Ciaran Mc Goldrick
Cited by
Cited by
Multi-identity and multi-key leveled FHE from learning with errors
M Clear, C McGoldrick
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
PowerTOSSIM z: realistic energy modelling for wireless sensor network environments
E Perla, AÓ Catháin, RS Carbajo, M Huggard, C Mc Goldrick
Proceedings of the 3nd ACM workshop on Performance monitoring and …, 2008
Securing vehicle to vehicle communications using blockchain through visible light and acoustic side-channels
S Rowan, M Clear, M Gerla, M Huggard, CM Goldrick
arXiv preprint arXiv:1704.02553, 2017
Image coding using the singular value decomposition and vector quantization
CS McGoldrick, WJ Dowling, A Bury
Image Processing and its Applications, 1995., Fifth International Conference …, 1995
Performance evaluation of the 6LoWPAN protocol on MICAz and TelosB motes
B Cody-Kenny, D Guerin, D Ennis, R Simon Carbajo, M Huggard, ...
Proceedings of the 4th ACM workshop on Performance monitoring and …, 2009
A comparative study of active queue management schemes
A Bitorika, M Robin, M Huggard, C Mc Goldrick, 2004
Bootstrappable identity-based fully homomorphic encryption
M Clear, C McGoldrick
International Conference on Cryptology and Network Security, 1-19, 2014
ASDAH: An automated structural change detection algorithm based on the Hilbert–Huang transform
ES Carbajo, RS Carbajo, C Mc Goldrick, B Basu
Mechanical Systems and Signal Processing 47 (1-2), 78-93, 2014
Peer learning with lego mindstorms
C McGoldrick, M Huggard
34th Annual Frontiers in Education, 2004. FIE 2004., S2F-24, 2004
An end-to-end routing protocol for peer-to-peer communication in wireless sensor networks
R Simón Carbajo, M Huggard, C McGoldrick
Proceedings of the 6th workshop on middleware for network eccentric and …, 2008
Routing in wireless sensor networks for wind turbine monitoring
RS Carbajo, ES Carbajo, B Basu, C Mc Goldrick
Pervasive and Mobile Computing 39, 1-35, 2017
A SDN-Controlled Underwater MAC and Routing Testbed
Fan, Roulin, L Wei, P Du, C Mc Goldrick, M Gerla
MILCOM 2016, 2016
Anonymous IBE from quadratic residuosity with improved performance
M Clear, H Tewari, C McGoldrick
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
Simulating mobility in wsns: Bridging the gap between ns-2 and tossim 2. x
C Stevens, C Lyons, R Hendrych, RS Carbajo, M Huggard, C Mc Goldrick
2009 13th IEEE/ACM International Symposium on Distributed Simulation and …, 2009
Attribute-based fully homomorphic encryption with a bounded number of inputs
M Clear, CM Goldrick
International Journal of Applied Cryptography 3 (4), 363-376, 2017
An SDN architecture for under water search and surveillance
R Fan, C Mc Goldrick, M Gerla
2017 13th Annual Conference on Wireless On-demand Network Systems and …, 2017
Delivering improved QoS and cell throughput in UMTS based HSDPA networks
R Shreevastav, C McGoldrick, M Huggard
2009 IEEE International Symposium on a World of Wireless, Mobile and …, 2009
Incentivising students to pursue computer science programmes
M Huggard, C Mc Goldrick
Proceedings. Frontiers in Education. 36th Annual Conference, 3-8, 2006
Decentralised peer-to-peer data dissemination in wireless sensor networks
RS Carbajo, C Mc Goldrick
Pervasive and Mobile Computing 40, 242-266, 2017
Policy-Based Non-interactive Outsourcing of Computation using multikey FHE and CP-ABE
M Clear, C Mc Goldrick
International Conference on Security and Cryptography (SECRYPT), 2013
The system can't perform the operation now. Try again later.
Articles 1–20