Bill Buchanan
Bill Buchanan
Other namesWilliam Buchanan, William J Buchanan
Professor of Cryptography, Edinburgh Napier University
Verified email at - Homepage
Cited by
Cited by
BeepTrace: blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond
H Xu, L Zhang, O Onireti, Y Fang, WJ Buchanan, MA Imran
IEEE Internet of Things Journal 8 (5), 3915-3929, 2020
Lightweight cryptography methods
WJ Buchanan, S Li, R Asif
Journal of Cyber Security Technology 1 (3-4), 187-201, 2017
Applications of blockchain within healthcare
L Bell, WJ Buchanan, J Cameron, O Lo
Blockchain in healthcare today, 2018
IoT forensics: Amazon echo as a use case
S Li, KKR Choo, Q Sun, WJ Buchanan, J Cao
IEEE Internet of Things Journal 6 (4), 6487-6497, 2019
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 ieee 4th international conference on cloud computing, 219-226, 2011
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
Mobile agents for routing, topology discovery, and automatic network reconfiguration in ad-hoc networks
N Migas, WJ Buchanan, KA McARTNEY
10th IEEE International Conference and Workshop on the Engineering of …, 2003
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
O Lo, WJ Buchanan, D Carson
Journal of Cyber Security Technology 1 (2), 88-107, 2017
Understanding political variables
W Buchanan
Pearson College Division, 1988
Monitoring information security risks within health care
N Van Deursen, WJ Buchanan, A Duff
computers & security 37, 31-45, 2013
An experimental analysis of attack classification using machine learning in IoT networks
A Churcher, R Ullah, J Ahmad, S Ur Rehman, F Masood, M Gogate, ...
Sensors 21 (2), 446, 2021
Machine learning and semantic analysis of in-game chat for cyberbullying
S Murnion, WJ Buchanan, A Smales, G Russell
Computers & Security 76, 197-213, 2018
Hierarchical network management: a scalable and dynamic mobile agent-based approach. volume 38
N Migas, WJ Buchanan, KA Mc Aartney
April 8, 693-711, 2002
A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks
TH Kim, R Goyat, MK Rai, G Kumar, WJ Buchanan, R Saha, R Thomas
IEEE access 7, 184133-184144, 2019
An integrated cloud-based healthcare infrastructure
E Ekonomou, L Fan, W Buchanan, C Thuemmler
2011 IEEE Third International Conference on Cloud Computing Technology and …, 2011
An intelligent agent security intrusion system
J Pikoulas, W Buchanan, M Mannion, K Triantafyllopoulos
Proceedings Ninth Annual IEEE International Conference and Workshop on the …, 2002
A privacy-preserving healthcare framework using hyperledger fabric
C Stamatellis, P Papadopoulos, N Pitropakis, S Katsikas, WJ Buchanan
Sensors 20 (22), 6587, 2020
DNA and plaintext dependent chaotic visual selective image encryption
JS Khan, W Boulila, J Ahmad, S Rubaiee, AU Rehman, R Alroobaea, ...
IEEE Access 8, 159732-159744, 2020
Microcomputer instruction for the learning disabled
G Schiffman, D Tobin, B Buchanan, G Paras
Journal of Learning Disabilities 15 (9), 557-559, 1982
The system can't perform the operation now. Try again later.
Articles 1–20