source documentation.
Computers & Security, 2018

Internet- and cloud-of-things cybersecurity research challenges and advances.
Computers & Security, 2018

An efficient privacy mechanism for electronic health records.
Computers & Security, 2018

Cyber-physical systems information gathering: A smart home case study.
Computer Networks, 2018

Securing Edge Devices in the Post-Quantum Internet of Things Using Lattice-Based Cryptography.
IEEE Communications Magazine, 2018

Security and Privacy for the Internet of Drones: Challenges and Solutions.
IEEE Communications Magazine, 2018

Achieving Energy Efficiency and Sustainability in Edge/Fog Deployment.
IEEE Communications Magazine, 2018

Trust Erosion: Dealing with Unknown-Unknowns in Cloud Security.
IEEE Cloud Computing, 2018

Blockchain-Enabled Reengineering of Cloud Datacenters.
IEEE Cloud Computing, 2018

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
IEEE Cloud Computing, 2018

Cloud Message Queueing and Notification: Challenges and Opportunities.
IEEE Cloud Computing, 2018

Cloud Reliability: Possible Sources of Security and Legal Issues?
IEEE Cloud Computing, 2018

Biometrics-as-a-Service: Cloud-Based Technology, Systems, and Applications.
IEEE Cloud Computing, 2018

Cloud-Based Biometrics (Biometrics as a Service) for Smart Cities, Nations, and Beyond.
IEEE Cloud Computing, 2018

Efficient Ring Signature and Group Signature Schemes Based on q-ary Identification Protocols.
Comput. J., 2018

Information privacy in online social networks: Uses and gratification perspective.
Computers in Human Behavior, 2018

Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices.
IEEE Consumer Electronics Magazine, 2018

A smartphone-based wearable sensors for monitoring real-time physiological data.
Computers & Electrical Engineering, 2018

Crowd computing for social media ecosystems.
Appl. Soft Comput., 2018

Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Applied Mathematics and Computation, 2018

An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment.
Ad Hoc Networks, 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage.
IEEE Access, 2018

Side-Channel Attack on a Protected RFID Card.
IEEE Access, 2018

A Novel Index for Assessing the Robustness of Integrated Electrical Network and a Natural Gas Network.
IEEE Access, 2018

Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018

A Secure and Practical RFID Ownership Transfer Protocol Based on Chebyshev Polynomials.
IEEE Access, 2018

IoT Device Forensics and Data Reduction.
IEEE Access, 2018

A New Transitively Closed Undirected Graph Authentication Scheme for Blockchain-Based Identity Management Systems.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

IEEE Access Special Section Editorial: Research Challenges and Opportunities in Security and Privacy of Blockchain Technologies.
IEEE Access, 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Lightweight Path Authentication Protocol for RFID-Based Supply Chains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Better Ocular Recognition for Secure Real-World Applications.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Are Your Neighbors Swingers or Kinksters? Feeld App Forensic Analysis.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted Domains.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Digital Blues: An Investigation Into the Use of Bluetooth Protocols.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Forensic Investigation Framework for Smart Home Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Browser Analysis of Residual Facebook Data.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Manipulating Visibility of Political and Apolitical Threads on Reddit via Score Boosting.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Event Reconstruction of Indonesian E-Banking Services on Windows Phone Devices.
Proceedings of the Security and Privacy in Communication Networks, 2018

An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia Presentations.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Provably-Secure Two-Factor Authenticated Key Exchange Protocol with Stronger Anonymity.
Proceedings of the Network and System Security - 12th International Conference, 2018

User Relationship Classification of Facebook Messenger Mobile Data using WEKA.
Proceedings of the Network and System Security - 12th International Conference, 2018

Walking on the Cloud: Gait Recognition, a Wearable Solution.
Proceedings of the Network and System Security - 12th International Conference, 2018

Prediction and Detection of Malicious Insiders' Motivation Based on Sentiment Profile on Webpages and Emails.
Proceedings of the 2018 IEEE Military Communications Conference, 2018

An Extended Exploration to the Epidemic Containment Game.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Blockchain-Based Security Layer for Identification and Isolation of Malicious Things in IoT: A Conceptual Design.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Canalization or Increased Diffusion? An Empirical Analysis on the Impact of the Recommendation System in the Mobile App Market.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Introduction to the Minitrack on Cyber-of-Things: Cyber Crimes, Cyber Security and Cyber Forensics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Introduction to the Minitrack on Cyber Threat Intelligence and Analytics.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

CyberPDF: Smart and Secure Coordinate-based Automated Health PDF Data Batch Extraction.
Proceedings of the Third IEEE/ACM International Conference on Connected Health: Applications, 2018

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.
Proceedings of the 28th Annual International Conference on Computer Science and Software Engineering, 2018

Using Social Media Data to Improve Situational Awareness during Emergent Events.
Proceedings of the 24th Americas Conference on Information Systems, 2018

A Conceptual Model to Understand Privacy Concerns in a Social P2P Payment App.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Intelligent Home Assistant Use in the Home Environment.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Big Digital Forensic Data - Volume 2: Quick Analysis for Evidence and Intelligence
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-13-0262-6, 2018

Big Digital Forensic Data - Volume 1: Data Reduction Framework and Selective Imaging
SpringerBriefs on Cyber Security Systems and Networks, Springer, ISBN: 978-981-10-7762-3, 2018

2017
Special Issue on Big Data Analytics and Network Applications for Cyber-Physical Systems Wireless Personal Communications.
Wireless Personal Communications, 2017

A secure and efficient public auditing scheme using RSA algorithm for cloud storage.
The Journal of Supercomputing, 2017

Hierarchy-Cutting Model Based Association Semantic for Analyzing Domain Topic on the Web.
IEEE Trans. Industrial Informatics, 2017

Efficient Hierarchical Identity-Based Signature With Batch Verification for Automatic Dependent Surveillance-Broadcast System.
IEEE Trans. Information Forensics and Security, 2017

A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification.
IEEE Trans. Information Forensics and Security, 2017

Social Sensors Based Online Attention Computing of Public Safety Events.
IEEE Trans. Emerging Topics Comput., 2017

SIPF: A Secure Installment Payment Framework for Drive-Thru Internet.
ACM Trans. Embedded Comput. Syst., 2017

Embedded Device Forensics and Security.
ACM Trans. Embedded Comput. Syst., 2017

Emerging Embedded and Cyber Physical System Security Challenges and Innovations.
IEEE Trans. Dependable Sec. Comput., 2017

Cloud Security Engineering: Theory, Practice and Future Research.
IEEE Trans. Cloud Computing, 2017

Big forensic data management in heterogeneous distributed systems: quick analysis of multimedia forensic data.
Softw., Pract. Exper., 2017

A cloud-based taxi trace mining framework for smart city.
Softw., Pract. Exper., 2017

Is the data on your wearable device secure? An Android Wear smartwatch case study.
Softw., Pract. Exper., 2017

Spectral-spatial multi-feature-based deep learning for hyperspectral remote sensing image classification.
Soft Comput., 2017

SVM or deep learning? A comparative study on remote sensing image classification.
Soft Comput., 2017

A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things.
Sensors, 2017

Erratum to "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model".
Security and Communication Networks, 2017

An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model.
Security and Communication Networks, 2017

Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party.
Security and Communication Networks, 2017

Erratum to: Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

Special issue on security and privacy for smart cities.
Personal and Ubiquitous Computing, 2017

V2X security: A case study of anonymous authentication.
Pervasive and Mobile Computing, 2017

Guest Editorial: Multimedia Social Network Security and Applications.
Multimedia Tools Appl., 2017

A biologically inspired spatio-chromatic feature for color object recognition.
Multimedia Tools Appl., 2017

Tamper detection and image recovery for BTC-compressed images.
Multimedia Tools Appl., 2017

A password based authentication scheme for wireless multimedia systems.
Multimedia Tools Appl., 2017

Forensic taxonomy of android productivity apps.
Multimedia Tools Appl., 2017

The Role of Mobile Forensics in Terrorism Investigations Involving the Use of Cloud Storage Service and Communication Apps.
MONET, 2017

Distributed host-based collaborative detection for false data injection attacks in smart grid cyber-physical system.
J. Parallel Distrib. Comput., 2017

EPLS: A novel feature extraction method for migration data clustering.
J. Parallel Distrib. Comput., 2017

Hypergraph partitioning for social networks based on information entropy modularity.
J. Network and Computer Applications, 2017

An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment.
J. Network and Computer Applications, 2017

Pervasive social networking forensics: Intelligence and evidence from mobile device extracts.
J. Network and Computer Applications, 2017

A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks.
J. Network and Computer Applications, 2017

Secure and flexible cloud-assisted association rule mining over horizontally partitioned databases.
J. Comput. Syst. Sci., 2017

Secure outsourcing of modular exponentiations under single untrusted programme model.
J. Comput. Syst. Sci., 2017

Special Issue on Cyber Security in the Critical Infrastructure: Advances and Future Directions.
J. Comput. Syst. Sci., 2017

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Sec. Appl., 2017

Building spatial temporal relation graph of concepts pair using web repository.
Information Systems Frontiers, 2017

Data Exfiltration From Internet of Things Devices: iOS Devices as Case Studies.
IEEE Internet of Things Journal, 2017

Air quality data clustering using EPLS method.
Information Fusion, 2017

Provably Secure Three-party Password Authenticated Key Exchange Protocol Based On Ring Learning With Error.
IACR Cryptology ePrint Archive, 2017

Efficient and secure identity-based encryption scheme with equality test in cloud computing.
Future Generation Comp. Syst., 2017

Associative retrieval in spatial big data based on spreading activation with semantic ontology.
Future Generation Comp. Syst., 2017

An optimized approach for massive web page classification using entity similarity based on semantic network.
Future Generation Comp. Syst., 2017

Design of a provably secure biometrics-based multi-cloud-server authentication scheme.
Future Generation Comp. Syst., 2017

A technique to circumvent SSL/TLS validations on iOS devices.
Future Generation Comp. Syst., 2017

A novel file carving algorithm for National Marine Electronics Association (NMEA) logs in GPS forensics.
Digital Investigation, 2017

Searchable Symmetric Encryption: Designs and Challenges.
ACM Comput. Surv., 2017

SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Computer Standards & Interfaces, 2017

Mobile cloud security: An adversary model for lightweight browser security.
Computer Standards & Interfaces, 2017

Pairing-based CP-ABE with constant-size ciphertexts and secret keys for cloud environment.
Computer Standards & Interfaces, 2017

Cloud incident handling and forensic-by-design: cloud storage as a case study.
Concurrency and Computation: Practice and Experience, 2017

Can Android VoIP voice conversations be decoded? I can eavesdrop on your Android VoIP communication.
Concurrency and Computation: Practice and Experience, 2017

Astroturfing detection in social media: a binary n-gram-based approach.
Concurrency and Computation: Practice and Experience, 2017

On the design of a secure user authentication and key agreement scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2017

Forensic data acquisition from cloud-of-things devices: windows Smartphones as a case study.
Concurrency and Computation: Practice and Experience, 2017

A secure and resilient cross-domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy.
Concurrency and Computation: Practice and Experience, 2017

Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones.
Computers & Security, 2017

Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions.
Computers & Security, 2017

Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review.
Computers & Security, 2017

Resilient interconnection in cyber-physical control systems.
Computers & Security, 2017

Secure hitch in location based social networks.
Computer Communications, 2017

An adaptive trust-Stackelberg game model for security and energy efficiency in dynamic cognitive radio networks.
Computer Communications, 2017

Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks.
Computer Networks, 2017

Vehicular Fog Computing: Architecture, Use Case, and Security and Forensic Challenges.
IEEE Communications Magazine, 2017

Cloud of Things in Smart Agriculture: Intelligent Irrigation Monitoring by Thermal Imaging.
IEEE Cloud Computing, 2017

Challenges of Connecting Edge and Cloud Computing: A Security and Forensic Perspective.
IEEE Cloud Computing, 2017

Evidence and Forensics in the Cloud: Challenges and Future Research Directions.
IEEE Cloud Computing, 2017

Context Aware Ubiquitous Biometrics in Edge of Military Things.
IEEE Cloud Computing, 2017

Biometrics in the Cloud: Challenges and Research Opportunities.
IEEE Cloud Computing, 2017

I-Marks: An iris code embedding system for ownership identification of multimedia content.
Computers & Electrical Engineering, 2017

Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent Sync as a case study.
Computers & Electrical Engineering, 2017

Machine learning aided Android malware classification.
Computers & Electrical Engineering, 2017

An enhanced 1-round authentication protocol for wireless body area networks with user anonymity.
Computers & Electrical Engineering, 2017

Introduction to the Special Section on Security and Privacy in Wearable and Embedded Technologies.
Computers & Electrical Engineering, 2017

Privacy-preserving certificateless provable data possession scheme for big data storage on cloud.
Applied Mathematics and Computation, 2017

Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks.
Applied Mathematics and Computation, 2017

A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps.
Applied Mathematics and Computation, 2017

Revisiting Semi-Supervised Learning for Online Deceptive Review Detection.
IEEE Access, 2017

From Cloud to Fog Computing: A Review and a Conceptual Live VM Migration Framework.
IEEE Access, 2017

Expressive CP-ABE Scheme for Mobile Devices in IoT Satisfying Constant-Size Keys and Ciphertexts.
IEEE Access, 2017

Efficient and Secure Time-Key Based Single Sign-On Authentication for Mobile Devices.
IEEE Access, 2017

Security Analysis of Two Password-Authenticated Multi-Key Exchange Protocols.
IEEE Access, 2017

IEEE Access Special Section Editorial: Intelligent Sensing On Mobile and Social Media Analytics.
IEEE Access, 2017

A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution.
IEEE Access, 2017

Process Memory Investigation of the Bitcoin Clients Electrum and Bitcoin Core.
IEEE Access, 2017

CDBFIP: Common Database Forensic Investigation Processes for Internet of Things.
IEEE Access, 2017

Investigation and Automating Extraction of Thumbnails Produced by Image Viewers.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Volkswagen Car Entertainment System Forensics.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Relative Privacy Model for Effective Privacy Preservation in Transactional Data.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Situational Crime Prevention and the Mitigation of Cloud Computing Threats.
Proceedings of the Security and Privacy in Communication Networks, 2017

Identification of Forensic Artifacts in VMWare Virtualized Computing.
Proceedings of the Security and Privacy in Communication Networks, 2017

Manipulating the Five V's in the Next Generation Air Transportation System.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Deep Learning Based Online Malicious URL and DNS Detection Scheme.
Proceedings of the Security and Privacy in Communication Networks, 2017

Making Decisions about Self-Disclosure in Online Social Networks.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Cyber-of-Things: Cyber-crimes and Cyber-Security Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

An Efficient Data Aggregation Scheme in Privacy-Preserving Smart Grid Communications with a High Practicability.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2017

Investigating Mobile Social Media Users? Behaviors in Tourism Collaborative Information Seeking.
Proceedings of the 2017 Conference on Conference Human Information Interaction and Retrieval, 2017

Medical Cyber-Physical Systems Development: A Forensics-Driven Approach.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

Research Challenges and Opportunities in Big Forensic Data.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

Back to Pen and Paper: Recovering Assessment Questions from Computer-Based Examination Applications.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

The Effect of the Recommendation System in the Mobile App Market.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Internet of Things (IoT): Smart and Secure Service Delivery.
ACM Trans. Internet Techn., 2016

Intent-Based Extensible Real-Time PHP Supervision Framework.
IEEE Trans. Information Forensics and Security, 2016

An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys.
IEEE Trans. Information Forensics and Security, 2016

DDOA: A Dirichlet-Based Detection Scheme for Opportunistic Attacks in Smart Grid Cyber-Physical System.
IEEE Trans. Information Forensics and Security, 2016

Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases.
IEEE Trans. Information Forensics and Security, 2016

A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers.
IEEE Trans. Information Forensics and Security, 2016

Cloud based data sharing with fine-grained proxy re-encryption.
Pervasive and Mobile Computing, 2016

Mobile security and privacy: Advances, challenges and future research directions.
Pervasive and Mobile Computing, 2016

Guest Editorial: Network Forensics and Surveillance for Emerging Networks.
IEEE Network, 2016

On the Analysis and Detection of Mobile Botnet Applications.
J. UCS, 2016

Copy-move forgery detection: Survey, challenges and future directions.
J. Network and Computer Applications, 2016

Web application protection techniques: A taxonomy.
J. Network and Computer Applications, 2016

User profiling in intrusion detection: A review.
J. Network and Computer Applications, 2016

Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles.
J. Network and Computer Applications, 2016

Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework.
J. Network and Computer Applications, 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Network and Computer Applications, 2016

Survey on key revocation mechanisms in wireless sensor networks.
J. Network and Computer Applications, 2016

Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Systems, 2016

Building the search pattern of web users using conceptual semantic space model.
IJWGS, 2016

An Improved Online/Offline Identity-Based Signature Scheme for WSNs.
I. J. Network Security, 2016

Cloud Cryptography: Theory, Practice and Future Research Directions.
Future Generation Comp. Syst., 2016

Participatory sensing-based semantic and spatial analysis of urban emergency events using mobile social media.
EURASIP J. Wireless Comm. and Networking, 2016

Internet data budget allocation policies for diverse smartphone applications.
EURASIP J. Wireless Comm. and Networking, 2016

Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing.
EURASIP J. Wireless Comm. and Networking, 2016

Android mobile VoIP apps: a survey and examination of their security and privacy.
Electronic Commerce Research, 2016

Cloud forensics: State-of-the-art and future directions.
Digital Investigation, 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digital Investigation, 2016

Building knowledge base of urban emergency events based on crowdsourcing of social media.
Concurrency and Computation: Practice and Experience, 2016

An adversary model to evaluate DRM protection of video contents on iOS devices.
Computers & Security, 2016

Geographical information system parallelization for spatial big data processing: a review.
Cluster Computing, 2016

Big forensic data reduction: digital forensic images and electronic evidence.
Cluster Computing, 2016

PEDAL: a dynamic analysis tool for efficient concurrency bug reproduction in big data environment.
Cluster Computing, 2016

Forensic-by-Design Framework for Cyber-Physical Cloud Systems.
IEEE Cloud Computing, 2016

Live Migration in Emerging Cloud Paradigms.
IEEE Cloud Computing, 2016

Cloud Manufacturing: Security, Privacy, and Forensic Concerns.
IEEE Cloud Computing, 2016

Challenges in Delivering Software in the Cloud as Microservices.
IEEE Cloud Computing, 2016

Encryption-Based Solution for Data Sovereignty in Federated Clouds.
IEEE Cloud Computing, 2016

Enhanced Network Support for Federated Cloud Infrastructures.
IEEE Cloud Computing, 2016

Healthcare-Related Data in the Cloud: Challenges and Opportunities.
IEEE Cloud Computing, 2016

Context-oriented web application protection model.
Applied Mathematics and Computation, 2016

A Provably-Secure and Efficient Verifier-Based Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Astroturfing Detection in Social Media: Using Binary n-Gram Analysis for Authorship Attribution.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Closer Look at Syncany Windows and Ubuntu Clients' Residual Artefacts.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments.
Proceedings of the Security and Privacy in Communication Networks, 2016

Tinder Me Softly - How Safe Are You Really on Tinder?
Proceedings of the Security and Privacy in Communication Networks, 2016

Dynamic Restoration in Interconnected RBAC-based Cyber-physical Control Systems.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

A Robust Authentication Protocol with Privacy Protection for Wireless Sensor Networks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

A New Transitive Signature Scheme.
Proceedings of the Network and System Security - 10th International Conference, 2016

The role of mobile forensics in terrorism investigations involving the use of cloud apps.
Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications, 2016

A Provably Secure Blind Signature Based on Coding Theory.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Introduction to the Cybercrimes, Cyber-Physical Innovations, and Emerging Investigation Challenges Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Using Multimedia Presentations to Enhance the Judiciary's Technical Understanding of Digital Forensic Concepts: An Indonesian Case Study.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

An Android Social App Forensics Adversary Model.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

Improving Security Awareness in the Government Sector.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Perspectives on Cyber Science and Technology for Cyberization and Cyber-Enabled Worlds.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

A Publish/Subscribe Protocol for Event-Driven Communications in the Internet of Things.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

An Efficient Ring Signature Scheme Based on Syndrome Decoding Problem.
Proceedings of the 12th International Conference on Computational Intelligence and Security, 2016

Change-point cloud DDoS detection using packet inter-arrival time.
Proceedings of the 2016 8th Computer Science and Electronic Engineering Conference, 2016

Next Generation Aircraft Architecture and Digital Forensic.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

Application of HAZOP to the Design of Cyber Security Experiments.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Empirical Analysis of Impact of HTTP Referer on Malicious Website Behaviour and Delivery.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

Public Cloud Data Auditing with Practical Key Update and Zero Knowledge Privacy.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Towards Lightweight Anonymous Entity Authentication for IoT Applications.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting.
Symmetry, 2015

Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms.
J. Org. Computing and E. Commerce, 2015

A CCA2-Secure Multi-Decrypter Encryption Scheme Without Random Oracles.
Informatica, Lith. Acad. Sci., 2015

An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting.
IEICE Transactions, 2015

Impact of a participatory cyber crime prevention programme on secondary school students' attainment in crime prevention concepts in civic education and social studies.
EAIT, 2015

Cyber security readiness in the South Australian Government.
Computer Standards & Interfaces, 2015

A survey of information security incident handling in the cloud.
Computers & Security, 2015

Exfiltrating data from Android devices.
Computers & Security, 2015

Trustworthy Processing of Healthcare Big Data in Hybrid Clouds.
IEEE Cloud Computing, 2015

Cloud Attack and Risk Assessment Taxonomy.
IEEE Cloud Computing, 2015

A Cloud-Focused Mobile Forensics Methodology.
IEEE Cloud Computing, 2015

Balancing Privacy with Legitimate Surveillance and Lawful Data Access.
IEEE Cloud Computing, 2015

A Review of Free Cloud-Based Anti-Malware Apps for Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access Management.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Forensic Collection and Analysis of Thumbnails in Android.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Android Cache Taxonomy and Forensic Process.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering.
Proceedings of the Security and Privacy in Communication Networks, 2015

What Influences Employees to Use Enterprise Social Networks? A Socio-Technical Perspective.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

On Lightweight Security Enforcement in Cyber-Physical Systems.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Secret Picture: An Efficient Tool for Mitigating Deletion Delay on OSN.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Extended Proxy-Assisted Approach: Achieving Revocable Fine-Grained Encryption of Cloud Data.
Proceedings of the Computer Security - ESORICS 2015, 2015

Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis.
Proceedings of the 13th Australasian Information Security Conference, 2015

Factors Influencing the Adoption of Cloud Incident Handling Strategy: A Preliminary Study in Malaysia.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Employees' Intended Information Security Behaviour in Real Estate Organisations: a Protection Motivation Perspective.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Privacy Risks in Mobile Dating Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Enterprise Social Networks: A Successful Implementation within a Telecommunication Company.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Forensic Taxonomy of Popular Android mHealth Apps.
Proceedings of the 21st Americas Conference on Information Systems, 2015

Cloud security and forensic readiness: The current state of an IaaS provider.
Proceedings of the Cloud Security Ecosystem, 2015

Ubuntu One investigation: Detecting evidences on client machines.
Proceedings of the Cloud Security Ecosystem, 2015

Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model.
Proceedings of the Cloud Security Ecosystem, 2015

Mobile cloud forensics: An analysis of seven popular Android apps.
Proceedings of the Cloud Security Ecosystem, 2015

Conceptual evidence collection and analysis methodology for Android devices.
Proceedings of the Cloud Security Ecosystem, 2015

Cloud security ecosystem.
Proceedings of the Cloud Security Ecosystem, 2015

CATRA: Conceptual cloud attack taxonomy and risk assessment framework.
Proceedings of the Cloud Security Ecosystem, 2015

2014
MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption.
Security and Communication Networks, 2014

Google Drive: Forensic analysis of data remnants.
J. Network and Computer Applications, 2014

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
Inf. Sci., 2014

Information security in the South Australian real estate industry: A study of 40 real estate organisations.
Inf. Manag. Comput. Security, 2014

A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols.
IACR Cryptology ePrint Archive, 2014

Impacts of increasing volume of digital forensic data: A survey and future research challenges.
Digital Investigation, 2014

Distributed filesystem forensics: XtreemFS as a case study.
Digital Investigation, 2014

Cloud Forensic Technical Challenges and Solutions: A Snapshot.
IEEE Cloud Computing, 2014

Mobile Cloud Storage Users.
IEEE Cloud Computing, 2014

A Cloud Security Risk-Management Strategy.
IEEE Cloud Computing, 2014

Legal Issues in the Cloud.
IEEE Cloud Computing, 2014

Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users.
Behaviour & IT, 2014

Remote Programmatic vCloud Forensics: A Six-Step Collection Process and a Proof of Concept.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc Network.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

Windows Event Forensic Process.
Proceedings of the Advances in Digital Forensics X, 2014

Enhancing User Privacy on Android Mobile Devices via Permissions Removal.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

iOS Anti-forensics: How Can We Securely Conceal, Delete and Insert Data?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

A Study of Ten Popular Android Mobile VoIP Applications: Are the Communications Encrypted?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Building the Next Generation of Cyber Security Professionals.
Proceedings of the 22st European Conference on Information Systems, 2014

Should there be a New Body of Law for Cyber Space?
Proceedings of the 22st European Conference on Information Systems, 2014

Multi-sender Broadcast Authentication in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

Forensic Analysis of Windows Thumbcache files.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Bridging the Air Gap: Inaudible Data Exfiltration by Insiders.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Understanding the Information Security Awareness Process in Real Estate Organizations Using the SECI Model.
Proceedings of the 20th Americas Conference on Information Systems, 2014

Cloud Storage Forensics.
Syngress Publishing / Elsevier, ISBN: 978-0-12-419970-5, 2014

2013
Dictionary Attacks against Password-Based Authenticated Three-Party Key Exchange Protocols.
TIIS, 2013

An Offline Dictionary Attack against a Three-Party Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2013

On the security of a password-only authenticated three-party key exchange protocol.
IACR Cryptology ePrint Archive, 2013

Digital droplets: Microsoft SkyDrive forensic data remnants.
Future Generation Comp. Syst., 2013

Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?
Digital Investigation, 2013

Dropbox analysis: Data remnants on user machines.
Digital Investigation, 2013

Cloud storage forensics: ownCloud as a case study.
Digital Investigation, 2013

New payment methods: A review of 2010-2012 FATF mutual evaluation reports.
Computers & Security, 2013

Data Recovery from Proprietary Formatted Cctv Hard Disks.
Proceedings of the Advances in Digital Forensics IX, 2013

Digital Camcorder Forensics.
Proceedings of the Eleventh Australasian Information Security Conference, 2013

iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner?
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Review of insider threats in cyber security by Probst, Hunker, Gollman, Bishop.
SIGACT News, 2012

An integrated conceptual digital forensic framework for cloud computing.
Digital Investigation, 2012

2011
The cyber threat landscape: Challenges and future research directions.
Computers & Security, 2011

An ID-based digital watermarking protocol for copyright protection.
Computers & Electrical Engineering, 2011

2010
On the security of an enhanced novel access control protocol for wireless sensor networks.
IEEE Trans. Consumer Electronics, 2010

High tech criminal threats to the national information infrastructure.
Inf. Sec. Techn. Report, 2010

Security Improvements to Anonymous ID-Based Group Key Agreement for Wireless Networks.
Proceedings of the Seventh International Conference on Information Technology: New Generations, 2010

2009
Secure Key Establishment
Advances in Information Security 41, Springer, ISBN: 978-0-387-87968-0, 2009

An improved identity-based key agreement protocol and its security proof.
Inf. Sci., 2009

Security weakness in a dynamic program update protocol for wireless sensor networks.
IEEE Communications Letters, 2009

On the anonymity of some authentication schemes for wireless communications.
IEEE Communications Letters, 2009

Perfect forward secure identity-based authenticated key agreement protocol in the escrow mode.
Science in China Series F: Information Sciences, 2009

2008
Refuting the Security Claims of Mathuria and Jain (2005) Key Agreement Protocols.
I. J. Network Security, 2008

Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol.
IACR Cryptology ePrint Archive, 2008

Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition.
Comput. J., 2008

2007
An Integrative Framework to Protocol Analysis and Repair: Bellare-Rogaway Model + Planning + Model Checker.
Informatica, Lith. Acad. Sci., 2007

Perfect Forward Secure Identity-Based Authenticated Key Agreement Protocol in the Escrow Mode.
IACR Cryptology ePrint Archive, 2007

A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.
IACR Cryptology ePrint Archive, 2007

A Proof of Revised Yahalom Protocol in the Bellare and Rogaway (1993) Model.
Comput. J., 2007

Secret Signatures: How to Achieve Business Privacy Efficiently?
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Security of a Leakage-Resilient Protocol for Key Establishment and Mutual Authentication.
Proceedings of the Provable Security, 2007

Strongly-Secure Identity-Based Key Agreement and Anonymous Extension.
Proceedings of the Information Security, 10th International Conference, 2007

2006
On the Security Analysis of Lee, Hwang & Lee (2004) and Song & Kim (2000) Key Exchange / Agreement Protocols.
Informatica, Lith. Acad. Sci., 2006

Issue report on business adoption of Microsoft Passport.
Inf. Manag. Comput. Security, 2006

Revisiting Lee, Kim, & Yoo Authenticated Key Agreement Protocol.
I. J. Network Security, 2006

On the Security of Lee, Kim, Kim, & Oh Key Agreement Protocol.
I. J. Network Security, 2006

New Identity-Based Authenticated Key Agreement Protocols from Pairings (without Random Oracles).
IACR Cryptology ePrint Archive, 2006

The importance of proofs of security for key establishment protocols: Formal analysis of Jan-Chen, Yang-Shen-Shieh, Kim-Huh-Hwang-Lee, Lin-Sun-Hwang, and Yeh-Sun protocols.
Computer Communications, 2006

Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

Formal analysis of secure contracting protocol for e-tendering.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Secure Password-Based Authenticated Group Key Agreement for Data-Sharing Peer-to-Peer Networks.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Revisit of McCullagh-Barreto Two-party ID-based Authenticated Key Agreement Protocols.
I. J. Network Security, 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols: Revisiting Chen & Kudla (2003) and McCullagh & Barreto (2005) ID-Based Protocols.
IACR Cryptology ePrint Archive, 2005

On Session Key Construction in Provably-Secure Key Establishment Protocols.
Proceedings of the Progress in Cryptology, 2005

Security of Two-Party Identity-Based Key Agreement.
Proceedings of the Progress in Cryptology, 2005

A Secure Anonymous Authorisation Architecture for E-Commerce.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

Errors in Computational Complexity Proofs for Protocols.
Proceedings of the Advances in Cryptology, 2005

Examining Indistinguishability-Based Proof Models for Key Establishment Protocols.
Proceedings of the Advances in Cryptology, 2005

Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Revisit Of McCullagh-Barreto Two-Party ID-Based Authenticated Key Agreement Protocols.
IACR Cryptology ePrint Archive, 2004

On Session Identifiers in Provably Secure Protocols: The Bellare-Rogaway Three-Party Key Distribution Protocol Revisited.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Complementing Computational Protocol Analysis with Formal Specifications.
Proceedings of the Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), 2004

A user-centric anonymous authorisation framework in e-commerce environment.
Proceedings of the 6th International Conference on Electronic Commerce, 2004


  Loading...