Search

Your search keyword '"Buchanan, William J."' showing total 60 results

Search Constraints

Start Over You searched for: Author "Buchanan, William J." Remove constraint Author: "Buchanan, William J." Database arXiv Remove constraint Database: arXiv
60 results on '"Buchanan, William J."'

Search Results

1. Review of Generative AI Methods in Cybersecurity

2. vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election

3. DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

4. TIPS: Threat Sharing Information Platform for Enhanced Security

5. RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

7. PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

8. PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

9. Scalable Multi-domain Trust Infrastructures for Segmented Networks

10. CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

11. Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

12. SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

13. Enabling Quantum Cybersecurity Analytics in Botnet Detection: Stable Architecture and Speed-up through Tree Algorithms

14. Majority Voting Approach to Ransomware Detection

15. Review of the NIST Light-weight Cryptography Finalists

16. An Omnidirectional Approach to Touch-based Continuous Authentication

17. Towards The Creation Of The Future Fish Farm

18. Hamming Distributions of Popular Perceptual Hashing Techniques

19. Transforming EU Governance: The Digital Integration through EBSI and GLASS

20. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

21. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

22. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

23. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

24. NapierOne: A modern mixed file data set alternative to Govdocs1

25. Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

26. Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

27. Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

28. PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

29. A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

30. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

31. GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

32. Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

33. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

34. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

35. Privacy and Trust Redefined in Federated Machine Learning

36. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

37. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

38. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

39. Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

40. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

41. SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain

42. Privacy Preserving Passive DNS

43. Decentralized Accessibility of e-commerce Products through Blockchain Technology

44. Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting

45. A Distributed Trust Framework for Privacy-Preserving Machine Learning

46. Fast Probabilistic Consensus with Weighted Votes

47. Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

48. Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

49. An authentication protocol based on chaos and zero knowledge proof

50. Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device

Catalog

Books, media, physical & digital resources