Publications

(2021). The ethical implications of using digital traces: studying explainability and trust during a pandemic. Qualitative and Digital Research in Times of Crisis: Methods, Reflexivity, and Ethics.

Cite

(2020). Thinking about Trust: People, Process, and Place. Elsevier Cell Patterns.

Cite DOI

(2020). Verification of Process Suitability for creating Trust in Supply Chains. Symposium on Cryptography and Information Security.

Cite

(2020). Post-quantum zk-SNARKs for Arithmetic Circuit. Symposium on Cryptography and Information Security.

Cite

(2020). Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Transactions on Engineering Management.

Cite

(2019). Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Generation Computer Systems.

Cite DOI

(2019). Empowering People with Informed Consent. 4th International Conference on Data for Policy.

Cite

(2019). A framework for blockchain-based verification of integrity and authenticity. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2018). The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. International Conference on Privacy, Security and Trust (PST).

Cite

(2018). PPM: Privacy Policy Manager for Home Energy Management. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA).

Cite

(2018). On Consensus Protocols in Parallel-Blockchain Environment. 13th International Conference for Internet Technology and Secured Transactions (ICITST).

Cite

(2018). In-Device Proxy Re-encryption Service for Information-Centric Networking Access Control. IEEE Conference on Local Computer Networks (LCN).

Cite

(2018). BlockStore: A Secure Decentralized Storage Framework on Blockchain. International Conference on Advanced Information Networking and Applications (AINA).

Cite

(2017). On blockchain-based authorization architecture for beyond-5G mobile services. 12th International Conference for Internet Technology and Secured Transactions (ICITST).

Cite DOI

(2017). VIGraph -- A Framework for Verifiable Information. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2017). Towards Outsourced Privacy-Preserving Multiparty DBSCAN. 22nd Pacific Rim International Symposium on Dependable Computing (PRDC).

Cite

(2017). Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. International Workshop on Security (IWSEC).

Cite

(2017). Privacy-friendly secure bidding for smart grid demand-response. Information Sciences.

Cite DOI

(2017). On blockchain-based anonymized dataset distribution platform. 15th International Conference on Software Engineering Research, Management and Applications (SERA).

Cite

(2017). MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data. International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage.

Cite

(2017). IPRES: in-device proxy re-encryption service for secure ICN. Proceedings of the 4th ACM Conference on Information-Centric Networking (ICN).

Cite

(2017). Hypercubes and private information retrieval. Proceedings of the 19th International Conference on Information and Communications Security (ICICS).

Cite

(2017). Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction. Journal of Internet Services and Information Security (JISIS).

Cite

(2017). Broker-mediated Trade Finance with Blockchains. Poster at the 21st International Conference on Financial Cryptography and Data Security (FC).

Cite

(2017). Accountability and integrity for data management using blockchains. Poster at the 21st International Conference on Financial Cryptography and Data Security (FC).

Cite

(2016). User-in-a-context: A blueprint for context-aware identification. Proceedings of the Privacy, Security and Trust (PST).

Cite

(2016). Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy. Proceedings of the International Joint Conference on e-Business and Telecommunications (SECRYPT).

Cite DOI

(2016). PrefRank: Quantification and Aggregation of Subjective User Preferences. Proceedings of the Trustcom/BigDataSE/ISPA.

Cite

(2016). Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. Proceedings of the Trustcom/BigDataSE/ISPA.

Cite

(2016). A Model for Personalised Perception of Policies. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2015). Secure and Private Bidding Protocol for Incentive-Based Demand-Response System of Smart Grid. Proceedings of the International Symposium on Stabilization, Safety, and Security of Distributed Systems: SSS.

Cite

(2015). Privacy-friendly secure bidding scheme for demand response in smart grid. Proceedings of the IEEE First International Smart Cities Conference (ISC2).

Cite

(2015). Practical Private One-way Anonymous Message Routing. Proceedings of the ACM AsiaCCS.

Cite

(2015). Lightweight practical private one-way anonymous messaging. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2015). k-anonymity: Risks and the Reality. Proceedings of the IEEE Trustcom/BigDataSE/ISPA.

Cite

(2015). A risk model for privacy in trajectory data. Journal of Trust Management.

Cite DOI

(2014). Opinions of People: Factoring in Privacy and Trust. ACM SIGAPP Applied Computing Review.

Cite

(2014). XOR Network Coding Pollution Prevention Without Homomorphic Functions. Proceedings of the IEEE Consumer Communications and Networking Conference.

Cite

(2014). Privacy preserving trusted social feedback. Proceedings of the ACM Symposium on Applied Computing (SAC) TRECK track.

Cite

(2014). PrefRank: fair aggregation of subjective user preferences. Poster in the ACM Symposium on Applied Computing (SAC) RS track.

Cite

(2014). Key extraction attack using statical analysis of memory dump data. Proceedings of the International Conference on Risks and Security of Internet and Systems (CRiSIS).

Cite

(2014). From Ratings to Trust: an Empirical Study of Implicit Trust in Recommender Systems. Proceedings of the ACM Symposium on Applied Computing (SAC) RS track.

Cite

(2014). Foreground Trust as a Security Paradigm: Turning Users into Strong Links. Information Security in Diverse Computing Environments.

Cite

(2014). Efficient Integrity Verification for Outsourced Collaborative Filtering. Proceedings of the IEEE International Conference on Data Mining (ICDM).

Cite

(2014). Data storage on the cloud under user control. Poster in the IEEE Cloudcom.

Cite

(2014). CF-inspired privacy-preserving prediction of next location in the cloud. Poster in the IEEE Cloudcom.

Cite

(2014). Beyond Proofs of Data Possession: Finding Defective Blocks in Outsourced Storage. Proceedings of IEEE Global Communications Conference (Globecom).

Cite

(2014). A privacy risk model for trajectory data. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2014). A Multiple-Server Efficient Reusable Proof of Data Possession from Private Information Retrieval Techniques. Proceedings of the International conference on Security and Cryptography (SECRYPT).

Cite

(2013). The state of peer-to-peer network simulators. ACM Computing Surveys.

Cite DOI

(2013). Security Enhancement with Foreground Trust, Comfort, and Ten Commandments for Real People. Theories and Intricacies of Information Security Problems.

Cite

(2013). Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.

Cite

(2013). Reflections on Measuring the Trust Empowerment Potential of a Digital Environment. Proceedings of the IFIP WG11.11 International Conference on Trust Management (IFIPTM).

Cite

(2013). Privacy-preserving collaborative filtering on the cloud -- practical implementation experiences. Proceedings of the IEEE Cloud.

Cite

(2013). Differentially Private Na ̈ive Bayes Classification. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence.

Cite

(2013). Decodability Attacks in XOR Network Coding. Proceedings of the IEICE Society Conference.

Cite

(2012). Rendering unto Cæ sar the Things that are Cæ sar's: Complex Trust Models and Human Understanding. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2012). Privacy preserving collaborative filtering for SaaS enabling PaaS clouds. Journal of Cloud Computing: Advances, Systems and Applications.

Cite DOI

(2012). Perturbation based privacy preserving Slope One predictors for collaborative filtering. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2012). Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine -- a performance case-study. Proceedings of the ACM Symposium on Applied Computing (SAC) Cloud Computing track.

Cite

(2012). A concordance framework for building trust evidences. Proceedings of the Annual Conference on Privacy, Security and Trust (PST).

Cite

(2011). Frontiers in Trust Management. Journal of Internet Services and Information Security (JISIS).

Cite

(2011). Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets. Proceedings of the International Information Security Conference (IFIPSEC).

Cite URL

(2011). Privacy-preserving weighted Slope One predictor for Item-based Collaborative Filtering. Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011).

PDF Cite

(2011). Privacy-Preserving Item Recommendation System in Cloud Computing. Poster in the International Workshop on Security (IWSEC).

Cite

(2011). Privacy-preserving collaborative filtering for the cloud. Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (Cloudcom).

Cite

(2011). Practical privacy preserving collaborative filtering on the Google App Engine. Proceedings of the Computer Security Symposium (CSS).

Cite

(2011). Efficient privacy-preserving collaborative filtering based on the weighted Slope One predictor. Journal of Internet Services and Information Security.

Cite

(2011). Deploying Pervasive Advertising in a Farmers' Market. Springer HCI Series.

Cite URL

(2010). Deploying Ubiquitous Computing Applications in a Farmers' Market. Proceedings of Pervasive Advertising and Shopping 2010i (workshop at Pervasive 2010).

Cite URL

(2010). Chutney and Relish: Designing to Augment the Experience of Shopping at a Farmers' Market. Proceedings of OzCHI, QUT.

Cite URL

(2010). Can We Use Trust in Online Dating?. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications.

Cite URL

(2010). Can We Use Trust in Online Dating?. Proceedings of the International Workshop on Trusted Communications in Decentralised Computing (workshop in IFIPTM 2010).

Cite

(2010). Bringing the Virtual to the Farmers' Market: Designing for Trust in Pervasive Computing Systems. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite

(2010). A Framework for Developing and Sharing Client Reputations. Proceedings of the IFIP WG 11.11 International Conference on Trust Management (IFIPTM).

Cite URL

(2008). The North Laine shopping guide: A case study in modelling trust in applications. Proceedings of Joint iTrust and PST Conference on Privacy, Trust Management and Security (IFIPTM).

Cite URL

(2008). A Behavioural Model for Client Reputation. Proceedings of Trust in Mobile Environments (workshop in IFIPTM 2008).

Cite URL

(2007). The state of peer-to-peer simulators and simulations. ACM SIGCOMM Computer Communication Review.

Cite URL

(2007). A Behavioural Model for Consumer Reputation. Poster in the International Workshop on Self-Organizing Systems.

Cite URL

(2006). Towards Yet Another Peer-to-Peer Simulator. Proceedings of the International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET-NETs).

Cite URL

(2006). A Survey of Peer-to-Peer Network Simulators. Proceedings of the Annual Postgraduate Symposium (PGNet).

Cite URL

(2005). Exploring and Interacting with Virtual Museums. Proceedings of Computer Applications and Quantitative Methods in Archaeology.

Cite URL

(2004). Web3D and augmented reality to support engineering education. World Transactions on Engineering and Technology Education.

Cite URL

(2004). Using XML Technologies to Present Digital Content with Augmented Reality. Proceedings of the Eurographics Ireland Chapter Workshop.

Cite URL

(2004). ARCOLite -- an XML based system for building and presenting Virtual Museums using Web3D and Augmented Reality. Proceedings of Theory and Practice of Computer Graphics (TPCG).

Cite DOI URL

(2004). An Interactive Visualisation Interface for Virtual Museums. Proceedings of the International Symposium on Virtual Reality, Archaeology and Cultural Heritage, Eurographics Association.

Cite URL

(2004). A lightweight XML driven architecture for the presentation of virtual cultural exhibitions (ARCOLite). Proceedings of IADIS International Conference of Applied Computing.

Cite URL