False data injection attacks on networked control systems
September 26, 2023
Journal of Control and Decision - Pages 1-10
Cerberus: A Blockchain-Based Accreditation and Degree Verification System
August 01, 2023
IEEE Transactions on Computational Social Systems - Volume: 10, Issue: 4, Page(s): 1503-1514, INSPEC Accession Number: 23515488
Merging engine implementation for intra-frame sharing in multi-tenant virtual passive optical networks
April 01, 2023
Journal of Optical Communications and Networking - Volume:15, Issue:4, Page:209-218
A First Look at Private Communications in Video Games using Visual Features
April 27, 2021
Proceedings on Privacy Enhancing Technologies - Volume 2021 (3), Pages 433–452
Secure Opportunistic Contextual Logging for Wearable Healthcare Sensing Devices
March 01, 2021
IEEE Transactions on Dependable and Secure Computing - Volume 18, Issue 2, Pages 753-764
Forensic Verification of Health Data from Wearable Devices using Anonymous Witnesses
November 01, 2020
IEEE Internet of Things Journal - Volume 7, Issue 11, Pages 10745-10762
An Overview of End-to-End Verifiable Voting Systems
September 30, 2020
Book on Real-World Electronic Voting: Design, Analysis and Deployment - 1st Edition, Chapter 8,
ZombieCoin 2.0: managing next-generation botnets using Bitcoin
August 01, 2018
International Journal of Information Security - Vol:17, Pages411–422
SRoWM: Smart Review on Wormhole Mitigation
December 30, 2017
International Journal of Computer Science and Network Security - Volume: 17, Issue: 12, Pages 178-187
A Survey of Securing Networks Using Software Defined Networking
September 01, 2015
IEEE Transactions on Reliability - Volume:64, Issue:3, Page:1086-1097
Greening residential Wi-Fi networks under centralized control
March 01, 2015
IEEE Transactions on Mobile Computing - Volume:14, Issue:3, Page:552-564
Eliminating reconciliation cost in secret key generation for body-worn health monitoring devices
December 01, 2014
IEEE Transactions on Mobile Computing - Volume:13, Issue:12, Page:2763-2776
Securing first-hop data provenance for bodyworn devices using wireless link fingerprints
December 01, 2014
IEEE Transactions on Information Forensics and Security - Volume:9, Issue:12, Page:2193-2204
Authentication of lossy data in body-sensor networks for cloud-based healthcare monitoring
June 01, 2014
Future Generation Computer Systems - Volume:35, Page:80-90
Secure key loss recovery for network broadcast in single-hop wireless sensor networks
August 01, 2010
Ad Hoc Networks - Volume:8, Issue:6, Page:668-679