Home > Research > Browse

Results for Cryptography

Publications & Outputs

  1. Secure facial recognition in the encrypted domain using a local ternary pattern approach

    Khan, F. A., Bouridane, A., Boussakta, S., Jiang, R. & Almaadeed, S., 30/06/2021, In: Journal of Information Security and Applications. 59

    Research output: Contribution to journalJournal articlepeer-review

  2. Understanding Security Requirements for Industrial Control System Supply Chains

    Hou, Y., Such, J. & Rashid, A., 5/09/2019, 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). IEEE, p. 50-53 4 p. 8823698

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Simulation of Si nanowire quantum-dot devices for authentication

    Carrillo-Nunez, H., Wang, C., Asenov, A., Young, R. & Georgiev, V., 1/04/2019.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  4. Impersonation detection in line-of-sight underwater acoustic sensor networks

    Aman, W., Rahman, M. M. U., Qadir, J., Pervaiz, H. & Ni, Q., 6/08/2018, In: IEEE Access. 6, p. 44459-44472 14 p.

    Research output: Contribution to journalJournal articlepeer-review

  5. Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In: IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to journalJournal articlepeer-review

  6. A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. A privacy preserving approach to energy theft detection in smart grids

    Richardson, C., Race, N. & Smith, P., 1/09/2016, 2016 IEEE International Smart Cities Conference (ISC2). IEEE, p. 1-4 4 p. (Smart Cities Conference (ISC2), 2016 IEEE International).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Efficient robust storage using secret tokens

    Dobre, D., Majuntke, M., Serafini, M. & Suri, N., 2009, Stabilization, Safety, and Security of Distributed Systems: 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings. Springer, Vol. 5873 LNCS. p. 269-283 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  11. The Lady Vanishes: Gender, Law and the (Virtual) Body

    Chatterjee, B. B., 12/2008, In: Australian Feminist Law Journal. 29, n/a, p. 13-30 18 p.

    Research output: Contribution to journalJournal articlepeer-review

More results »