Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 31 - 45 of 251.

Add to Quick Collection   All 251 Results

Sort:
 Add All Items to Quick Collection
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1029885
Description: Web based applications are very common nowadays where almost every software can be accessible through a web browser in one form or the other. This paper proposes techniques to detect diffierent threat ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1062421
Description: Modern society heavily depends on wireless spectrum for communication purposes. With the rapid increase in mobile devices and Internet of Things (IoT), the need for wireless spectrum has grown dramati ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1049354
Description: Digital provenance, as an important type of cloud data, has aroused increasing attention on improving system performance. Currently, provenance have been employed to provide hints on access control an ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1048899
Description: In this paper, we propose a cross verification mechanism for secure execution and dynamic component loading. Our mechanism is based on a combination of code signing and same-origin policy, and it bloc ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043972
Description: The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/355967
Description: Radio Frequency Identification (RFID) has been widely adopted in practice for objects identification. The ownership of an object can be represented by the ownership of the RFID tag attached to the obj ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/363107
Description: Cloud data storage has provided significant benefits by allowing users to store massive amount of data on demand in a cost-effective manner. To protect the privacy of data stored in the cloud, cryptog ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1043943
Description: Cloud computing technologies are receiving a great deal of attention. Although there are several benefits with the cloud, attackers can also make use of the cloud infrastructure for hosting malicious ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/1048821
Description: Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, which allows a reader to identify objects in an authenticated manner. Recently, Liao and Hsiao propo ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/308453
Description: Over the last few years, exploit kits have been increasingly used for system compromise and malware propagation. As they target the web browser which is one of the most commonly used software in the I ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/331490
Description: In recent times, there has been an increasing development of storing data securely in the cloud. The Role-based access control (RBAC) model, a widely used access control model, can provide a flexible ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/327587
Description: The security of modern computer systems heavily depends on security tools, especially on antivirus software solutions. In the anti-malware research community, development of techniques for evading det ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/284590
Description: Cloud computing technologies are receiving a great deal of attention. Furthermore most of the hardware devices such as the PCs and mobile phones are increasingly having a trusted component called Trus ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: journal article
Identifier: http://hdl.handle.net/1959.14/319230
Description: Lightweight devices, such as radio frequency identification tags, have a limited storage capacity, which has become a bottleneck for many applications, especially for security applications. Ciphertext ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: book chapter
Identifier: http://hdl.handle.net/1959.14/1089283
Description: With the rapid increase in the amount of digital information that needs to be stored, cloud storage has attracted much attention in recent times because of its ability to deliver resources for storage ... More