


Остановите войну!
for scientists:


default search action
Robin Doss
R. Chellappa Doss – Robin Chellappa Doss – Robin Ram Mohan Doss
Person information

- affiliation: Deakin University, Burwood, Victoria, Australia
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j57]Jongkil Jay Jeong
, Yevhen Zolotavkin
, Robin Doss
:
Examining the Current Status and Emerging Trends in Continuous Authentication Technologies through Citation Network Analysis. ACM Comput. Surv. 55(6): 122:1-122:31 (2023) - [j56]Muhammad Akbar Husnoo
, Adnan Anwar
, Nasser Hosseinzadeh, Shama Naz Islam
, Abdun Naser Mahmood
, Robin Doss:
False data injection threats in active distribution systems: A comprehensive survey. Future Gener. Comput. Syst. 140: 344-364 (2023) - [j55]Keshav Sood
, Mohammad Reza Nosouhi
, Dinh Duc Nha Nguyen
, Frank Jiang, Morshed Chowdhury
, Robin Doss
:
Intrusion Detection Scheme With Dimensionality Reduction in Next Generation Networks. IEEE Trans. Inf. Forensics Secur. 18: 965-979 (2023) - [i12]Baobao Song, Mengyue Deng, Shiva Raj Pokhrel, Qiujun Lan, Robin Doss, Gang Li:
Digital Privacy Under Attack: Challenges and Enablers. CoRR abs/2302.09258 (2023) - 2022
- [j54]Naeem Firdous Syed
, Syed W. Shah, Arash Shaghaghi
, Adnan Anwar
, Zubair A. Baig
, Robin Doss
:
Zero Trust Architecture (ZTA): A Comprehensive Survey. IEEE Access 10: 57143-57179 (2022) - [j53]Naeem Firdous Syed
, Syed W. Shah, Rolando Trujillo-Rasua
, Robin Doss
:
Traceability in supply chains: A Cyber security analysis. Comput. Secur. 112: 102536 (2022) - [j52]Tan Duy Le
, Mengmeng Ge, Adnan Anwar
, Seng W. Loke
, Razvan Beuran, Robin Doss, Yasuo Tan:
GridAttackAnalyzer: A Cyber Attack Analysis Framework for Smart Grids. Sensors 22(13): 4795 (2022) - [j51]Mohammad Reza Nosouhi
, Keshav Sood
, Marthie Grobler
, Robin Doss
:
Towards Spoofing Resistant Next Generation IoT Networks. IEEE Trans. Inf. Forensics Secur. 17: 1669-1683 (2022) - [j50]Yevhen Zolotavkin, Jongkil Jay Jeong
, Veronika Kuchta
, Maksym Slavnenko
, Robin Doss
:
Improving Unlinkability of Attribute-based Authentication through Game Theory. ACM Trans. Priv. Secur. 25(2): 12:1-12:36 (2022) - [c68]Venkata Abhishek Kanthuru, Sutharshan Rajasegarar, Punit Rathore, Robin Ram Mohan Doss, Lei Pan, Biplob Ray, Morshed Chowdhury, Chandrasekaran Srimathi, M. A. Saleem Durai:
Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis. ADMA (1) 2022: 118-130 - [c67]Jia Liang, Di Xiao, Yong Xiang, Robin Doss:
A Compressed Sensing Based Image Compression-Encryption Coding Scheme without Auxiliary Information Transmission. ICC 2022: 5573-5578 - [c66]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. ISCC 2022: 1-6 - [c65]Guizhen Yang, Mengmeng Ge, Shang Gao, Xuequan Lu, Leo Yu Zhang, Robin Doss:
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks. NSS 2022: 406-425 - [c64]Fokke Heikamp
, Lei Pan
, Rolando Trujillo-Rasua
, Sushmita Ruj
, Robin Doss
:
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts. NSS 2022: 514-523 - [c63]Mohamed Ahzam Amanullah
, Mohan Baruwal Chhetri
, Seng W. Loke, Robin Doss:
BurST-ADMA: Towards an Australian Dataset for Misbehaviour Detection in the Internet of Vehicles. PerCom Workshops 2022: 624-629 - [c62]Yangxu Song, Frank Jiang, Syed Wajid Ali Shah, Robin Doss:
A New Zero-Trust Aided Smart Key Authentication Scheme in IoV. PerCom Workshops 2022: 630-636 - [c61]Chaochen Shi, Yong Xiang, Jiangshan Yu, Longxiang Gao, Keshav Sood, Robin Ram Mohan Doss:
A Bytecode-based Approach for Smart Contract Classification. SANER 2022: 1046-1054 - [i11]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
FedREP: Towards Horizontal Federated Load Forecasting for Retail Energy Providers. CoRR abs/2203.00219 (2022) - [i10]Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss:
Towards Privacy-Preserving Neural Architecture Search. CoRR abs/2204.10958 (2022) - [i9]Mohammad Reza Nosouhi, Syed W. Shah, Lei Pan, Yevhen Zolotavkin, Ashish Nanda, Praveen Gauravaram, Robin Doss:
Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism. CoRR abs/2204.13885 (2022) - [i8]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
A Secure Federated Learning Framework for Residential Short Term Load Forecasting. CoRR abs/2209.14547 (2022) - 2021
- [j49]Muhammad Akbar Husnoo
, Adnan Anwar
, Ripon K. Chakrabortty
, Robin Doss
, Mike Ryan
:
Differential Privacy for IoT-Enabled Critical Infrastructure: A Comprehensive Survey. IEEE Access 9: 153276-153304 (2021) - [j48]Ben Stephens
, Arash Shaghaghi
, Robin Doss
, Salil S. Kanhere
:
Detecting Internet of Things Bots: A Comparative Study. IEEE Access 9: 160391-160401 (2021) - [j47]Lina Deng, Xiaoliang Wang
, Frank Jiang, Robin Doss:
EEG-based emotion recognition via capsule network with channel-wise attention and LSTM models. CCF Trans. Pervasive Comput. Interact. 3(4): 425-435 (2021) - [j46]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Anna Förster
:
Secure and privacy-preserving structure in opportunistic networks. Comput. Secur. 104: 102208 (2021) - [j45]Syed W. Shah, Naeem Firdous Syed
, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). Comput. Secur. 108: 102351 (2021) - [j44]Ravneet Kaur, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
The importance of selecting clustering parameters in VANETs: A survey. Comput. Sci. Rev. 40: 100392 (2021) - [j43]Xiangyu Song
, Jianxin Li
, ShiJie Sun
, Hui Yin
, Phillip Dawson
, Robin Ram Mohan Doss
:
SEPN: A Sequential Engagement Based Academic Performance Prediction Model. IEEE Intell. Syst. 36(1): 46-53 (2021) - [j42]Shiva Raj Pokhrel
, Lei Pan
, Neeraj Kumar
, Robin Doss
, Hai Le Vu
:
Multipath TCP Meets Transfer Learning: A Novel Edge-Based Learning for Industrial IoT. IEEE Internet Things J. 8(13): 10299-10307 (2021) - [j41]Purathani Praitheeshan, Lei Pan, Xi Zheng
, Alireza Jolfaei
, Robin Doss:
SolGuard: Preventing external call issues in smart contract-based multi-agent robotic systems. Inf. Sci. 579: 150-166 (2021) - [j40]Ghaith Khalil
, Robin Doss, Morshed U. Chowdhury:
An Extended Reselling Protocol for Existing Anti-Counterfeiting Schemes. J. Sens. Actuator Networks 10(1): 12 (2021) - [j39]Manjunath Hegde
, Adnan Anwar, A. Kotegar Karunakar
, Zubair A. Baig, Robin Doss:
A novel multi-stage distributed authentication scheme for smart meter communication. PeerJ Comput. Sci. 7: e643 (2021) - [j38]Purathani Praitheeshan, Lei Pan
, Robin Doss
:
Private and Trustworthy Distributed Lending Model Using Hyperledger Besu. SN Comput. Sci. 2(2): 115 (2021) - [j37]Tarandeep Kaur Bhatia
, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
Data congestion in VANETs: research directions and new trends through a bibliometric analysis. J. Supercomput. 77(7): 6586-6628 (2021) - [c60]Tarandeep Kaur Bhatia, Ramkumar Ketti Ramachandran
, Robin Doss, Lei Pan:
Detecting and Controlling the Occurrence of Data Congestion in a High-density VANETs Environment. FRUCT 2021: 42-48 - [c59]Iram Jawad, Jawad Ahmed, Imran Razzak
, Robin Doss:
Identifying DNS Exfiltration based on Lexical Attributes of Query Name. IJCNN 2021: 1-7 - [c58]Saheed A. Tijani, Xingjun Ma, Ran Zhang, Frank Jiang, Robin Doss:
Federated Learning with Extreme Label Skew: A Data Extension Approach. IJCNN 2021: 1-8 - [c57]Xichen Tang, Jinlong Wang, Ye Zhu, Robin Doss, Xin Han
:
Systematic evaluation of abnormal detection methods on gas well sensor data. ISCC 2021: 1-6 - [c56]Nikesh Lalchandani, Frank Jiang, Jongkil Jay Jeong
, Yevhen Zolotavkin, Robin Doss:
Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials. PST 2021: 1-7 - [c55]Maksym Slavnenko, Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Robin Doss:
Enhancing Privacy Through DMMA: Decision-Making Method for Authentication. TrustCom 2021: 297-308 - [i7]Chaochen Shi, Yong Xiang, Robin Ram Mohan Doss, Jiangshan Yu, Keshav Sood, Longxiang Gao:
A Bytecode-based Approach for Smart Contract Classification. CoRR abs/2106.15497 (2021) - [i6]Agustinus Andriyanto, Robin Doss, Suhardi:
X-Driven Methodologies for SOA System Development - A Survey. CoRR abs/2109.01805 (2021) - [i5]Muhammad Akbar Husnoo, Adnan Anwar, Nasser Hosseinzadeh, Shama Naz Islam, Abdun Naser Mahmood, Robin Doss:
False Data Injection Threats in Active Distribution Systems: A Comprehensive Survey. CoRR abs/2111.14251 (2021) - 2020
- [j36]Pengjie Zeng
, Xiaoliang Wang
, Hao Li
, Frank Jiang
, Robin Doss
:
A Scheme of Intelligent Traffic Light System Based on Distributed Security Architecture of Blockchain Technology. IEEE Access 8: 33644-33657 (2020) - [j35]Ghaith Khalil
, Robin Doss
, Morshed U. Chowdhury
:
A Novel RFID-Based Anti-Counterfeiting Scheme for Retail Environments. IEEE Access 8: 47952-47962 (2020) - [j34]Syed Wajid Ali Shah
, Arash Shaghaghi
, Salil S. Kanhere
, Jin Zhang
, Adnan Anwar
, Robin Doss
:
Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals. IEEE Access 8: 194508-194522 (2020) - [j33]Miraj Asghar, Lei Pan, Robin Doss:
An efficient voting based decentralized revocation protocol for vehicular ad hoc networks. Digit. Commun. Networks 6(4): 422-432 (2020) - [j32]Robin Doss
, Rolando Trujillo-Rasua, Selwyn Piramuthu:
Secure attribute-based search in RFID-based inventory control systems. Decis. Support Syst. 132: 113270 (2020) - [j31]Ghaith Khalil
, Robin Doss, Morshed U. Chowdhury:
A New Secure RFID Anti-Counterfeiting and Anti-Theft Scheme for Merchandise. J. Sens. Actuator Networks 9(1): 16 (2020) - [c54]Edoardo Puggioni, Arash Shaghaghi, Robin Doss
, Salil S. Kanhere
:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. NCA 2020: 1-10 - [c53]Purathani Praitheeshan
, Lei Pan
, Robin Doss
:
Security Evaluation of Smart Contract-Based On-chain Ethereum Wallets. NSS 2020: 22-41 - [c52]Matthew J. Ryan, Morshed U. Chowdhury, Frank Jiang, Robin Doss
:
Avoiding Geographic Regions in Tor. TrustCom 2020: 802-809 - [c51]Rohan Dahiya, Frank Jiang, Robin Doss
:
A Feedback-Driven Lightweight Reputation Scheme for IoV. TrustCom 2020: 1060-1068 - [c50]Syed W. Shah, Naeem Firdous Syed
, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss
:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. TrustCom 2020: 1119-1126 - [c49]Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss
, Lei Pan:
Opportunistic Tracking in Cyber-Physical Systems. TrustCom 2020: 1672-1679 - [c48]Madhur Dixit, C. Srimathi
, Robin Doss, Seng W. Loke, M. A. Saleemdurai:
Smart Parking with Computer Vision and IoT Technology. TSP 2020: 170-174 - [i4]Agustinus Andriyanto, Robin Doss:
Problems and Solutions of Service Architecture in Small and Medium Enterprise Communities. CoRR abs/2004.10660 (2020) - [i3]Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
Towards a Lightweight Continuous Authentication Protocol for Device-to-Device Communication. CoRR abs/2010.05144 (2020) - [i2]Edoardo Puggioni, Arash Shaghaghi, Robin Doss, Salil S. Kanhere:
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs. CoRR abs/2010.12134 (2020)
2010 – 2019
- 2019
- [j30]Xiaoliang Wang
, Pengjie Zeng, Nicholas Charles Patterson
, Frank Jiang, Robin Doss
:
An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology. IEEE Access 7: 45061-45072 (2019) - [j29]Shiju Sathyadevan
, Krishnashree Achuthan, Robin Doss
, Lei Pan
:
Protean Authentication Scheme - A Time-Bound Dynamic KeyGen Authentication Technique for IoT Edge Nodes in Outdoor Deployments. IEEE Access 7: 92419-92435 (2019) - [j28]Samaneh Rashidibajgan
, Robin Doss
:
Privacy-preserving history-based routing in Opportunistic Networks. Comput. Secur. 84: 244-255 (2019) - [j27]Ghaith Khalil
, Robin Doss
, Morshed U. Chowdhury:
A Comparison Survey Study on RFID Based Anti-Counterfeiting Systems. J. Sens. Actuator Networks 8(3): 37 (2019) - [c47]Waqas Ahmad Piracha, Morshed U. Chowdhury, Biplob Ray
, Sutharshan Rajasegarar
, Robin Doss
:
Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands. ATIS 2019: 77-91 - [c46]Ayoob Ayoob, Ghaith Khalil
, Morshed U. Chowdhury
, Robin Doss
:
Intrusion Detection System Classifier for VANET Based on Pre-processing Feature Extraction. FNSS 2019: 3-22 - [c45]Liming Jiang, Yan Wang, Jiajun Tian, Frank Jiang, Nicholas Charles Patterson
, Robin Doss
:
An Efficient Dynamic Group-Based Batch Verification Scheme for Vehicular Sensor Networks. FNSS 2019: 52-64 - [c44]Purathani Praitheeshan, Yi Wei Xin, Lei Pan
, Robin Doss
:
Attainable Hacks on Keystore Files in Ethereum Wallets - A Systematic Analysis. FNSS 2019: 99-117 - [c43]Fei Gao, Frank Jiang, Yuping Zhang, Robin Doss
:
Quorum Chain-Based Malware Detection in Android Smart Devices. FNSS 2019: 212-224 - [c42]Morshed U. Chowdhury, Robin Doss, Biplob Ray
, Sutharshan Rajasegarar
, Sujan Chowdhury:
IoT Insider Attack - Survey. SGIoT 2019: 28-41 - [e6]Robin Doss
, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 5th International Conference, FNSS 2019, Melbourne, VIC, Australia, November 27-29, 2019, Proceedings. Communications in Computer and Information Science 1113, Springer 2019, ISBN 978-3-030-34352-1 [contents] - [i1]Purathani Praitheeshan, Lei Pan, Jiangshan Yu, Joseph K. Liu, Robin Doss
:
Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey. CoRR abs/1908.08605 (2019) - 2018
- [j26]Haiying Xia, Frank Jiang
, Shuaifei Deng, Jing Xin, Robin Doss
:
Mapping Functions Driven Robust Retinal Vessel Segmentation via Training Patches. IEEE Access 6: 61973-61982 (2018) - [j25]Asma'a Ahmad
, Robin Doss
, Majeed Alajeely, Sarab F. Al Rubeaai, Dua'a Ahmad:
Packet integrity defense mechanism in OppNets. Comput. Secur. 74: 71-93 (2018) - [j24]Asma'a Ahmad, Robin Doss
, Majeed Alajeely, Sarab F. Al Rubeaai:
Trust strategy implementation in OppNets. Computing 100(2): 151-181 (2018) - [j23]Menik Tissera, Robin Doss
, Gang Li
, Vicky H. Mak-Hau, Lynn Batten:
A Novel Approach for Information Discovery in Wireless Sensor Grids. J. Netw. Syst. Manag. 26(3): 640-662 (2018) - [j22]Md. Shamsul Huda, Md. Suruz Miah, John Yearwood, Sultan Alyahya
, Hmood Al-Dossari, Robin Doss
:
A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network. J. Parallel Distributed Comput. 120: 23-31 (2018) - [c41]Ahmed Falah
, Lei Pan
, Mohamed Abdelrazek
, Robin Doss
:
Identifying Drawbacks in Malicious PDF Detectors. FNSS 2018: 128-139 - [c40]Samaneh Rashidibajgan
, Robin Doss:
A New Method for Sharing the Public Keys in Opportunistic Networks. FNSS 2018: 147-161 - [c39]Miraj Asghar, Robin Ram Mohan Doss
, Lei Pan
:
A Scalable and Efficient PKI Based Authentication Protocol for VANETs. ITNAC 2018: 1-3 - [e5]Robin Doss
, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - 4th International Conference, FNSS 2018, Paris, France, July 9-11, 2018, Proceedings. Communications in Computer and Information Science 878, Springer 2018, ISBN 978-3-319-94420-3 [contents] - 2017
- [j21]Saravanan Sundaresan, Robin Doss
, Selwyn Piramuthu, Wanlei Zhou
:
A secure search protocol for low cost passive RFID tags. Comput. Networks 122: 70-82 (2017) - [j20]Majeed Alajeely
, Robin Doss
, Asma'a Ahmad, Vicky H. Mak-Hau
:
Defense against packet collusion attacks in opportunistic networks. Comput. Secur. 65: 269-282 (2017) - [j19]Selwyn Piramuthu, Robin Doss
:
On sensor-based solutions for simultaneous presence of multiple RFID tags. Decis. Support Syst. 95: 102-109 (2017) - [j18]Sabu M. Thampi
, Jaime Lloret Mauri, Robin Doss
:
Special issue on Underwater Acoustic Sensor Networks: Emerging trends and current perspectives. J. Netw. Comput. Appl. 92: 1-2 (2017) - [j17]Xiuqing Chen, Tianjie Cao
, Robin Doss
, Jingxuan Zhai:
Attacks on and Countermeasures for Two RFID Protocols. Wirel. Pers. Commun. 96(4): 5825-5848 (2017) - [c38]Asma'a Ahmad, Robin Doss, Majeed Alajeely, Khlood Ahmad:
Securing OppNets from Packet Integrity Attacks Using Trust and Reputation. AINA Workshops 2017: 7-12 - [c37]Gaith K. D. Al., Robin Doss, Morshed U. Chowdhury
:
Adjusting Matryoshka Protocol to Address the Scalability Issue in IoT Environment. FNSS 2017: 84-94 - [c36]Shiju Sathyadevan, V. Vejesh, Robin Doss
, Lei Pan
:
Portguard - an authentication tool for securing ports in an IoT gateway. PerCom Workshops 2017: 624-629 - [e4]Robin Doss
, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Third International Conference, FNSS 2017, Gainesville, FL, USA, August 31 - September 2, 2017, Proceedings. Communications in Computer and Information Science 759, Springer 2017, ISBN 978-3-319-65547-5 [contents] - 2016
- [j16]Tianjie Cao
, Xiuqing Chen, Robin Doss
, Jingxuan Zhai, Lucas J. Wise, Qiang Zhao:
RFID ownership transfer protocol based on cloud. Comput. Networks 105: 47-59 (2016) - [j15]Faizal Riaz-ud-Din, Wanlei Zhou
, Robin Doss
:
Query verification schemes for cloud-hosted databases: a brief survey. Int. J. Parallel Emergent Distributed Syst. 31(6): 543-561 (2016) - [c35]Asma'a Ahmad, Majeed Alajeely, Robin Doss
:
Establishing trust relationships in OppNets using Merkle trees. COMSNETS 2016: 1-6 - [c34]Gaith K. D. Al., Robin Doss
, Morshed U. Chowdhury
, Biplob R. Ray
:
Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept. FNSS 2016: 126-141 - [c33]Faizal Riaz-ud-Din, Robin Doss
, Wanlei Zhou
:
String matching query verification on cloud-hosted databases. ICDCN 2016: 17:1-17:10 - [e3]Robin Doss
, Selwyn Piramuthu, Wei Zhou:
Future Network Systems and Security - Second International Conference, FNSS 2016, Paris, France, November 23-25, 2016, Proceedings. Communications in Computer and Information Science 670, 2016, ISBN 978-3-319-48020-6 [contents] - [e2]Peter Müller, Sabu M. Thampi, Md. Zakirul Alam Bhuiyan, Ryan Kok Leong Ko, Robin Doss, Jose M. Alcaraz Calero:
Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings. Communications in Computer and Information Science 625, Springer 2016, ISBN 978-981-10-2737-6 [contents] - 2015
- [j14]Saravanan Sundaresan, Robin Doss
, Wanlei Zhou
, Selwyn Piramuthu:
Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy. Comput. Commun. 55: 112-124 (2015) - [j13]Majeed Alajeely
, Robin Doss
, Asma'a Ahmad, Vicky H. Mak-Hau:
Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks. Comput. Commun. 71: 111-118 (2015) - [j12]Saravanan Sundaresan, Robin Doss
, Wanlei Zhou
:
Zero Knowledge Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Computers 64(10): 2994-3008 (2015) - [j11]Saravanan Sundaresan, Robin Doss
, Selwyn Piramuthu, Wanlei Zhou
:
Secure Tag Search in RFID Systems Using Mobile Readers. IEEE Trans. Dependable Secur. Comput. 12(2): 230-242 (2015) - [c32]Majeed Alajeely, Asma'a Ahmad, Robin Doss
:
Malicious Node Traceback in Opportunistic Networks Using Merkle Trees. DSDIS 2015: 147-152 - [c31]Menik Tissera, Robin Doss
, Gang Li
, Lynn Margaret Batten:
Novel Approach for Information Discovery in Autonomous Wireless Sensor Networks. FNSS 2015: 47-60 - [c30]Majeed Alajeely, Asma'a Ahmad, Robin Doss
, Vicky H. Mak-Hau:
An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks. FNSS 2015: 84-100 - [c29]Menik Tissera, Robin Doss
, Gang Li
, Lynn Batten:
Fast and energy efficient data storage for information discovery in multi-dimensional WSNs. ITNAC 2015: 88-93 - [e1]Robin Doss
, Selwyn Piramuthu, Wei Zhou
:
Future Network Systems and Security - First International Conference, FNSS 2015, Paris, France, June 11-13, 2015, Proceedings. Communications in Computer and Information Science 523, Springer 2015, ISBN 978-3-319-19209-3 [contents] - 2014
- [j10]Saravanan Sundaresan, Robin Doss
, Selwyn Piramuthu, Wanlei Zhou
:
A Robust Grouping Proof Protocol for RFID EPC C1G2 Tags. IEEE Trans. Inf. Forensics Secur. 9(6): 961-975 (2014) - [c28]Majeed Alajeely, Asma'a Ahmad, Robin Doss
, Vicky H. Mak-Hau:
Packet Faking Attack: A Novel Attack and Detection Mechanism in OppNets. CIS 2014: 638-642 - [c27]Saravanan Sundaresan, Robin Doss
:
Secure yoking proof protocol for RFID systems. ICACCI 2014: 1585-1591 - [c26]Asma'a Ahmad, Majeed Alajeely, Robin Doss
:
Defense against packet dropping attacks in opportunistic networks. ICACCI 2014: 1608-1613 - 2013
- [j9]Robin Doss
, Saravanan Sundaresan, Wanlei Zhou
:
A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems. Ad Hoc Networks 11(1): 383-396 (2013) - [j8]Robin Doss
, Wanlei Zhou
, Shui Yu
:
Secure RFID Tag Ownership Transfer Based on Quadratic Residues. IEEE Trans. Inf. Forensics Secur. 8(2): 390-401 (2013) - [c25]Saravanan Sundaresan, Robin Doss
, Wanlei Zhou
:
Secure ownership transfer in multi-tag/multi-owner passive RFID systems. GLOBECOM 2013: 2891-2896 - [c24]