25 results

Crypto Assets Custody: Taxonomy, Components, and Open Challenges

Conference Proceeding
Jaroucheh, Z., & Ghaleb, B. (2023)
Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959
Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Cust...

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform

Journal Article
Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., …Buchanan, W. J. (2022)
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), Article 1379. https://doi.org/10.3390/e24101379
Historically, threat information sharing has relied on manual modelling and centralised network systems, which can be inefficient, insecure, and prone to errors. Alternatively...

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022)
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221
The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles

Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021)
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326
In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-worl...

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...

Blockchain-based identity and authentication scheme for MQTT protocol

Conference Proceeding
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021)
Blockchain-based identity and authentication scheme for MQTT protocol. In ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology (73-81). https://doi.org/10.1145/3460537.3460549
The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry...

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution

Conference Proceeding
Jaroucheh, Z., & Álvarez, I. A. (2021)
Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/icbc51069.2021.9461144
Secrets such as passwords, encryption keys, and certificates are used to assist in protecting access to resources such as computing devices, customer data and other informatio...

Programming Languages: A Usage-based Statistical Analysis and Visualization

Conference Proceeding
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021)
Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org/10.1145/3459955.3460614
Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supporte...

Date


Date