Home > Research > Browse

Results for Authentication

Publications & Outputs

  1. LAKE-BSG: Lightweight authenticated key exchange scheme for blockchain-enabled smart grids

    Badshah, A., Waqas, M., Abbas, G., Muhammad, F., Abbas, Z. H., Vimal, S. & Bilal, M., 31/08/2022, In: Sustainable Energy Technologies and Assessments. 52, 102248.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. A low-cost privacy preserving user access in mobile edge computing framework

    Irshad, A., Chaudhry, S. A., Ghani, A., Mallah, G. A., Bilal, M. & Alzahrani, B. A., 31/03/2022, In: Computers and Electrical Engineering. 98, 107692.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 30/04/2021, In: IEEE Transactions on Emerging Topics in Computing. 9, 2, p. 878-885 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  4. Throughput Aware Authentication Prioritisation for Vehicular Communication Networks

    Yuan, H., Bradbury, M., Maple, C. & Gu, C., 7/11/2019, 2019 IEEE 90th Vehicular Technology Conference (VTC2019-Fall). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Simulation of Si nanowire quantum-dot devices for authentication

    Carrillo-Nunez, H., Wang, C., Asenov, A., Young, R. & Georgiev, V., 1/04/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  6. A PUF Taxonomy

    McGrath, T., Bagci, I. E., Wang, Z., Roedig, U. & Young, R. J., 03/2019, In: Applied Physics Reviews. 6, 1, 25 p., 011303.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Effective caching for the secure content distribution in information-centric networking

    Bilal, M., Kang, S. G. & Pack, S., 20/07/2018, 2018 IEEE 87th Vehicular Technology Conference, VTC Spring 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p. (IEEE Vehicular Technology Conference; vol. 2018-June).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. An authentication protocol for future sensor networks

    Bilal, M. & Kang, S. G., 28/04/2017, In: Sensors (Switzerland). 17, 5, 979.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Towards a framework for benchmarking privacy-ABC technologies

    Veseli, F., Vateva-Gurova, T., Krontiris, I., Rannenberg, K. & Suri, N., 2014, IFIP Advances in Information and Communication Technology: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. Springer New York LLC, Vol. 428. p. 197-204 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. Security implications of password discretization for click-based graphical passwords

    Zhu, B. B., Wei, D., Yang, M. & Yan, J., 05/2013, WWW 2013 - Proceedings of the 22nd International Conference on World Wide Web. New York: ACM, p. 1581-1591 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

More results »