Issue Date | Title | Author(s) |
2022-02-01 | Revocable Identity-Based Access Control for Big Data with Verifiable Outsourced Computing | Xiong, H; Choo, KKR; Vasilakos, AV |
2020-09-01 | A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things | Xu, C; Ren, W; Yu, L; Zhu, T; Choo, KKR |
2020-04-01 | Lightweight Privacy-Preserving Training and Evaluation for Discretized Neural Networks | Chen, J; Zhou, J; Cao, Z; Vasilakos, AV; Dong, X; Choo, KKR |
2020-04-01 | Energy Management for Cyber-Physical Cloud Systems | Kumar, N; Vasilakos, AV; Choo, KKR; Yang, LT |
2020-01-01 | IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities | Li, S; Choo, KKR; Tan, Z; He, X; Hu, J; Qin, T |
2020 | Secure search for encrypted personal health records from big data NoSQL databases in cloud | Chen, L; Zhang, N; Sun, HM; Chang, CC; Yu, S; Choo, KKR |
2018-09-14 | Lico: A Lightweight Access Control Model for Inter-Networking Linkages | Li, S; Ren, W; Zhu, T; Choo, KKR |
2018-08-15 | BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 | Lin, C; He, D; Huang, X; Choo, KKR; Vasilakos, AV |
2018-07-05 | Performance and Security Evaluations of Identity-and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt | Zhong, S; Ren, W; Zhu, T; Ren, Y; Choo, KKR |
2018-06-01 | Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks | Meng, W; Choo, KKR; Furnell, S; Vasilakos, AV; Probst, CW |
2018-01-01 | User relationship classification of facebook messenger mobile data using WEKA | Umair, A; Nanda, P; He, X; Choo, KKR |
2018-01-01 | Graph-Based Symmetric Crypto-System for Data Confidentiality | Mishra, AK; Obaidat, MS; Puthal, D; Tripathy, AK; Choo, KKR |
2017-10-01 | Building spatial temporal relation graph of concepts pair using web repository | Xu, Z; Xuan, J; Liu, Y; Choo, KKR; Mei, L; Hu, C |
2017-01-15 | A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps | D'Orazio, CJ; Lu, R; Choo, KKR; Vasilakos, AV |
2016-10-01 | Building knowledge base of urban emergency events based on crowdsourcing of social media | Xu, Z; Zhang, H; Hu, C; Mei, L; Xuan, J; Choo, KKR; Sugumaran, V; Zhu, Y |