Simon J. Shepherd

Affiliations:
  • University of Bradford, Bradford, UK


According to our database1, Simon J. Shepherd authored at least 44 papers between 1990 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
Mob. Networks Appl., 2020

2018
Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices.
Proceedings of the Broadband Communications, Networks, and Systems, 2018

2017
Africa: cyber-security and its mutual impacts with computerisation, miniaturisation and location-based authentication.
EAI Endorsed Trans. Mob. Commun. Appl., 2017

Intracranial volumetric changes govern cerebrospinal fluid flow in the Aqueduct of Sylvius in healthy adults.
Biomed. Signal Process. Control., 2017

2015
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast.
IEEE Trans. Mob. Comput., 2015

Multi-Service Group Key Management for High Speed Wireless Mobile Multicast Networks.
EAI Endorsed Trans. Mob. Commun. Appl., 2015

Handover Optimised Authentication Scheme for High Mobility Wireless Multicast.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015

2014
A Multi-service Cluster-Based Decentralized Group Key Management Scheme for High Mobility Users.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication.
Proceedings of the Wireless Internet - 8th International Conference, 2014

Novel rekeying approach for secure multiple multicast groups over wireless mobile networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Efficient authenticated multi-service group key management for secure wireless mobile multicast.
Proceedings of the Third International Conference on Future Generation Communication Technologies (FGCT 2014), 2014

2008
Extraction of Desired Signal Based on AR Model with Its Application to Atrial Activity Estimation in Atrial Fibrillation.
EURASIP J. Adv. Signal Process., 2008

2007
Novel design of multiplier-less FFT processors.
Signal Process., 2007

A Comprehensive Secure VoIP Solution.
Int. J. Netw. Secur., 2007

Stream or Block Cipher for Securing VoIP?
Int. J. Netw. Secur., 2007

Concepts and architectures for next-generation information search engines.
Int. J. Inf. Manag., 2007

The Tiny Encryption Algorithm.
Cryptologia, 2007

2006
Clustering Gene Expression Data for Periodic Genes Based on INMF.
Proceedings of the Computational Intelligence and Bioinformatics, 2006

2005
Bradford: Building a new cremona?
Int. J. Inf. Manag., 2005

QoS Control Using an End-Point CPU Capability Detector in a Secure VoIP System.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

2004
Extracting Characteristic Patterns from Genome - Wide Expression Data by Non-Negative Matrix Factorization.
Proceedings of the 3rd International IEEE Computer Society Computational Systems Bioinformatics Conference, 2004

2002
Cryptanalysis of a summation generator with 2-bit memory.
Signal Process., 2002

2001
Analysis of KMM¯ Sequences as Spreading Codes for A-CDMA Systems.
Wirel. Pers. Commun., 2001

2000
New Phase 1 Exchange Mode for IKE framework.
ACM SIGOPS Oper. Syst. Rev., 2000

1999
Optimal sequences for channel estimation using discrete Fourier transform techniques.
IEEE Trans. Commun., 1999

WASS: A Security Services for Wireless ATM Networks.
ACM SIGOPS Oper. Syst. Rev., 1999

Security Issues in ATM Networks.
ACM SIGOPS Oper. Syst. Rev., 1999

Modeling and Evaluation of security induced delays in Wireless ATM Networks.
ACM SIGOPS Oper. Syst. Rev., 1999

Cryptographic Security Techniques for Wireless Networks.
ACM SIGOPS Oper. Syst. Rev., 1999

WASS: Wireless ATM Security System.
ACM SIGOPS Oper. Syst. Rev., 1999

1998
Asymptotic limits in peak envelope power reduction by redundant coding in orthogonal frequency-division multiplex modulation.
IEEE Trans. Commun., 1998

Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks.
ACM SIGOPS Oper. Syst. Rev., 1998

Security issues for wireless ATM networks.
Proceedings of the 9th IEEE International Symposium on Personal, 1998

1997
An efficient key exchange protocol for cryptographically secure CDMA systems.
Proceedings of the 8th IEEE International Symposium on Personal, 1997

Security of wireless ATM networks.
Proceedings of the 8th IEEE International Symposium on Personal, 1997

LABYRINTH: a New Ultra High Speed Stream Cipher.
Proceedings of the Cryptography and Coding, 1997

1996
Simulation and analysis of the distortion generated by the bulk-FFT demultiplexer.
Signal Process., 1996

1995
A pipelined implementation of the Winograd FFT for satellite on-board multi-carrier demodulation.
Wirel. Pers. Commun., 1995

The distribution of peak factor in QPSK Multi-Carrier modulation.
Wirel. Pers. Commun., 1995

Distortion analysis of the bulk FFT structure for multi-carrier demodulators.
Signal Process., 1995

A high speed software implementation of the Data Encryption Standard.
Comput. Secur., 1995

1994
Non-coherent detection of MFSK signals in the presence of oscillator phase noise in an AWGN channel.
Proceedings of 44th IEEE Vehicular Technology Conference: Creating Tomorrow's Mobile Systems, 1994

1993
The Quadratic Residue Cipher and Some Notes on Implementation.
Cryptologia, 1993

1990
A comprehensive security system - the concepts, agents and protocols.
Comput. Secur., 1990


  Loading...