Bill Buchanan
Bill Buchanan
Other namesWilliam Buchanan, William J Buchanan
Professor of Cryptography, Edinburgh Napier University
Verified email at - Homepage
Cited by
Cited by
Introduction to cryptography
J Buchmann
Springer, 2004
BeepTrace: Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond
H Xu, L Zhang, O Onireti, Y Fang, WJ Buchanan, MA Imran
IEEE Internet of Things Journal 8 (5), 3915-3929, 2020
Applied machine learning predictive analytics to SQL injection attack detection and prevention
SO Uwagbole, WJ Buchanan, L Fan
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM …, 2017
Lightweight cryptography methods
WJ Buchanan, S Li, R Asif
Journal of Cyber Security Technology 1 (3-4), 187-201, 2017
Applications of Blockchain Within Healthcare.
L Bell, WJ Buchanan, J Cameron, O Lo
Blockchain in healthcare today, 2018
An experimental analysis of attack classification using machine learning in IoT networks
A Churcher, R Ullah, J Ahmad, S Ur Rehman, F Masood, M Gogate, ...
Sensors 21 (2), 446, 2021
IoT forensics: Amazon echo as a use case
S Li, KKR Choo, Q Sun, WJ Buchanan, J Cao
IEEE Internet of Things Journal 6 (4), 6487-6497, 2019
Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)
O Lo, WJ Buchanan, D Carson
Journal of Cyber Security Technology 1 (2), 88-107, 2017
Measuring the carbon intensity of ai in cloud instances
J Dodge, T Prewitt, R Tachet des Combes, E Odmark, R Schwartz, ...
Proceedings of the 2022 ACM conference on fairness, accountability, and …, 2022
A privacy-preserving healthcare framework using hyperledger fabric
C Stamatellis, P Papadopoulos, N Pitropakis, S Katsikas, WJ Buchanan
Sensors 20 (22), 6587, 2020
A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations
F Masood, M Driss, W Boulila, J Ahmad, SU Rehman, SU Jan, A Qayyum, ...
Wireless personal communications 127 (2), 1405-1432, 2022
DACAR platform for eHealth services cloud
L Fan, W Buchanan, C Thummler, O Lo, A Khedim, O Uthmani, A Lawson, ...
2011 IEEE 4th international conference on cloud computing, 219-226, 2011
A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks
TH Kim, R Goyat, MK Rai, G Kumar, WJ Buchanan, R Saha, R Thomas
IEEE access 7, 184133-184144, 2019
Machine learning and semantic analysis of in-game chat for cyberbullying
S Murnion, WJ Buchanan, A Smales, G Russell
Computers & Security 76, 197-213, 2018
Decentralized accessibility of e-commerce products through blockchain technology
G Kumar, R Saha, WJ Buchanan, G Geetha, R Thomas, MK Rai, TH Kim, ...
Sustainable Cities and Society 62, 102361, 2020
Chaos-based confusion and diffusion of image pixels using dynamic substitution
A Qayyum, J Ahmad, W Boulila, S Rubaiee, F Masood, F Khan, ...
IEEE Access 8, 140876-140895, 2020
Design issues for peer-to-peer massively multiplayer online games
L Fan, P Trinder, H Taylor
International Journal of Advanced Media and Communication 4 (2), 108-125, 2010
A deep learning-based intrusion detection system for MQTT enabled IoT
MA Khan, MA Khan, SU Jan, J Ahmad, SS Jamal, AA Shah, N Pitropakis, ...
Sensors 21 (21), 7016, 2021
Understanding political variables
W Buchanan
(No Title), 1974
DNA and plaintext dependent chaotic visual selective image encryption
JS Khan, W Boulila, J Ahmad, S Rubaiee, AU Rehman, R Alroobaea, ...
IEEE Access 8, 159732-159744, 2020
The system can't perform the operation now. Try again later.
Articles 1–20