You are now in the main content area
Recent Publications
Journals
2024
- Optimal roadworks schedule in multi-agent transportation models (opens in new window)
- Breaking the mold: the pursuit of decentralized trade and supply chain finance (opens in new window)
- Multiparty Computation: To Secure Privacy, Do the Math: A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan (opens in new window)
2023
- Introducing technological disruption: How breaking media attention on corporate events impacts online sentiment (opens in new window)
- What is driving consumer resistance to crypto‐payment? A multianalytical investigation (opens in new window)
- XMal: A lightweight memory-based explainable obfuscated-malware detector (opens in new window)
- Formal unlinkability analysis of message authentication protocols based on authentic channels (opens in new window)
- Quantum Computing and IS - Harnessing the Opportunities of Emerging Technologies (opens in new window)
- From Zero to One Hundred - Demystifying zero trust and its implications on enterprise people, process, and technology (opens in new window)
- The Arrival of Zero Trust: What Does it Mean? (opens in new window)
2022
- A data-driven, comparative review of the academic literature and news media on blockchain-enabled supply chain management: Trends, gaps, and research needs (opens in new window)
- Advanced encryption schemes in multi-tier heterogeneous internet of things: Taxonomy, capabilities, and objectives (opens in new window)
- Controlled quantum teleportation in the presence of an adversary (opens in new window)
- High interest, low adoption. A mixed-method investigation into the factors influencing organisational adoption of blockchain technology (opens in new window)
- Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment (opens in new window)
- How Perceptions of Information Privacy and Security Impact Consumer Trust in Crypto-Payment: An Empirical Study (opens in new window)
- Tightly Secure PKE Combiner in the Quantum Random Oracle Model (opens in new window)
- A holistic analysis towards understanding consumer perceptions of virtual reality devices in the post-adoption phase (opens in new window)
- Distributed Renewable Energy Management: A Gap Analysis and Proposed Blockchain-Based Architecture (opens in new window)
- Advanced digital signatures for preserving privacy and trust management in hierarchical heterogeneous IoT: Taxonomy, capabilities, and objectives (opens in new window)
- On the Security of the Dandelion Protocol (opens in new window)
- Security Improvements for Privacy-Preserving Quantum Multiparty Computation based on Circular Structure (opens in new window)
2021
- Innovation Within Networks – Patent Strategies for Blockchain Technology (opens in new window)
- Quantum-based Privacy-Preserving Sealed-bid Auction on the Blockchain (opens in new window)
- Quantum-safe Trust for Vehicles: The race is already on (opens in new window)
- The Complex Path to Quantum Resistance (opens in new window)
- Distributed Interoperable Records: The Key to Better Supply Chain Management (opens in new window)
- A Cross-Pollination of ideas about Distributed Ledger Technological Innovation through a Multidisciplinary and Multisectoral lens: Insights from the Blockchain Technology Symposium ’21 (opens in new window)
- Secure multiparty quantum key agreement against collusive attacks (opens in new window)
- Optimization of the cost of urban traffic through an online bidding platform for commuters. (opens in new window)
- On broadcasting time in the model of travelling agents (opens in new window)
- Usurping Double-Ending Fraud in Real Estate Transactions via Blockchain Technology (opens in new window)
2020
- Time-based Gap Analysis of Cybersecurity Trends in Academic and Digital Media (opens in new window)
- Touching Holograms with Windows Mixed Reality: Renovating the Consumer Retailing Services (opens in new window)
- An Enterprise Transformation Guide for the Inevitable Blockchain Disruption (opens in new window)
- Preparing for the Information Security Threat from Quantum Computers (opens in new window)
- A review of quantum and hybrid quantum/classical blockchain protocols (opens in new window)
- Blockchain platform for industrial healthcare: Vision and future opportunities (opens in new window)
- Multiagent Routing Simulation with Partial Smart Vehicles Penetration (opens in new window)
2019
- Secure dynamic multiparty quantum private comparison (opens in new window)
- Assessing the quantum-resistant cryptographic agility of routing and switching IT network infrastructure in a large-size financial organization (opens in new window)
- Improved Dynamic Multi-Party Quantum Private Comparison for Next Generation Mobile Network (opens in new window)
Conference Proceedings
- Understanding Adoption Intentions for Blockchain-based Personal Health Records: Integrating Technology Usage and Initial Trust Perspectives (opens in new window)
- Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability (opens in new window)
- Implications of Organizational Governance on Cybersecurity Management: A Qualitative Study in Higher Education (opens in new window)
- Towards Generalized Diffie-Hellman-esque Key Agreement via Generic Split KEM Construction (opens in new window)
- PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing (opens in new window)
- Environmental Factors that Hinder an Organization’s Ability to Learn from Cyber Incidents: A Case Study on SolarWinds (opens in new window)
- Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things (opens in new window)
- Changing Hearts and Minds: The Role of Cybersecurity Champion Programs in Cybersecurity Culture (opens in new window)
- Raising Cybersecurity Awareness Through Electronic Word of Mouth: A Data-Driven Assessment (opens in new window)
- Digital Privacy Literacy and Privacy Preservation: Towards a New Scale (opens in new window)
- Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks (opens in new window)
- XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things (opens in new window)
- Mindfulness and Cybersecurity Behavior: A comparative analysis of rational and intuitive cybersecurity decisions (opens in new window)
- Blockchain-enabled supply chain for building resilience through exploitation and exploration: How do supply chain contingencies affect adoption outcomes? (opens in new window)
- Towards a predictive model of blockchain-based medical records adoption: How do technology readiness and initial trust affect behavioral intentions? (opens in new window)
- Who is Influencing the #GDPR Discussion on Twitter: Implications for Public Relations (opens in new window)
- Utility Blockchain for Transparent Disaster Recovery (opens in new window)
- An Enhanced Real Estate Transaction Process Based on Blockchain Technology (opens in new window)