Skip navigation

Items where Greenwich Author is "Mantas, Georgios"

Items where Greenwich Author is "Mantas, Georgios"

Up a level
Export as [feed] RSS
Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: 5G Communications, C-RAN, Security, Intrusion Attacks, Denial of Service Attacks | 5G, beyond 5G, decentralized systems, device-to-device communication, key management, mobile small cells, security, small cells, wireless ad hoc networks | 5G, security, privacy, key management, mobile small cells, network coding, D2D communications | Byzantine attack, cyber-physical systems, eavesdropping attack, entropy attack, network coding security, stateless network coding, state-aware network coding, wireless sensor networks | European telecommunications standards institute (ETSI)/parlay architecture, personalized healthcare services, profiling mechanisms, security mechanisms, sensor networks mechanisms | Industrial IoT, M2M Communications, Lightweight authentication, Security, Sensors | Industry 4.0, Cyber-Physical Production Systems, Security, Machine Learning, Network Segregation, IIoT, MTC, Traffic Classification | Industry 4.0, Semiconductor Supply Chain, Network Secure Com-munications, SSL/TLS, OAuth2 | Mobile Intrusion Detection System, Android, Security, 5G Communications, Machine Learning, Malware Detection, Host-based IDS | Mobile Small Cells, 5G Communications, Security, Network Coding, D2D Communications | Mobile communication, Protocols, Browsers, Authentication, Servers, Mobile handsets, Authorization | Network coding, Random linear network coding, Tag pollution attacks, Homomorphic MACs | Network coding, Security, Data pollution attack, Tag pollution attack, Wireless networks | Network coding, homomorphic message authentication code, data pollution attack, tag pollution attack | PKI, healthcare network, trust list, identity certificates, attribute certificates | Privacy, Authentication, Pseudonyms, Vehicular, Intelligent Transportation Systems | Security, Protocols, Industries, Safety, Law, Quality of service | Smart Grid, Smart Home, AMI, IoT, M2M, Security, Intrusion Detection, Price Integrity, Load Alteration | Software defined network; Body area networks; Ubiquitous healthcare service delivery | TLS, MITM attack, authentication, impersonation, HTTPS, Industry 4.0 Supply Chain | Ubiquitous healthcare; Cloud computing; Profile management system; Smart card technology | User Privacy, OAuth 2.0, Smart City, e-Health, Mobile | WLAN, authentication, intelligent, protocol, supplicant, authenticator, authentication server | android, security and privacy, intrusion detection and prevention system (IDPS), anomalydetection, malware detection, behavior analysis, machine learning, prototype development | electronic passport, ICAO, LDS, PKI, BAC, EAC, SAC, authorization, authentication, verification, CSCA, CVCA, DVCA, NewP@ss | emergency communications security, long-term evolution (LTE), migration roadmaps, public protection and disaster relief (PPDR), SALUS project, terrestrial trunked radio (TETRA), TETRAPOL technology, Wi-Fi networks, wireless local area networks (WLANs), wireless technologies | encryption algorithm, polymorphism, quantum computations, CNOT and SWAP quantum gates | hybrid intrusion detection system, android-based PPDR terminals, mobile devices, public protection and disaster relief, machine learning techniques, malware signatures | mathematical analysis, receive antennas, predefined authentication signals, wireless communications, mobile MIMO systems, physical-layer entity authentication scheme | network coding, HMAC, data pollution attack, tag pollution attack | network coding, pollution attacks, intrusion detection, location-aware prevention, effi-ciency, 5G | network coding, security, homomorphic message authentication code, data pollution attack, tag pollution attack | personalized healthcare services, context-awareness, user profiles, ubiquitous technology | privacy-preserving, authentication, pseudonym-based signatures, OAuth 2.0, Smart City | privacy-preserving, mobile applications, bilinear pairings | privacy-preserving, signature scheme, pseudonymity, crowdsensing, Smart Cities | random linear network coding (RLNC), homomorphic message authentication code (HMAC), pollution detection, tag pollution | secure XOR network coding, pollution attacks, MAC-based scheme, key management, m-Health, WBANs, remote patient monitoring | secure network coding, homomorphic MAC, random linear network coding, data pollution attacks, tag pollution attacks | smart city security, denial of service attacks, security modeling, queueing theory
Number of items: 40.

5G Communications, C-RAN, Security, Intrusion Attacks, Denial of Service Attacks

Sucasas, Victor, Mantas, Georgios and Rodriguez, Jonathan (2016) Security challenges for cloud radio access networks. In: Huq, Kazi Mohammed Saidul and Rodriguez, Jonathan, (eds.) Backhauling/Fronthauling for Future Wireless Systems. Wiley-Blackwell, pp. 195-209. ISBN 978-1119170341 (doi:https://doi.org/10.1002/9781119170402.ch9)

5G, beyond 5G, decentralized systems, device-to-device communication, key management, mobile small cells, security, small cells, wireless ad hoc networks

De Ree, Marcus ORCID: 0000-0002-7453-4019, Mantas, Georgios, Radwan, Ayman, Mumtaz, Shahid, Rodriguez, Jonathan and Otung, Ifiok E. (2019) Key management for beyond 5G mobile small cells: a survey. IEEE Access, 7. pp. 59200-59236. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2914359)

5G, security, privacy, key management, mobile small cells, network coding, D2D communications

de Ree, Marcus, Mantas, Georgios, Radwan, Ayman, Rodriguez, Jonathan and Otung, Ifiok (2018) Key management for secure network coding-enabled mobile small cells. In: Broadband Communications, Networks, and Systems. 9th International EAI Conference, Broadnets 2018, Faro, Portugal, September 19–20, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering . Springer, pp. 327-336. ISBN 978-3030051945 ISSN 1867-822X (Online) (doi:https://doi.org/10.1007/978-3-030-05195-2_32)

Byzantine attack, cyber-physical systems, eavesdropping attack, entropy attack, network coding security, stateless network coding, state-aware network coding, wireless sensor networks

Esfahani, Alireza, Mantas, Georgios, Yang, Du, Nascimento, Alberto, Rodriguez, Jonathan and Neves, Jose Carlos (2015) Towards secure network coding-enabled wireless sensor networks in cyber-physical systems. In: Rawat, Danda B., Rodrigues, Joel J.P.C. and Stojmenovic, Ivan, (eds.) Cyber-Physical Systems: From Theory to Practice. CRC Press, pp. 395-414. ISBN 978-1482263329

European telecommunications standards institute (ETSI)/parlay architecture, personalized healthcare services, profiling mechanisms, security mechanisms, sensor networks mechanisms

Fengou, Maria-Anna, Mantas, Georgios, Lymberopoulos, Dimitrios, Komninos, Nikos, Fengos, Spyros and Lazarou, Nikolaos (2012) A new framework architecture for next generation e-health services. IEEE Journal of Biomedical and Health Informatics, 17 (1). pp. 9-18. ISSN 2168-2194 (Print), 2168-2208 (Online) (doi:https://doi.org/10.1109/TITB.2012.2224876)

Industrial IoT, M2M Communications, Lightweight authentication, Security, Sensors

Esfahani, Alireza, Mantas, Georgios, Matischek, Rainer, Saghezchi, Firooz B., Rodriguez, Jonathan, Bicaku, Ani, Maksuti, Silia, Tauber, Markus, Schmittner, Christoph and Bastos, Joaquim (2017) A lightweight authentication mechanism for M2M communications in industrial IoT environment. IEEE Internet of Things. pp. 1-8. ISSN 2327-4662 (doi:https://doi.org/10.1109/JIOT.2017.2737630)

Industry 4.0, Cyber-Physical Production Systems, Security, Machine Learning, Network Segregation, IIoT, MTC, Traffic Classification

Saghezchi, Firooz B., Mantas, Georgios, Ribeiro, José, Esfahani, Alireza, Alizadeh, Hassan, Bastos, Joaquim and Rodriguez, Jonathan (2018) Machine Learning to Automate Network Segregation for Enhanced Security in Industry 4.0. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 149-158. ISBN 978-3030051945 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-030-05195-2_15)

Industry 4.0, Semiconductor Supply Chain, Network Secure Com-munications, SSL/TLS, OAuth2

Esfahani, Alireza, Mantas, Georgios, Barcelos, Mariana, Saghezchi, Firooz B., Sucasas, Victor, Bastos, Joaquim and Rodriguez, Jonathan (2018) Security framework for the semiconductor supply chain environment. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 159-168. ISBN 978-303005194-5 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-030-05195-2_16)

Mobile Intrusion Detection System, Android, Security, 5G Communications, Machine Learning, Malware Detection, Host-based IDS

Ribeiro, José, Mantas, Georgios, Saghezchi, Firooz B., Rodriguez, Jonathan, Shepherd, Simon J. and Abd-Alhameed, Raed A. (2018) Towards an autonomous host-based intrusion detection system for android mobile devices. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (263). Springer, Cham, Switzerland, pp. 139-148. ISBN 978-3030-051945 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-030-05195-2_14)

Mobile Small Cells, 5G Communications, Security, Network Coding, D2D Communications

Parsamehr, Reza, Mantas, Georgios, Radwan, Ayman, Rodriguez, Jonathan and Martínez, José-Fernán (2018) Security threats in network coding-enabled mobile small cells. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 337-346. ISBN 978-3030-051945 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-030-05195-2_33)

Mobile communication, Protocols, Browsers, Authentication, Servers, Mobile handsets, Authorization

Sucasas, Victor, Mantas, Georgios, Radwan, Ayman and Rodriguez, Jonathan (2017) A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps. In: 2016 IEEE Globecom Workshops (GC Wkshps). IEEE, pp. 1-6. ISBN 978-1509024834 (doi:https://doi.org/10.1109/GLOCOMW.2016.7848816)

Network coding, Random linear network coding, Tag pollution attacks, Homomorphic MACs

Esfahani, Alireza, Mantas, Georgios and Rodriguez, Jonathan (2016) An efficient null space-based Homomorphic MAC scheme against tag pollution attacks in RLNC. IEEE Communications Letters, 20 (5). pp. 918-921. ISSN 1089-7798 (doi:https://doi.org/10.1109/LCOMM.2016.2547420)

Network coding, Security, Data pollution attack, Tag pollution attack, Wireless networks

Esfahani, Alireza, Mantas, Georgios, Rodriguez, Jonathan and Neves, José Carlos (2016) An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks. International Journal of Information Security, 16 (6). pp. 627-639. ISSN 1615-5262 (Print), 1615-5270 (Online) (doi:https://doi.org/10.1007/s10207-016-0351-z)

Network coding, homomorphic message authentication code, data pollution attack, tag pollution attack

Esfahani, Alireza, Mantas, Georgios, Monteiro, Valdemar, Ramantasy, Kostas, Datsikay, Eftychia and Rodriguez, Jonathan (2016) Analysis of a Homomorphic MAC-based scheme against tag pollution in RLNC-enabled wireless networks. In: 2015 IEEE 20th International Workshop on Computer Aided Modelling and Design of Communication Links and Networks (CAMAD). IEEE, pp. 156-160. ISBN 978-1467381864 (doi:https://doi.org/10.1109/CAMAD.2015.7390500)

PKI, healthcare network, trust list, identity certificates, attribute certificates

Mantas, Georgios, Lymberopoulos, Dimitrios and Komninos, Nikos (2010) PKI security in large-scale healthcare networks. Journal of Medical Systems, 36 (3). pp. 1107-1116. ISSN 0148-5598 (Print), 1573-689X (Online) (doi:https://doi.org/10.1007/s10916-010-9573-1)

Privacy, Authentication, Pseudonyms, Vehicular, Intelligent Transportation Systems

Sucasas, Victor, Mantas, Georgios, Saghezchi, Firooz B., Radwan, Ayman and Rodriguez, Jonathan (2016) An autonomous privacy-preserving authentication scheme for intelligent transportation systems. Computers & Security, 60. pp. 193-205. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2016.04.006)

Security, Protocols, Industries, Safety, Law, Quality of service

Bicaku, Ani, Maksuti, Silia, Palkovits-Rauter, Silke, Tauber, Markus, Matischek, Rainer, Schmittner, Christoph, Mantas, Georgios, Thron, Mario and Delsing, Jerker (2017) Towards trustworthy end-to-end communication in industry 4.0. In: 2017 IEEE 15th International Conference on Industrial Informatics (INDIN). IEEE, pp. 889-896. ISBN 978-1538608388 ISSN 2378-363X (Online) (doi:https://doi.org/10.1109/INDIN.2017.8104889)

Smart Grid, Smart Home, AMI, IoT, M2M, Security, Intrusion Detection, Price Integrity, Load Alteration

Saghezchi, Firooz B., Mantas, Georgios, Ribeiro, José, Al-Rawi, Mohammed, Mumtaz, Shahid and Rodriguez, Jonathan (2017) Towards a secure network architecture for smart grids in 5G era. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC). IEEE, pp. 121-126. ISBN 978-1509043736 ISSN 2376-6506 (Online) (doi:https://doi.org/10.1109/IWCMC.2017.7986273)

Software defined network; Body area networks; Ubiquitous healthcare service delivery

Andriopoulou, Foteini, Birkos, Konstantinos, Mantas, Georgios and Lymberopoulos, Dimitrios (2018) Software-defined networking for ubiquitous healthcare service delivery. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) (263). Springer, Cham, Switzerland, pp. 95-104. ISBN 978-3030051945 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-030-05195-2_10)

TLS, MITM attack, authentication, impersonation, HTTPS, Industry 4.0 Supply Chain

Esfahani, Alireza ORCID: 0000-0002-2100-1569, Mantas, Georgios, Ribeiro, Jose, Bastos, Joaquim, Mumtaz, Shahid, Violas, Manuel A., De Oliveira Duarte, A. Manuel and Rodriguez, Jonathan (2019) An efficient web authentication mechanism preventing man-in-the-middle attacks in industry 4.0 supply chain. IEEE Access, 7. pp. 58981-58989. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2019.2914454)

Ubiquitous healthcare; Cloud computing; Profile management system; Smart card technology

Karavatselou, Evy, Fengou, Maria-Anna, Mantas, Georgios and Lymberopoulos, Dimitrios (2018) Profile Management System in Ubiquitous Healthcare Cloud Computing Environment. In: Broadband Communications, Networks, and Systems. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST) (263). Springer, Cham, Switzerland, pp. 105-114. ISBN 978-3030051945 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-030-05195-2_11)

User Privacy, OAuth 2.0, Smart City, e-Health, Mobile

Sucasas, Victor, Mantas, Georgios, Radwan, Ayman and Rodriguez, Jonathan (2016) An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps. In: 2016 IEEE International Conference on Communications (ICC). IEEE, pp. 1-6. ISBN 978-1-4799-6665-3 ISSN 1938-1883 (Online) (doi:https://doi.org/10.1109/ICC.2016.7511598)

WLAN, authentication, intelligent, protocol, supplicant, authenticator, authentication server

Komninos, N and Mantas, Georgios (2009) Intelligent authentication and key agreement mechanism for WLAN in e-hospital applications. Wireless Networks: Research, Technology and Applications. Nova Science Publishers, pp. 165-180.

android, security and privacy, intrusion detection and prevention system (IDPS), anomalydetection, malware detection, behavior analysis, machine learning, prototype development

Ribeiro, Jose ORCID: 0000-0002-6526-7334, Saghezchi, Firooz B. ORCID: 0000-0002-7429-2144, Mantas, Georgios ORCID: 0000-0002-8074-0417, Rodriguez, Jonathan ORCID: 0000-0001-9829-0955 and Abd-Alhameed, Raed A. ORCID: 0000-0003-2972-9965 (2020) HIDROID: prototyping a behavioral host-based intrusion detection and prevention system for android. IEEE Access, 8. pp. 23154-23168. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2969626)

electronic passport, ICAO, LDS, PKI, BAC, EAC, SAC, authorization, authentication, verification, CSCA, CVCA, DVCA, NewP@ss

Bastos, Joaquim, Mantas, Georgios, Ribeiro, José C. and Rodriguez, Jonathan (2015) Towards an advanced PKI-based security solution for next generation e-passport and associated applications: the NewP@ss approach. In: Wireless Internet: 8th International Conference, WICON 2014, Lisbon, Portugal, November 13-14, 2014, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 146 . Springer, pp. 105-112. ISBN 978-3319188010 ISSN 1867-8211 (Print), 1867-822X (Online) (doi:https://doi.org/10.1007/978-3-319-18802-7_15)

emergency communications security, long-term evolution (LTE), migration roadmaps, public protection and disaster relief (PPDR), SALUS project, terrestrial trunked radio (TETRA), TETRAPOL technology, Wi-Fi networks, wireless local area networks (WLANs), wireless technologies

Marques, Hugo, Pereira, Luís, Rodriguez, Jonathan, Mantas, Georgios, Sousa, Bruno, Fonseca, Hugo, Cordeiro, Luís, Palma, David, Barbatsalou, Konstantia, Simões, Paulo, Monteiro, Edmundo, Nyanyo, Andy, Wickson, Peter, Bouwers, Bert, Kolundzija, Branko, Olcan, Dragan, Zerbib, Daniel, Brouet, Jérôme, Lasserre, Philippe, Galiotos, Panagiotis, Chrysikos, Theofilos, Jelenc, David, Kos, Jernej, Trček, Denis, Ladas, Alexandros, Weerasinghe, Nuwan, Adigun, Olayinka, Politis, Christos and Müller, Wilmuth (2016) Next-generation communication systems for PPDR: the SALUS perspective. In: Camara, Daniel and Nikaein, Navid, (eds.) Wireless Public Safety Networks 1. Elsevier, pp. 49-93. ISBN 978-1785480225 (doi:https://doi.org/10.1016/B978-1-78548-022-5.50003-0)

encryption algorithm, polymorphism, quantum computations, CNOT and SWAP quantum gates

Komninos, Nikos and Mantas, Georgios (2011) PEA: polymorphic encryption algorithm based on quantum computation. International Journal of Systems, Control and Communications, 3 (1). pp. 1-18. ISSN 1755-9340 (Print), 1755-9359 (Online) (doi:https://doi.org/10.1504/IJSCC.2011.039222)

hybrid intrusion detection system, android-based PPDR terminals, mobile devices, public protection and disaster relief, machine learning techniques, malware signatures

Borges, Pedro, Sousa, Bruno, Ferreira, Luis, Saghezchi, Firooz B., Mantas, Georgios, Ribeiro, Jose, Rodriguez, Jonathan, Cordeiro, Luis and Simoes, Paulo (2017) Towards a hybrid intrusion detection system for android-based PPDR terminals. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, pp. 1034-1039. ISBN 978-1509056583 (doi:https://doi.org/10.23919/INM.2017.7987434)

mathematical analysis, receive antennas, predefined authentication signals, wireless communications, mobile MIMO systems, physical-layer entity authentication scheme

Althunibat, Saud, Sucasas, Victor, Mantas, Georgios and Rodriguez, Jonathan (2018) Physical-layer entity authentication scheme for mobile MIMO systems. IET Communications, 12 (6). pp. 712-718. ISSN 1751-8628 (Print), 1751-8636 (Online) (doi:https://doi.org/10.1049/iet-com.2017.0518)

network coding, HMAC, data pollution attack, tag pollution attack

Esfahani, Alireza, Yang, Du, Mantas, Georgios, Nascimento, Alberto and Rodriguez, Jonathan (2015) An improved homomorphic message authentication code scheme for RLNC-enabled wireless networks. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, pp. 80-84. ISBN 978-1479957255 ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:https://doi.org/10.1109/CAMAD.2014.7033210)

network coding, pollution attacks, intrusion detection, location-aware prevention, effi-ciency, 5G

Parsamehr, Reza ORCID: 0000-0002-3461-433X, Mantas, Georgios ORCID: 0000-0002-8074-0417, Rodriguez, Jonathan ORCID: 0000-0001-9829-0955 and Martinez-Ortega, Jose-Fernan (2020) IDLP: an efficient intrusion detection and location-aware prevention mechanism for network coding-enabled mobile small cells. IEEE Access, 8. pp. 43863-43875. ISSN 2169-3536 (Online) (doi:https://doi.org/10.1109/ACCESS.2020.2977428)

network coding, security, homomorphic message authentication code, data pollution attack, tag pollution attack

Esfahani, Alireza, Mantas, Georgios, Rodriguez, Jonathan, Nascimento, Alberto and Neves, Jose Carlos (2015) A null space-based MAC scheme against pollution attacks to random linear network coding. In: 2015 IEEE International Conference on Communication Workshop (ICCW). IEEE, pp. 1521-1526. ISBN 978-1467363051 ISSN 2164-7038 (doi:https://doi.org/10.1109/ICCW.2015.7247395)

personalized healthcare services, context-awareness, user profiles, ubiquitous technology

Fengou, Maria-Anna, Athanasiou, Georgia, Mantas, Georgios, Griva, Ismini and Lymberopoulos, Dimitrios (2013) Towards personalized services in the healthcare domain. In: Furht, Borko and Agarwal, Ankur, (eds.) Handbook of Medical and Healthcare Technologies. Springer, New York, USA, pp. 417-433. ISBN 978-1461484943 (doi:https://doi.org/10.1007/978-1-4614-8495-0_19)

privacy-preserving, authentication, pseudonym-based signatures, OAuth 2.0, Smart City

Sucasas, Victor, Mantas, Georgios, Althunibat, Saud, Oliveira, Leonardo, Antonopoulos, Angelos, Otung, Ifiok and Rodriguez, Jonathan (2018) A privacy-enhanced OAuth 2.0 based protocol for smart city mobile applications. Computers & Security, 74. pp. 258-274. ISSN 0167-4048 (doi:https://doi.org/10.1016/j.cose.2018.01.014)

privacy-preserving, mobile applications, bilinear pairings

Oliveira, Leonardo ORCID: 0000-0002-6940-6223, Sucasas, Victor, Mantas, Georgios and Rodriguez, Jonathan (2018) Implementation of a pseudonym-based signature scheme with bilinear pairings on Android. In: Cognitive Radio Oriented Wireless Networks: 12th International Conference, CROWNCOM 2017, Lisbon, Portugal, September 20-21, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 228 . Springer, pp. 75-87. ISBN 978-3319762067 ISSN 1867-8211 (doi:https://doi.org/10.1007/978-3-319-76207-4_7)

privacy-preserving, signature scheme, pseudonymity, crowdsensing, Smart Cities

Sucasas, Victor, Mantas, Georgios, Bastos, Joaquim, Damiao, Francisco and Rodriguez, Jonathan (2019) A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing. IEEE Transactions on Mobile Computing, 18. p. 1. ISSN 1536-1233 (doi:https://doi.org/10.1109/TMC.2019.2901463)

random linear network coding (RLNC), homomorphic message authentication code (HMAC), pollution detection, tag pollution

Yang, Du, Esfahani, Alireza, Mantas, Georgios and Rodriguez, Jonathan (2015) Jointly padding for subspace orthogonality against tag pollution. In: 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD). IEEE, pp. 85-89. ISSN 2378-4865 (Print), 2378-4873 (Online) (doi:https://doi.org/10.1109/CAMAD.2014.7033211)

secure XOR network coding, pollution attacks, MAC-based scheme, key management, m-Health, WBANs, remote patient monitoring

Esfahani, Alireza, Mantas, Georgios, Silva, Helio, Rodriguez, Jonathan and Neves, Jose Carlos (2016) An efficient MAC-based scheme against pollution attacks in XOR network coding-enabled WBANs for remote patient monitoring systems. EURASIP Journal on Wireless Communications and Networking, 2016 (113). pp. 1-10. ISSN 1687-1472 (Print), 1687-1499 (Online) (doi:https://doi.org/10.1186/s13638-016-0601-9)

secure network coding, homomorphic MAC, random linear network coding, data pollution attacks, tag pollution attacks

Esfahani, Alireza, Yang, Du, Mantas, Georgios, Nascimento, Alberto and Rodriguez, Jonathan (2015) Dual-homomorphic message authentication code scheme for network coding-enabled wireless sensor networks. International Journal of Distributed Sensor Networks, 11 (7):510251. ISSN 1550-1329 (Print), 1550-1477 (Online) (doi:https://doi.org/10.1155/2015/510251)

smart city security, denial of service attacks, security modeling, queueing theory

Logota, Evariste, Mantas, Georgios, Rodriguez, Jonathan and Marques, Hugo (2015) Analysis of the impact of denial of service attacks on centralized control in smart cities. In: Wireless Internet: 8th International Conference, WICON 2014, Lisbon, Portugal, November 13-14, 2014, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 146 . Springer, pp. 91-96. ISBN 978-3319188010 ISSN 1867-8211 (Print), 1867-822X (Online) (doi:https://doi.org/10.1007/978-3-319-18802-7_13)

This list was generated on Tue Sep 22 03:50:51 2020 UTC.