Skip navigation

Items where Greenwich Author is "Adekunle, Andrew"

Items where Greenwich Author is "Adekunle, Andrew"

Up a level
Export as [feed] RSS
Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: AES block-cipher, security services, pervasive networks, authenticated encryption | Access control, Authentication, Communication system security, Mobile ad hoc networks | Computor, Homogeneous, Human Workflow Modelling, Queueing Theory, Resource Management | Cryptographic primitives; Unmanned Vehicles; Secure Communications; Energy Conservation; Encryption | Mobile ad hoc networks; Access control; Authentication; Communication system security | Networked Control Systems, Wireless Sensor Networks, AEAD constructs. | Unmanned Vehicles, Cryptography, Wireless, Construct design | Unmanned Vehicles; Security; Wireless; QoS; QoE | Wireless mesh networks, Routing protocols, Network topology | authenticated encryption, associated data, message authentication, modes of operation, wireless sensor networks, AEAD | closed loop control, real-time systems,computational constraints, security constructs | distributed task allocation, MANET, cost, communication, cluster topology | industrial control systems, real-time communication, impact modelling | message authentication code, data integrity, data origin authentication, skipjack, wireless sensor networks | message authentication information, security block ciphers, integrity, ubiquitous networks | secure channel, real-time wireless communication, AEAD mode, Pervasive computing, TinyAEAD | unmanned aerial vehicles; throughput; latency; security; wireless | virtual closed network, virtual private network, security, MANET, autonomy | wireless network, cryptographic frameworks, data communication, cryptography
Number of items: 19.

AES block-cipher, security services, pervasive networks, authenticated encryption

Adekunle, A.A. and Woodhead, S.R. (2010) A resourceful combined block cipher mode of operation for packetised network communication. In: Proceedings - NGMAST 2010: 4th International Conference on Next Generation Mobile Applications, Services, and Technologies. IEEE Computer Society, Piscataway, USA, pp. 180-185. ISBN 9781424476497 (doi:https://doi.org/10.1109/NGMAST.2010.44)

Access control, Authentication, Communication system security, Mobile ad hoc networks

Hurley-Smith, Darren, Wetherall, Jodie ORCID: 0000-0002-4786-5824 and Adekunle, Andrew (2017) SUPERMAN: Security using pre-existing routing for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 16 (10). pp. 2927-2940. ISSN 1536-1233 (doi:https://doi.org/10.1109/TMC.2017.2649527)

Computor, Homogeneous, Human Workflow Modelling, Queueing Theory, Resource Management

Johnson, J. A. and Adekunle, A. A. (2016) Human workflow modelling in homogeneous computor networks. In: 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST). IEEE, pp. 65-71. ISBN 978-1509009503 ISSN 2161-2897 (Online) (doi:https://doi.org/10.1109/NGMAST.2016.21)

Cryptographic primitives; Unmanned Vehicles; Secure Communications; Energy Conservation; Encryption

Sparrow, R. D, Adekunle, A. A. and Berry, R. J. (2017) LEOPARD lightweight encryption operation permutation addition rotation and diffusion. In: IEEE 10th International Conferences on Signal Processing and Communication Systems. IEEE, pp. 1-5. ISBN 978-1-5090-0941-1 (doi:https://doi.org/10.1109/ICSPCS.2016.7843322)

Mobile ad hoc networks; Access control; Authentication; Communication system security

Hurley-Smith, Darren, Wetherall, Jodie ORCID: 0000-0002-4786-5824 and Adekunle, Andrew (2016) Securing autonomous networks through virtual closure. International Journal of Intelligent Computing Research (IJICR), 7 (2). pp. 695-705. ISSN 2042-4655 (doi:https://doi.org/10.20533/ijicr.2042.4655.2016.0085)

Networked Control Systems, Wireless Sensor Networks, AEAD constructs.

Sparrow, R. D., Adekunle, Andrew, Berry, Robert and Farnish, Richard (2015) Study of two security constructs on throughput for wireless sensor multi-hop networks. In: 38th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), 2015, 25-29th May, Opatija. (doi:https://doi.org/10.1109/MIPRO.2015.7160476)

Unmanned Vehicles, Cryptography, Wireless, Construct design

Sparrow, R. D, Adekunle, A. A., Berry, R. J. and Farnish, R. J. (2016) A novel block cipher design paradigm for secured communication. In: 2016 Annual IEEE 10th International Systems Conference (SysCon). IEEE, Florida, United States of America, pp. 1-6. ISBN 978-1-4673-9519-9 (doi:https://doi.org/10.1109/SYSCON.2016.7490659)

Unmanned Vehicles; Security; Wireless; QoS; QoE

Sparrow, R. D., Adekunle, A. A., Berry, R. J. and Farnish, R. J. (2016) The affect of two cryptographic constructs on QoS and QoE for unmanned control vehicles. In: 2015 9th International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE, pp. 265-269. ISBN 978-1-4799-8660-6 (doi:https://doi.org/10.1109/NGMAST.2015.46)

Wireless mesh networks, Routing protocols, Network topology

McCluskey, Alex ORCID: 0000-0003-4100-9864 and Adekunle, Andrew (2018) Constructing an Innovative, Economical and Secure Wireless Mesh Network: Comparing OSPF and RIP. In: ICICT 2018, 27-28 February 2018, London. (Submitted)

authenticated encryption, associated data, message authentication, modes of operation, wireless sensor networks, AEAD

Adekunle, A.A. and Woodhead, S.R. (2010) An efficient authenticated-encryption with associated-data block cipher mode for wireless sensor networks. In: Osipov, E., Kassler, A., Bohnert, Th.M. and Masip-Bruin, X., (eds.) Wired/Wireless Internet Communications. 8th International Conference, WWIC 2010, Lulea, Sweden, June 1-3, 2010. Proceedings. Lecture Notes in Computer Science (6074). Springer, Berlin / Heidelberg / NewYork, pp. 375-385. ISBN 978-3-642-13314-5 (doi:https://doi.org/10.1007/978-3-642-13315-2_31)

closed loop control, real-time systems,computational constraints, security constructs

Sparrow, R. D., Adekunle, Andrew, Berry, Robert and Farnish, Richard (2015) Simulating and modelling the impact of secure communication latency for closed loop control. In: Internet Technologies and Applications (ITA), 2015. IEEE, Wrexham, UK, pp. 138-143. ISSN 9781479980369 (doi:https://doi.org/10.1109/ITechA.2015.7317384)

distributed task allocation, MANET, cost, communication, cluster topology

Smith, Darren, Wetherall, Jodie ORCID: 0000-0002-4786-5824, Woodhead, Stephen and Adekunle, Andrew (2014) A cluster-based approach to consensus based distributed task allocation. In: Proceedings 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing PDP 2014. IEEE Computer Society, Conference Publishing Services (CPS), Los Alamitos, CA, USA, pp. 428-431. ISBN 9781479927289 ISSN 1066-6192 (doi:https://doi.org/10.1109/PDP.2014.87)

industrial control systems, real-time communication, impact modelling

Sparrow, R. D., Adekunle, A. A., Berry, R. J. and Farnish, R. J. (2014) Simulating and modelling the impact of security constructs on latency for open loop control. In: 6th Computer Science and Electronic Engineering Conference (CEEC), 2014. IEEE, Colchester, pp. 85-90. ISBN 9781479966929 (doi:https://doi.org/10.1109/CEEC.2014.6958560)

message authentication code, data integrity, data origin authentication, skipjack, wireless sensor networks

Adekunle, A.A. and Woodhead, S.R. (2009) On efficient data integrity and data origin authentication for wireless sensor networks utilising block cipher design techniques. In: Al-Begain, Khalid, (ed.) NGMAST 2009: the Third International Conference on Next Generation Mobile Applications, Services and Technologies. IEEE Computer Society Press, Cardiff, UK, pp. 419-424. ISBN 978-0-7695-3786-3 (doi:https://doi.org/10.1109/NGMAST.2009.78)

message authentication information, security block ciphers, integrity, ubiquitous networks

Adekunle, A.A. and Woodhead, S.R. (2010) Zone based systems design framework for the realisation of efficient block cipher based message authentication code algorithms. In: ARES 2010 Fifth International Conference on Availability, Reliability, and Security15-18 February 2010 Krakow, Poland. Conference Publishing Services, IEEE Computer Society, Los Alamitos, California, pp. 216-221. ISBN 9781424458790 (doi:https://doi.org/10.1109/ARES.2010.109)

secure channel, real-time wireless communication, AEAD mode, Pervasive computing, TinyAEAD

Adekunle, A.A. and Woodhead, S.R. (2012) An AEAD cryptographic framework and TinyAEAD construct for secure WSN communication. In: Wireless Advanced (WiAd), 2012. IEEE Conference Publications . Institution of Electrical and Electronics Engineering, Inc., Piscataway, NJ, USA, pp. 1-5. ISBN 9781457721939 (doi:https://doi.org/10.1109/WiAd.2012.6296560)

unmanned aerial vehicles; throughput; latency; security; wireless

Sparrow, R.D., Adekunle, A.A., Berry, R.J. and Farnish, R.J. (2015) Balancing throughput and latency for an aerial robot over a wireless secure communication link. In: 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF). IEEE, pp. 184-189. ISBN 978-1-4799-8320-9 (doi:https://doi.org/10.1109/CYBConf.2015.7175929)

virtual closed network, virtual private network, security, MANET, autonomy

Smith, Darren P., Wetherall, Jodie ORCID: 0000-0002-4786-5824 and Adekunle, Andrew (2015) Virtual closed networks: A secure approach to autonomous mobile ad hoc networks. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, London, UK, pp. 391-398. ISBN 978-1-908320-52-0 (doi:https://doi.org/10.1109/ICITST.2015.7412128)

wireless network, cryptographic frameworks, data communication, cryptography

Adekunle, Andrew A. (2012) Design and analysis of light-weight symmetric cryptographic frameworks and constructs for secure packet mode wireless communication. PhD thesis, University of Greenwich.

This list was generated on Sat Feb 23 02:53:36 2019 UTC.