• Publications
  • Influence
Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks
TLDR
A lightweight anonymous mutual authentication and key agreement scheme for centralized two-hop WBANs is proposed in this paper, which allows sensor nodes attached to the patient's body to authenticate with the local server/hub node and establish a session key in an anonymous and unlinkable manner. Expand
  • 160
  • 15
Google Drive: Forensic analysis of data remnants
TLDR
The retrieval of digital evidence from cloud storage services (particularly from offshore providers) can be a challenge in a digital forensic investigation, due to virtualisation, lack of knowledge on location of data, privacy issues, and legal or jurisdictional boundaries. Expand
  • 224
  • 14
An integrated conceptual digital forensic framework for cloud computing
TLDR
We propose an integrated (iterative) conceptual digital forensic framework (based on McKemmish and NIST) which emphasises the differences in the preservation of forensic data and the collection of cloud computing data for forensic purposes. Expand
  • 221
  • 13
Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
TLDR
We study the potential to use the Blockchain technology to protect healthcare data hosted within the cloud. Expand
  • 276
  • 12
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
TLDR
We proposed a three-factor anonymous authentication scheme for WSNs in Internet of Things environments, where fuzzy commitment scheme is adopted to handle the user's biometric information. Expand
  • 155
  • 12
Dropbox analysis: Data remnants on user machines
TLDR
Cloud storage has been identified as an emerging challenge to digital forensic researchers and practitioners in a range of literature. Expand
  • 164
  • 11
An Ensemble Intrusion Detection Technique Based on Proposed Statistical Flow Features for Protecting Network Traffic of Internet of Things
TLDR
An ensemble intrusion detection technique is proposed to mitigate malicious events, in particular botnet attacks against DNS, HTTP, and MQTT protocols utilized in IoT networks. Expand
  • 116
  • 11
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
TLDR
We present a blockchain-based system for secure mutual authentication, BSeIn, to enforce fine-grained access control polices. Expand
  • 155
  • 10
Exploring Factors Influencing the Use of Enterprise Social Networks in Multinational Professional Service Firms
TLDR
We focus on factors influencing employees’ decision to use ESN in their work role and draws on case studies of two multinational professional service firms (PSFs) based in Australia. Expand
  • 77
  • 10
  • PDF
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
TLDR
This paper reviews 96 publications on DDoS attack and defense approaches in cloud computing published between January 2009 and December 2015, and discusses existing research trends. Expand
  • 193
  • 9
...
1
2
3
4
5
...