Macquarie University, Sydney Macquarie University ResearchOnline

Showing items 1 - 15 of 96.

Add to Quick Collection   All 96 Results

Sort:
 Add All Items to Quick Collection
Date: 2016
Subject Keyword: accountability | blockchain | p2p | arbitration
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1197235
Description: Cloud computing has provided an attractive model for business service delivery. However, accountability aspects, mainly the monitoring of the execution of a service contract, liability assignment and ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1190067
Description: With the recognition of the significance of OSNs (Online Social Networks) in the recommendation of services in e-commerce, there are more and more e-commerce platform being combined with OSNs, forming ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1201506
Description: In Online Social Networks (OSNs), the important participants, the trust relations between participants, and the interaction contexts between participants greatly impact a participant's decision-making ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1249891
Description: Information and Communication Technologies (ICT) based applications for Ambient Assisted Living (AAL) help elderly or individual people living home alone. AAL system reliability is mostly based on the ... More
Reviewed: Reviewed
Date: 2016
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1201646
Description: In recent years, substantial research efforts have gone into investigating different approaches to the detection of events in real time from the Twitter data stream. Most of these approaches, however, ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1055440
Description: The fuzzy commitment scheme and the fuzzy vault scheme have been widely investigated by researchers in the distribution of symmetric keys within a Wireless Body Area Network (WBAN) for security purpos ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1067845
Description: Random Binary Sequences (BSS) play an important role in cryptographic algorithms. In order to secure Wireless Body Area Networks (WBANs), electrocardiogram (ECG) signal-based BS generation algorithms ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/357504
Description: Wireless Sensor Networks (WSNs) are often deployed in remote and hostile areas and because of their limited power and vulnerability, the sensors may stop functioning after sometime leading to the appe ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1055470
Description: Online Social Networks (OSNs) have become an integral part of daily life in recent years. OSNs contain important participants, the trust relations between participants, and the contexts in which parti ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/1063066
Description: Predicting the trust between a source participant and a target participant in a social network is important in many applications, e.g., assessing the recommendation from a target participant from the ... More
Reviewed: Reviewed
Date: 2015
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/360378
Description: Graph Pattern Matching (GPM) plays a significant role in social network analysis, which has been widely used in, for example, experts finding, social community mining and social position detection. Gi ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/326726
Description: The security of wireless communication module for Implantable Medical Devices (IMDs) poses a unique challenge that doctors in any qualified hospital should have the access to the IMDs for an emergency ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/339119
Description: The security issue of wireless Implantable Medical Devices (IMD) is an emerging area of research. The unique challenge here is that an IMD should be accessed by doctors with no authorization for emerg ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/335746
Description: This paper proposes a novel context-aware cloud service selection model based on the comparison and aggregation of subjective assessment extracted from cloud user feedback and objective assessment fro ... More
Reviewed: Reviewed
Date: 2014
Language: eng
Resource Type: conference paper
Identifier: http://hdl.handle.net/1959.14/308345
Description: A crucial issue with hybrid quantum secret sharing schemes is the amount of data that is allocated to the participants. The smaller the amount of allocated data, the better the performance of a scheme ... More
Full Text: Full Text
Reviewed: Reviewed