19 results

Crypto Assets Custody: Taxonomy, Components, and Open Challenges

Conference Proceeding
Jaroucheh, Z., & Ghaleb, B. (2023)
Crypto Assets Custody: Taxonomy, Components, and Open Challenges. . https://doi.org/10.1109/icbc56567.2023.10174959
Custody plays a fundamental role for organizations and individuals seeking to access crypto assets (e.g., cryptocurrencies) and decentralized finance (DeFi) applications. Cust...

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

Conference Proceeding
Ali, H., Papadopoulos, P., Ahmad, J., Pit, N., Jaroucheh, Z., & Buchanan, W. J. (2022)
Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers. In IEEE SINCONF: 14th International Conference on Security of Information and Networks. https://doi.org/10.1109/SIN54109.2021.9699366
Threat information sharing is considered as one of the proactive defensive approaches for enhancing the overall security of trusted partners. Trusted partner organizations can...

Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates

Conference Proceeding
Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2022)
Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699221
The COVID-19 pandemic has recently emerged as a worldwide health emergency that necessitates coordinated international measures. To contain the virus's spread, governments and...

Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles

Conference Proceeding
Cutajar, O., Moradpoor, N., & Jaroucheh, Z. (2021)
Using IOTA as an Inter-Vehicular Trust Mechanism in Autonomous Vehicles. In 2021 14th International Conference on Security of Information and Networks (SIN). https://doi.org/10.1109/SIN54109.2021.9699326
In a perfect world, coordination and cooperation across distributed autonomous systems would be a trivial task. However, incomplete information, malicious actors and real-worl...

Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. (2021)
Blockchain-Based Authentication and Registration Mechanism for SIP-Based VoIP Systems. In 2021 5th Cyber Security in Networking Conference (CSNet). https://doi.org/10.1109/csnet52717.2021.9614646
The Session Initiation Protocol (SIP) is the principal signalling protocol in Voice over IP (VoIP) systems, responsible for initialising, terminating, and maintaining sessions...

A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data

Conference Proceeding
Abubakar, M., Jaroucheh, Z., Al Dubai, A., & Buchanan, W. J. (2021)
A Decentralised Authentication and Access Control Mechanism for Medical Wearable Sensors Data. In 2021 IEEE International Conference on Omni-Layer Intelligent Systems (COINS). https://doi.org/10.1109/coins51742.2021.9524172
Recent years have seen an increase in medical big data, which can be attributed to a paradigm shift experienced in medical data sharing induced by the growth of medical techno...

Blockchain-based identity and authentication scheme for MQTT protocol

Conference Proceeding
Abdelrazig Abubakar, M., Jaroucheh, Z., Al-Dubai, A., & Liu, X. (2021)
Blockchain-based identity and authentication scheme for MQTT protocol. In ICBCT '21: 2021 The 3rd International Conference on Blockchain Technology (73-81). https://doi.org/10.1145/3460537.3460549
The publish and subscribe messaging model has proven itself as a dominant messaging paradigm for IoT systems. An example of such is the commonly used Message Queuing Telemetry...

Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution

Conference Proceeding
Jaroucheh, Z., & Álvarez, I. A. (2021)
Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). https://doi.org/10.1109/icbc51069.2021.9461144
Secrets such as passwords, encryption keys, and certificates are used to assist in protecting access to resources such as computing devices, customer data and other informatio...

Programming Languages: A Usage-based Statistical Analysis and Visualization

Conference Proceeding
Orlowska, A., Chrysoulas, C., Jaroucheh, Z., & Liu, X. (2021)
Programming Languages: A Usage-based Statistical Analysis and Visualization. In ICISS 2021: 2021 The 4th International Conference on Information Science and Systems (143-148). https://doi.org/10.1145/3459955.3460614
Understanding the popularity, and its trend, of programming languages can be important to anticipate which languages are best studied for future use, which are widely supporte...

PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism

Conference Proceeding
Abubakar, M. A., Jaroucheh, Z., Al-Dubai, A., & Buchanan, B. (2020)
PoNW: A Secure and Scalable Proof-of-Notarized-Work-Based Consensus Mechanism. In ICVISP 2020: Proceedings of the 2020 4th International Conference on Vision, Image and Signal Processing (1-8). https://doi.org/10.1145/3448823.3448875
The original consensus algorithm - Proof of Work (PoW) has been widely utilized in the blockchain systems and is been adopted by many cryptocurrencies, such as Bitcoin and Eth...