14 results

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution

Conference Proceeding
Jaroucheh, Z., & Álvarez, I. A. (2021)
Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/icbc51069.2021.9461144
Secrets such as passwords, encryption keys, and certificates are used to assist in protecting access to resources such as computing devices, customer data and other informatio...

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism

Conference Proceeding
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020)
PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing (1-8). https://doi.org/10.1145/3448823.3448875
The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Eth...

PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Buchanan, W. (2020)
PoNW: A Secure and Scalable Proof-of-Notarized-Work Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing. https://doi.org/10.1145/3448823.3448875
The original consensus algorithm-Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Ether...

Trust-based Ecosystem to Combat Fake News

Conference Proceeding
Jaroucheh, Z., Alissa, M., & Buchanan, W. J. (2020)
Trust-based Ecosystem to Combat Fake News. https://doi.org/10.1109/icbc48266.2020.9169435
The growing spread of misinformation and dis-information has grave political, social, ethical, and privacy implications for society. Therefore, there is an ethical need to com...

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Conference Proceeding
Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020)
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC 2020). , (1215-1220
The growing trend of sharing news/contents, through social media platforms and the World Wide Web has been seen to impact our perception of the truth, altering our views about...

SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain

Conference Proceeding
Jaroucheh, Z., Ghaleb, B., & Buchanan, W. J. (2020)
SklCoin: Toward a Scalable Proof-of-Stake and Collective Signature Based Consensus Protocol for Strong Consistency in Blockchain. https://doi.org/10.1109/icsa-c50368.2020.00034
The proof-of-work consensus protocol suffers from two main limitations: waste of energy and offering only probabilistic guarantees about the status of the blockchain. This pap...

Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications

Conference Proceeding
Jaroucheh, Z., Liu, X., Smith, S., & Zhao, H. (2011)
Lightweight Software Product Line Based Privacy Protection Scheme for Pervasive Applications. In 2011 IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW),, 351-355. doi:10.1109/compsacw.2011.65
Protecting user's privacy is one of the main concerns for the deployment of pervasive computing systems in the real world. In pervasive environments, the user context informat...