Search

Your search keyword '"Buchanan, William J."' showing total 69 results

Search Constraints

Start Over You searched for: Author "Buchanan, William J." Remove constraint Author: "Buchanan, William J." Topic computer science - cryptography and security Remove constraint Topic: computer science - cryptography and security
69 results on '"Buchanan, William J."'

Search Results

1. Review of Generative AI Methods in Cybersecurity

2. vSPACE: Voting in a Scalable, Privacy-Aware and Confidential Election

3. DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity

4. TIPS: Threat Sharing Information Platform for Enhanced Security

5. RNA-TransCrypt: Image Encryption Using Chaotic RNA Encoding, Novel Transformative Substitution, and Tailored Cryptographic Operations

6. PermutEx: Feature-Extraction-Based Permutation -- A New Diffusion Scheme for Image Encryption Algorithms

7. PASSION: Permissioned Access Control for Segmented Devices and Identity for IoT Networks

8. Scalable Multi-domain Trust Infrastructures for Segmented Networks

9. CellSecure: Securing Image Data in Industrial Internet-of-Things via Cellular Automata and Chaos-Based Encryption

10. Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

11. SRSS: A New Chaos-Based Single-Round Single S-Box Image Encryption Scheme for Highly Auto-Correlated Data

12. Majority Voting Approach to Ransomware Detection

13. Review of the NIST Light-weight Cryptography Finalists

14. An Omnidirectional Approach to Touch-based Continuous Authentication

15. Towards The Creation Of The Future Fish Farm

16. Hamming Distributions of Popular Perceptual Hashing Techniques

17. Transforming EU Governance: The Digital Integration through EBSI and GLASS

18. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

19. Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification

20. GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture

21. Ransomware: Analysing the Impact on Windows Active Directory Domain Services

22. NapierOne: A modern mixed file data set alternative to Govdocs1

23. Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

24. Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

25. Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

26. PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

27. A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

28. Evaluating Tooling and Methodology when Analysing Bitcoin Mixing Services After Forensic Seizure

29. GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

30. Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

31. Differential Area Analysis for Ransomware Attack Detection within Mixed File Datasets

32. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

33. Privacy and Trust Redefined in Federated Machine Learning

34. An Experimental Analysis of Attack Classification Using Machine Learning in IoT Networks

35. Evaluation of Live Forensic Techniques in Ransomware Attack Mitigation

36. A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric

37. Review and Critical Analysis of Privacy-preserving Infection Tracking and Contact Tracing

38. TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

39. SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain

40. Privacy Preserving Passive DNS

41. Decentralized Accessibility of e-commerce Products through Blockchain Technology

42. Trust-by-Design: Evaluating Issues and Perceptions within Clinical Passporting

43. A Distributed Trust Framework for Privacy-Preserving Machine Learning

44. Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

45. Wi-Fi Channel Saturation as a Mechanism to Improve Passive Capture of Bluetooth Through Channel Usage Restriction

46. An authentication protocol based on chaos and zero knowledge proof

47. Performance Analysis of TLS for Quantum Robust Cryptography on a Constrained Device

48. The Challenges of Investigating Cryptocurrencies and Blockchain Related Crime

49. Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

50. Deriving ChaCha20 Key Streams From Targeted Memory Analysis

Catalog

Books, media, physical & digital resources