Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    On the design of perturbation-resilient atomic commit protocols for mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 1/08/2011, In: ACM Transactions on Computer Systems. 29, 3, 7.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Published

    Exploring delay-aware transactions in heterogeneous mobile environments

    Ayari, B., Khelil, A. & Suri, N., 2009, In: Journal of Software. 4, 7, p. 634-643 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  3. Published

    FT-PPTC: An efficient and fault-tolerant commit protocol for mobile environments

    Ayari, B., Khelil, A. & Suri, N., 2/10/2006, 2006 25th IEEE Symposium on Reliable Distributed Systems (SRDS'06). IEEE, p. 96-105 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Delay-aware mobile transactions

    Ayari, B., Khelil, A. & Suri, N., 2008, Software Technologies for Embedded and Ubiquitous Systems: 6th IFIP WG 10.2 International Workshop, SEUS 2008, Anacarpi, Capri Island, Italy, October 1-3, 2008 Proceedings. Springer, Vol. 5287 LNCS. p. 280-291 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  5. Published

    Data-based agreement for inter-vehicle coordination

    Ayari, B., Khelil, A., Saffar, K. & Suri, N., 23/05/2010, 2010 Eleventh International Conference on Mobile Data Management. IEEE, p. 279-280 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    ParTAC: A Partition-Tolerant Atomic Commit protocol for MANETs

    Ayari, B., Khelil, A. & Suri, N., 23/05/2010, 2010 Eleventh International Conference on Mobile Data Management. IEEE, p. 135-144 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Localization to Enhance Security and Services in Wi-Fi Networks under Privacy Constraints

    Ayres, G., Mehmood, R., Mitchell, K. & Race, N. J. P., 2009, Communications Infrastructure. Systems and Applications in Europe. Mehmood, R., Cerqueira, E., Piesiewicz, R., Chlamtac, I., Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X., Stan, M., Xiaohua, J., Zomaya, A. & Coulson, G. (eds.). Berlin: Springer-Verlag, Vol. 16. p. 175-188 14 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  8. Published

    Indoor pedestrian displacement estimation using smart phone inertial sensors

    Ayub, S., Xiaowei, Z., Honary, S., Bahraminasab, A. & Honary, B., 2012, In: International Journal of Innovative Computing and Applications. 4, 1, p. 35-42 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    Pedestrian Direction of Movement Determination using Smartphone

    Ayub, S., Momahed Heravi, B., Bahraminasab, A. & Honary, B., 09/2012, Next Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on. Paris, France : IEEE, p. 64-69

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Sensor Fusion Method for Smart phone Orientation Estimation

    Ayub, S., Bahraminasab, A. & Honary, B., 06/2012, 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting . Liverpool

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Sensor Placement Modes for Smartphone based Pedestrian Dead Reckoning

    Ayub, S., Zhou, X., Honary, S., Bahraminasab, A. & Honary, B., 09/2011, Computer, Informatics, Cybernetics and Applications: Proceedings of the CICA 2011. He, X., Hua, E., Lin, Y. & Liu, X. (eds.). Berlin: Springer Verlag, p. 123-132 10 p. (Lecture Notes in Electrical Engineering; vol. 107).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A practical approach of VLC architecture for smart city

    Ayub, S., Honary, M., Kariyawasam Katukolihe Gamage, S. & Honary, B., 11/2013, Antennas and Propagation Conference (LAPC), 2013 Loughborough . IEEE, p. 106-111 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  13. Published

    Visible light ID system for indoor localization

    Ayub, S., Kariyawasam Katukolihe Gamage, S., Honary, M. & Honary, B., 11/2013, Wireless, Mobile and Multimedia Networks (ICWMMN 2013), 5th IET International Conference on . IEEE, p. 254-257 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  14. Published

    Combined secure storage and communication for the Internet of Things

    Bagci, I. E., Raza, S., Chung, A., Roedig, U. & Voigt, T., 24/06/2013, 10th Annual IEEE Communications Society Conference on Sensing, Communication, and Networking (SECON 2013). Piscataway, N.J.: IEEE, p. 523-531 9 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  15. Published

    Node identification using clock skew

    Bagci, I. E. & Roedig, U., 2013, Real-World Wireless Sensor Networks: Proceedings of the 5th International Workshop, REALWSN 2013, Como (Italy), September 19-20, 2013. Langendoen, K., Hu, W., Ferrari, F., Zimmerling, M. & Mottola, L. (eds.). Berlin: Springer Verlag, p. 111-123 13 p. (Lecture Notes in Electrical Engineering; vol. 281).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  16. Published

    Codo: confidential data storage for wireless sensor networks

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 8/10/2012.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paper

  17. Published

    Short paper: gathering tamper evidence in wi-fi networks based on channel state information

    Bagci, I. E., Roedig, U., Schulz, M. & Hollick, M., 23/07/2014, WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, p. 183-188 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  18. Published

    Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T., 10/2016, In: Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Using Channel State Information for Tamper Detection in the Internet of Things

    Bagci, I. E., Roedig, U., Martinovic, I., Schulz, M. & Hollick, M., 5/12/2015, ACSAC 2015 Proceedings of the 31st Annual Computer Security Applications Conference. New York: ACM, p. 131-140 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  20. Published

    Novel security mechanisms for wireless sensor networks

    Bagci, I. E., 29/01/2016, Lancaster University. 128 p.

    Research output: ThesisDoctoral Thesis

  21. Published

    Resonant-Tunnelling Diodes as PUF Building Blocks

    Bagci, I. E., McGrath, T., Barthelmes, C., Dean, S., Bernardo Gavito, R., Young, R. J. & Roedig, U., 30/04/2021, In: IEEE Transactions on Emerging Topics in Computing. 9, 2, p. 878-885 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Use of a priori information from Huffman coding to improve the MAP decoding performance of turbo codes

    Baichoo, S., Honary, B. & Soyjaudah, K. S., 07/2005, 8th International Symposium on Communication Theory and Applications. Lancaster: HW Communications, p. 445–450 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  23. Published

    Combined block Huffman and convolution code

    Baichoo, S., Honary, B. & Soyjaudah, K. S., 07/2005, 8th International Symposium on Communication Theory and Applications. Ambleside, UK, p. 440-444

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    Arithmetic Block Coding to reduce error propagation

    Baichoo, S., Honary, B. & Soyjaudah, K. S., 07/2005, 8th International Symposium on Communication Theory and Applications. Lancaster: HW Communications Limited, p. 52-56 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    Indistinguishable proofs of work or knowledge

    Baldimtsi, F., Kiayias, A., Zacharias, T. & Zhang, B., 4/12/2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Cheon, J. H. & Takagi, T. (eds.). Heidelberg: Springer, p. 902-933 32 p. (Lecture Notes in Computer Science; vol. 10032).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Previous 1...7 8 9 10 11 12 13 14 ...102 Next

Back to top