- UHRA Home
- Browsing by Author
Browsing by Author "Xiao, Hannan"
Now showing items 21-40 of 58
-
Energy Consumption in Mobile Ad Hoc Networks
Xiao, Hannan; Ibrahim, Dashti; Christianson, B. (IEEE, 2014-04)Mobile Ad hoc Networks (MANETs) are composed of moving mobile nodes that are battery operated. This paper proposes a set of performance metrics in evaluating energy efficiency in MANETs, and studies the energy consumption ... -
Evaluating Security and Usability of Profile Based Challenge Questions Authentication in Online Examinations
Ullah, Abrar; Xiao, Hannan; Barker, Trevor; Lilley, Mariana (2014-03-04)Student authentication in online learning environments is an increasingly challenging issue due to the inherent absence of physical interaction with online users and potential security threats to online examinations. This ... -
An evaluation of break-the-glass access control model for medical data in wireless sensor networks
Maw, Htoo Aung; Xiao, Hannan; Christianson, B.; Malcolm, James (IEEE, 2015-01)Wireless Sensor Networks (WSNs) have recently attracted a lot of attention in the research community because it is easy to deploy them in the physical environment and collect and disseminate environmental data from them. ... -
Evaluation of Underlying Switching Mechanism for Future Networks with P4 and SDN (Workshop Paper)
Fernando, Omesh; Xiao, Hannan; Che, Xianhui (Springer, 2019-08-18)Software Defined Networking (SDN) was introduced with a philosophy of decoupling the control plane from the data plane which facilitates network management while ensuring programmability in order to improve performance and ... -
Extending Trust in Peer-to-Peer Networks
Clarke, S.; Christianson, B.; Xiao, Hannan (2010)This paper presents a way of reducing the risk involved with downloading corrupt content from unknown (and hence untrusted) principals in a P2P network. This paper gives a brief overview of the need for trust in P2P networks, ... -
File Message Circling Queue: : Communication between UNIX and Windows
Xiao, Hannan; Liu, Qi Wen; Shi, Bin Xin (1995) -
A Flexible quality of service model for mobile Ad-hoc networks
Xiao, Hannan; Seah, Winston K.G.; Lo, Anthony; Chua, Kee Chaing (IEEE, 2000)Quality of service (QoS) support in Mobile Ad-hoc NETworks (MANETs) is a challenging task. Most of the proposals in the literature only address certain aspects of the QoS support, e.g., QoS routing, QoS medium access control ... -
Graphical and text based challenge questions for secure and usable authentication in online examinations
Ullah, A.; Xiao, Hannan; Barker, T.; Lilley, M. (IEEE, 2014-12)In traditional online examination environments, physical interaction is often replaced with authentication mechanisms. The absence of face-to-face interaction increases the number of authentication challenges. The authors ... -
Hierarchical Trustworthy Authentication for Pervasive Computing
Xiao, Hannan; Malcolm, J.; Christianson, B. (IEEE, 2007) -
Improving the usability of a virtual assembly environment with the integration of multi-sensory feedback
Zhang, Y.; Travis, A.; Fernando, T.; Xiao, Hannan (IEEE, 2006)Virtual assembly environment (VAE) technology has the great potential for benefiting the manufacturing applications in industry. Usability is an important aspect of VAE. This paper presents the evaluation of the usability ... -
Intrusion Detection System using Bayesian Network Modeling
Alocious, Chaminda; Abouzakhar, Nasser; Xiao, Hannan; Christianson, B. (ACPI (Academic Conference Publishing International), 2014-07)Computer Network Security has become a critical and important issue due to ever increasing cyber-crimes. Cybercrimes are spanning from simple piracy crimes to information theft in international terrorism. Defence security ... -
A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance
Alocious, Chaminda; Xiao, Hannan; Christianson, B. (University of York, 2013)The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention ... -
Modelling and Analysis of TCP Performance in Wireless Multihop Networks
Xiao, Hannan; Zhang, Ying; Malcolm, James; Christianson, B.; Chua, Kee Chaing (2010-07)Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this ... -
Multimodal security enforcement framework for wireless ad hoc networks
Yan, L.; Abouzakhar, N.; Xiao, Hannan (ACM Press, 2009)Securing wireless ad hoc networks in an untrustworthy open environment is always a challenging problem. Lack of central auditing on security and weak incentive for cooperation among nodes in an open network scenario demand ... -
On Service Differentiation in Multihop Wireless Networks
Xiao, Hannan; Seah, Winston; Lo, Anthony; Chua, Kee Chaing (2000) -
On Service Prioritization in Mobile Ad-hoc Networks
Xiao, Hannan; Chua, Kee Chaing; Seah, Winston; Lo, Anthony (IEEE, 2001)The aim of service prioritization is to give resource priority to certain traffic types. For example, the voice service can have higher priority than the data service, Web surfing can have higher priority than FTP and ... -
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack
Bo, S.M.; Xiao, Hannan; Adereti, A.; Malcolm, J.; Christianson, B. (IEEE, 2007) -
Privacy and Usability of Image and Text Based Challenge Questions Authentication in Online Examination
Ullah, Abrar; Xiao, Hannan; Lilley, Mariana; Barker, Trevor (IEEE COMPUTER SOC, 2014-09)In many online examinations, physical invigilation is often replaced with traditional authentication approaches for student identification. Secure and usable authentication approaches are important for high stake online ... -
Profile Based Student Authentication in Online Examination
Ullah, Abrar; Xiao, Hannan; Lilley, Mariana (IEEE, 2012-06)Online examination is an increasingly important component of online courses, and student authentication is widely seen as one of the major concerns for online examinations. In the online examination scenario, face-to-face ... -
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment
Xiao, Hannan; Christianson, B.; Zhang, Y. (IEEE, 2008)