14 results

Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher

Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022)
Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP). https://doi.org/10.1109/CSP55486.2022.00018
Lightweight cryptography is a novel diversion from conventional cryptography that targets internet-of-things (IoT) platform due to resource constraints. In comparison, it offe...

PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching

Conference Proceeding
Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2022)
PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699138
The spread of COVID-19 has highlighted the need for a robust contact tracing infrastructure that enables infected individuals to have their contacts traced, and followed up wi...

GLASS: Towards Secure and Decentralized eGovernance Services using IPFS

Conference Proceeding
Chrysoulas, C., Thomson, A., Pitropakis, N., Papadopoulos, P., Lo, O., Buchanan, W. J., …Tsolis, D. (2022)
GLASS: Towards Secure and Decentralized eGovernance Services using IPFS. In Computer Security. ESORICS 2021 International Workshops. https://doi.org/10.1007/978-3-030-95484-0_3
The continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. This innovation led them to an era of automation, broa...

A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports

Conference Proceeding
Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2022)
A Privacy-Preserving Platform for Recording COVID-19 Vaccine Passports. In UCC '21: Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. https://doi.org/10.1145/3492323.3495626
Digital vaccination passports are being proposed by various governments internationally. Trust, scalability and security are all key challenges in implementing an online vacci...

Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT

Conference Proceeding
Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2021)
Electromagnetic Analysis of an Ultra-Lightweight Cipher: PRESENT. In 10th International Conference on Cryptography and Information Security (CRYPIS 2021) (185-205
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, continuous observations of physical leakages are essential to minimise vulnerabilities associ...

Identifying Vulnerabilities Using Internet-wide Scanning Data

Conference Proceeding
O'Hare, J., Macfarlane, R., & Lo, O. (2019)
Identifying Vulnerabilities Using Internet-wide Scanning Data. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), (1-10). https://doi.org/10.1109/ICGS3.2019.8688018
Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provid...

Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device

Conference Proceeding
Lo, O., Buchanan, W. J., & Carson, D. (2018)
Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. In ARES 2018 Proceedings of the 13th International Conference on Availability, Reliability and Securityhttps://doi.org/10.1145/3230833.3232801
Traditional cryptographic techniques have proven to work well on most modern computing devices but they are unsuitable for devices (e.g. IoT devices) where memory, power consu...

Secret shares to protect health records in Cloud-based infrastructures

Conference Proceeding
Buchanan, W. J., Ukwandu, E., van Deursen, N., Fan, L., Russell, G., Lo, O., & Thuemmler, C. (2016)
Secret shares to protect health records in Cloud-based infrastructures. In 2015 17th International Conference on E-health Networking, Application & Services (HealthCom)https://doi.org/10.1109/HealthCom.2015.7454589
Increasingly health records are stored in cloud-based systems, and often protected by a private key. Unfortunately the loss of this key can cause large-scale data loss. This p...

RESCUE: Resilient Secret Sharing Cloud-based Architecture.

Conference Proceeding
Ukwandu, E., Buchanan, W. J., Fan, L., Russell, G., & Lo, O. (2015)
RESCUE: Resilient Secret Sharing Cloud-based Architecture. In 2015 IEEE Trustcom/BigDataSE/ISPA Vol. 1, (872-879). https://doi.org/10.1109/Trustcom.2015.459
This paper presents an architecture (RESCUE) of a system that is capable of implementing: a keyless encryption method; self-destruction of data within a time frame without use...

Who would you trust to identify you in accessing your health record?

Conference Proceeding
Buchanan, W. J., Anderson, C., Smales, A., Varga, J., Burns, N., Uthmani, O., …Lawson, A. (2013)
Who would you trust to identify you in accessing your health record?
Within health and social care there is a strong need to provide access to highly sensitive information, and one which requires high levels of identity assurance. This paper ou...