generated by bibbase.org
  2026 (2)
Toward data trustworthiness in digital agriculture: taxonomy and building blocks. Baee, M. A. R.; Simpson, L.; Kane, L. E.; Liu, V.; Islam, C.; Jiang, Y.; Chauhan, A.; Armstrong, W.; and Gauravaram, P. EURASIP J. Wirel. Commun. Netw., 2026(1): 19. 2026.
Toward data trustworthiness in digital agriculture: taxonomy and building blocks [link]Paper   doi   link   bibtex  
A Framework for Authentication of Internet Connected Critical Infrastructure. de Jong, D. A.; Simpson, L.; Baee, M. A. R.; and Jadidi, Z. In Xiang, Y.; Sohrabi, N.; Xue, J.; and Kim, D. D., editor(s), Proceedings of the 2026 Australasian Information Security Conference, AISC 2026, Melbourne, VIC, Australia, February 11-12, 2026, pages 20–29, 2026. ACM
A Framework for Authentication of Internet Connected Critical Infrastructure [link]Paper   doi   link   bibtex  
  2024 (5)
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies. Hasan, K. F.; Simpson, L.; Baee, M. A. R.; Islam, C.; Rahman, Z.; Armstrong, W.; Gauravaram, P.; and McKague, M. IEEE Access, 12: 23427–23450. 2024.
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies [link]Paper   doi   link   bibtex  
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Jiang, Y.; Baee, M. A. R.; Simpson, L. R.; Gauravaram, P.; Pieprzyk, J.; Zia, T. A.; Zhao, Z.; and Le, Z. Cryptogr., 8(1): 5. 2024.
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures [link]Paper   doi   link   bibtex  
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata. Baee, M. A. R.; Simpson, L.; and Armstrong, W. IEEE Open J. Comput. Soc., 5: 156–169. 2024.
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata [link]Paper   doi   link   bibtex  
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework. Baee, M. A. R.; Simpson, L.; and Armstrong, W. IEEE Open J. Comput. Soc., 5: 315–328. 2024.
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework [link]Paper   doi   link   bibtex  
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Dependable Secur. Comput., 21(4): 4066–4083. 2024.
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles [link]Paper   doi   link   bibtex  
  2023 (3)
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Dependable Secur. Comput., 20(3): 1799–1817. 2023.
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption [link]Paper   doi   link   bibtex   1 download  
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings. Simpson, L.; and Baee, M. A. R., editors. Volume 13915, of Lecture Notes in Computer Science.Springer. 2023.
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings [link]Paper   doi   link   bibtex  
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis. Hasan, K. F.; Simpson, L.; Baee, M. A. R.; Islam, C.; Rahman, Z.; Armstrong, W.; Gauravaram, P.; and McKague, M. CoRR, abs/2307.06520. 2023.
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis [link]Paper   doi   link   bibtex  
  2021 (3)
Authentication strategies in vehicular communications: a taxonomy and framework. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. EURASIP J. Wirel. Commun. Netw., 2021(1): 129. 2021.
Authentication strategies in vehicular communications: a taxonomy and framework [link]Paper   doi   link   bibtex  
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Inf. Forensics Secur., 16: 3678–3693. 2021.
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! [link]Paper   doi   link   bibtex   1 download  
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Veh. Technol., 70(9): 9306–9319. 2021.
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications [link]Paper   doi   link   bibtex   1 download  
  2020 (1)
Continuous authentication for VANET. Palaniswamy, B.; Camtepe, S.; Foo, E.; Simpson, L.; Baee, M. A. R.; and Pieprzyk, J. Veh. Commun., 25: 100255. 2020.
Continuous authentication for VANET [link]Paper   doi   link   bibtex  
  2019 (1)
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. Baee, M. A. R.; Simpson, L.; Foo, E.; and Pieprzyk, J. IEEE Trans. Veh. Technol., 68(12): 11577–11587. 2019.
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 [link]Paper   doi   link   bibtex   1 download  
  2015 (2)
Trust management in vehicular ad hoc network: a systematic review. Soleymani, S. A.; Abdullah, A. H.; Hassan, W. H.; Anisi, M. H.; Goudarzi, S.; Baee, M. A. R.; and Mandala, S. EURASIP J. Wirel. Commun. Netw., 2015: 146. 2015.
Trust management in vehicular ad hoc network: a systematic review [link]Paper   doi   link   bibtex   1 download  
The Model of Customer Trust for Internet Banking Adoption. Goudarzi, S.; Hassan, W. H.; Baee, M. A. R.; and Soleymani, S. A. In Borowik, G.; Chaczko, Z.; Jacak, W.; and Luba, T., editor(s), Computational Intelligence and Efficiency in Engineering Systems, of Studies in Computational Intelligence, pages 399–414. Springer, 2015.
The Model of Customer Trust for Internet Banking Adoption [link]Paper   doi   link   bibtex   1 download