Lynn Batten
YOU?
Author Swipe
View article: Advances in security research in the Asiacrypt region
Advances in security research in the Asiacrypt region Open
Members of the International Association for Cryptologic Research explore regional work and collaboration activities.
View article: Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017)
Foreword to the Special Issue of the 8th International Conference on Applications and Techniques for Information Security (ATIS 2017) Open
In this data-driven era, the world has profoundly benefitted from the advanced information and communication technologies for the purposes spanning from data collecting, data storing, and data processing to data analyzing and data publishi…
View article: IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks
IEEE Access Special Section: Curbing Crowdturfing in Online Social Networks Open
As online social networks are reshaping the way users share their daily experiences, and the way business practitioners manage their marketing activities, crowdturfing has been emerging as a potential threat that concerns many users. If no…
View article: New advances in securing cyberspace and curbing crowdturfing
New advances in securing cyberspace and curbing crowdturfing Open
Cyberspace is reshaping the way businesses manage their sales and marketing assets. Unlike traditional media, such as TV, radio or newspapers, social media is characterized by freely available user-generated content. In addition to gaining…
View article: New directions in IoT privacy using attribute-based authentication
New directions in IoT privacy using attribute-based authentication Open
Contains fulltext : 159578.pdf (Publisher’s version ) (Open Access)
View article: Securing cyberspace
Securing cyberspace Open
Cyberspace, the ubiquitous space that exists in relation to the Internet, is usually referred to as a dynamic broad domain ranging from Internet and its infrastructures to social networks. More research work in security has been extended f…
View article: Segregation-of-duties Conflicts in the Insider Threat Landscape-An Overview and Case Study
Segregation-of-duties Conflicts in the Insider Threat Landscape-An Overview and Case Study Open
Many insider attacks originate from misuse of privileges granted by organizations to their internal employees, contractors or third-party service providers.A fundamental means of ensuring that conflicts of privilege cannot occur is to segr…