- UHRA Home
- Browsing by Author
Browsing by Author "Xiao, Hannan"
Now showing items 41-60 of 65
-
Privacy and Usability of Image and Text Based Challenge Questions Authentication in Online Examination
Ullah, Abrar; Xiao, Hannan; Lilley, Mariana; Barker, Trevor (Institute of Electrical and Electronics Engineers (IEEE), 2014-09)In many online examinations, physical invigilation is often replaced with traditional authentication approaches for student identification. Secure and usable authentication approaches are important for high stake online ... -
Profile Based Student Authentication in Online Examination
Ullah, Abrar; Xiao, Hannan; Lilley, Mariana (Institute of Electrical and Electronics Engineers (IEEE), 2012-06)Online examination is an increasingly important component of online courses, and student authentication is widely seen as one of the major concerns for online examinations. In the online examination scenario, face-to-face ... -
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment
Xiao, Hannan; Christianson, B.; Zhang, Y. (Institute of Electrical and Electronics Engineers (IEEE), 2008) -
A Purchase Protocol with Multichannel Authentication
Xiao, Hannan; Christianson, B.; Zhang, Ying (2009)While online shopping are becoming more accepted by people in modern life, cardholders are more concerned about card fraud and the lack of cardholder authentication in the current online credit card payment. This paper ... -
Quality of service models for ad hoc wireless networks
Xiao, Hannan; Chua, Kee Chaing; Seah, Winston (CRC Press, 2002-12) -
A Quantitative Analysis of TCP performance over Wireless Multihop Networks
Xiao, Hannan; Chua, Kee Chaing; Seah, Winston; Lo, Anthony (Institute of Electrical and Electronics Engineers (IEEE), 2001)An analytical model of a single TCP session based on a string topology in wireless multihop networks is presented. The model for the communication process also considers buffering, propagation delay and channel access ... -
Quantum Based Networks : Analysis of Quantum Teleportation Protocol and Entanglement Swapping
Kandwal, Preeti; Spring, William; Xiao, Hannan (Springer Nature, 2019-08-18)In this paper we consider the quantum teleportation and entanglement swapping protocols used in quantum based networks for passing information between a sender and receiver. For the teleportation protocol we observe and ... -
Relative service differentiation for mobile ad hoc networks
Chua, K.C.; Xiao, Hannan; Seah, K.G. (2003)A relative bandwidth service differentiation scheme is proposed for mobile ad-hoc networks (MANETs). -
A Resilient MAC Protocol for Wireless Networks
Abegunde, Jacob; Xiao, Hannan; Spring, William (2014-12) -
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks
Alocious, Chaminda; Xiao, Hannan; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2016-04)Wireless network security requirements are becoming more important and critical. The modern network security architectures require more attention to provide security in each network layer. This will require understanding ... -
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks
Chiejina, Eric; Xiao, Hannan; Christianson, Bruce; Mylonas, Alexios; Chiejina, Chidinma (2022-01-12)The distributed nature of mobile ad hoc networks (MANETs) presents security challenges and vulnerabilities which sometimes lead to several forms of attacks. To improve the security in MANETs, reputation and trust management ... -
SEVA: A Smart Electronic Voting Application Using Blockchain Technology
Abegunde, Jacob; Xiao, Hannan; Spring, William Joseph (2021-12-08)The development of electronic voting applications remains an active area of research and this has led to the proposal and implementation of many models based on blockchains. However, most of the proposed models are partially ... -
A Smart Game for Data Transmission and Energy Consumption in the Internet of Things
Abegunde, Jacob; Xiao, Hannan; Spring, William (2020-01-12)The current trend in developing smart technology for the Internet of Things (IoT) has motivated a lot of research interest in optimizing data transmission or minimizing energy consumption, but with little evidence of ... -
Snoop behaviour in multihop wireless networks
Nambiar, P.; Xiao, Hannan; Malcolm, J. (ACM Press, 2010)Snoop is one proposal for improving TCP throughput in wireless networks. We investigated the application of this protocol in wireless ad hoc networks and observed that a single hop in the ad hoc network experienced large ... -
A Study into the Usability and Security Implications of Text and Image Based Challenge Questions in the Context of Online Examination
Ullah, Abrar; Xiao, Hannan; Barker, Trevor (2019-01-15)Online examinations are an integral component of online learning environments and research studies have identified academic dishonesty as a critical threat to the credibility of such examinations. Academic dishonesty exists ... -
A Survey of Access Control Models in Wireless Sensor Networks
Maw, Htoo Aung; Xiao, Hannan; Christianson, B.; Malcolm, James (2014-06-20)Wireless sensor networks (WSNs) have attracted considerable interest in the research community, because of their wide range of applications. However, due to the distributed nature of WSNs and their deployment in remote ... -
Synchronizing DDoS Defense at Network Edge with P4, SDN, and Blockchain
Febro, Aldo; Xiao, Hannan; Spring, William Joseph; Christianson, Bruce (2022-10-24)Botnet-originated DDoS attacks continue to plague the internet and disrupt services for legitimate users. While various proposals have been presented in the last two decades, the botnet still has advantages over the ... -
Telephony Denial of Service Defense at Data Plane (TDoSD@DP)
Febro, Aldo; Xiao, Hannan; Spring, William (Institute of Electrical and Electronics Engineers (IEEE), 2018-07-06)The Session Initiation Protocol (SIP) is an application-layer control protocol used to establish and terminate calls that are deployed globally. A flood of SIP INVITE packets sent by an attacker causes a Telephony Denial ... -
Theoretical analysis of TCP throughput in adhoc wireless networks
Xiao, Hannan; Chua, K.C.; Malcolm, J.; Zhang, Y. (Institute of Electrical and Electronics Engineers (IEEE), 2005)Researchers have used extensive simulation and experimental studies to understand TCP performance in adhoc wireless networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this ... -
Threat Analysis of Software Agents in Online Banking and Payments
Ngalo, Tamsanqa; Xiao, Hannan; Christianson, Bruce; Zhang, Ying (Institute of Electrical and Electronics Engineers (IEEE), 2018-10-28)Software agents are the delegated subcontractors essential to connect the end-user to the bank and payment providers in a distributed service offering. This paper evaluates the key role that the different software agent ...