Home > Research > Browse

Results for telecommunication security

Publications & Outputs

  1. Throughput Aware Authentication Prioritisation for Vehicular Communication Networks

    Yuan, H., Bradbury, M., Maple, C. & Gu, C., 7/11/2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks

    Bradbury, M., Leeke, M. & Jhumka, A., 3/12/2015, 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, p. 531-538 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Secure communication in cooperative network with wireless information and power transfer

    Hu, S. & Ding, Z., 12/2015, In: Signal Processing. 9, 9, p. 663-669 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy

    Thomason, A., Leeke, M., Bradbury, M. & Jhumka, A., 12/12/2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, p. 667-674 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

    Jhumka, A., Bradbury, M. & Leeke, M., 6/09/2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, p. 760-768 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review