generated by bibbase.org
  2024 (5)
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies. Hasan, K. F.; Simpson, L.; Baee, M. A. R.; Islam, C.; Rahman, Z.; Armstrong, W.; Gauravaram, P.; and McKague, M. IEEE Access, 12: 23427–23450. 2024.
A Framework for Migrating to Post-Quantum Cryptography: Security Dependency Analysis and Case Studies [link]Paper   doi   link   bibtex  
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Jiang, Y.; Baee, M. A. R.; Simpson, L. R.; Gauravaram, P.; Pieprzyk, J.; Zia, T. A.; Zhao, Z.; and Le, Z. Cryptogr., 8(1): 5. 2024.
Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures [link]Paper   doi   link   bibtex  
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata. Baee, M. A. R.; Simpson, L.; and Armstrong, W. IEEE Open J. Comput. Soc., 5: 156–169. 2024.
Anomaly Detection in the Key-Management Interoperability Protocol Using Metadata [link]Paper   doi   link   bibtex  
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework. Baee, M. A. R.; Simpson, L.; and Armstrong, W. IEEE Open J. Comput. Soc., 5: 315–328. 2024.
Anomaly Detection in Key-Management Activities Using Metadata: A Case Study and Framework [link]Paper   doi   link   bibtex  
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Dependable Secur. Comput., 21(4): 4066–4083. 2024.
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles [link]Paper   doi   link   bibtex  
  2023 (3)
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Dependable Secur. Comput., 20(3): 1799–1817. 2023.
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption [link]Paper   doi   link   bibtex   1 download  
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings. Simpson, L.; and Baee, M. A. R., editors. Volume 13915, of Lecture Notes in Computer Science.Springer. 2023.
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings [link]Paper   doi   link   bibtex  
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis. Hasan, K. F.; Simpson, L.; Baee, M. A. R.; Islam, C.; Rahman, Z.; Armstrong, W.; Gauravaram, P.; and McKague, M. CoRR, abs/2307.06520. 2023.
Migrating to Post-Quantum Cryptography: a Framework Using Security Dependency Analysis [link]Paper   doi   link   bibtex  
  2021 (3)
Authentication strategies in vehicular communications: a taxonomy and framework. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. EURASIP J. Wirel. Commun. Netw., 2021(1): 129. 2021.
Authentication strategies in vehicular communications: a taxonomy and framework [link]Paper   doi   link   bibtex  
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Inf. Forensics Secur., 16: 3678–3693. 2021.
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side! [link]Paper   doi   link   bibtex   1 download  
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications. Baee, M. A. R.; Simpson, L.; Boyen, X.; Foo, E.; and Pieprzyk, J. IEEE Trans. Veh. Technol., 70(9): 9306–9319. 2021.
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications [link]Paper   doi   link   bibtex   1 download  
  2020 (1)
Continuous authentication for VANET. Palaniswamy, B.; Camtepe, S.; Foo, E.; Simpson, L.; Baee, M. A. R.; and Pieprzyk, J. Veh. Commun., 25: 100255. 2020.
Continuous authentication for VANET [link]Paper   doi   link   bibtex  
  2019 (1)
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2. Baee, M. A. R.; Simpson, L.; Foo, E.; and Pieprzyk, J. IEEE Trans. Veh. Technol., 68(12): 11577–11587. 2019.
Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 [link]Paper   doi   link   bibtex   1 download  
  2015 (2)
Trust management in vehicular ad hoc network: a systematic review. Soleymani, S. A.; Abdullah, A. H.; Hassan, W. H.; Anisi, M. H.; Goudarzi, S.; Baee, M. A. R.; and Mandala, S. EURASIP J. Wirel. Commun. Netw., 2015: 146. 2015.
Trust management in vehicular ad hoc network: a systematic review [link]Paper   doi   link   bibtex   1 download  
The Model of Customer Trust for Internet Banking Adoption. Goudarzi, S.; Hassan, W. H.; Baee, M. A. R.; and Soleymani, S. A. In Borowik, G.; Chaczko, Z.; Jacak, W.; and Luba, T., editor(s), Computational Intelligence and Efficiency in Engineering Systems, volume 595, of Studies in Computational Intelligence, pages 399–414. Springer, 2015.
The Model of Customer Trust for Internet Banking Adoption [link]Paper   doi   link   bibtex   1 download