Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bruce Ndibanje
@article{DBLP:journals/sensors/YinLNNI19, author = {XiaoChun Yin and Zengguang Liu and Bruce Ndibanje and Lewis Nkenyereye and S. M. Riazul Islam}, title = {An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks}, journal = {Sensors}, volume = {19}, number = {14}, pages = {3146}, year = {2019}, url = {https://doi.org/10.3390/s19143146}, doi = {10.3390/S19143146}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/YinLNNI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/YinLNN19, author = {XiaoChun Yin and Zengguang Liu and Lewis Nkenyereye and Bruce Ndibanje}, title = {Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach}, journal = {Sensors}, volume = {19}, number = {22}, pages = {4952}, year = {2019}, url = {https://doi.org/10.3390/s19224952}, doi = {10.3390/S19224952}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/YinLNN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/LeeBNAL15, author = {Young{-}Sil Lee and Bruce Ndibanje and Non Thiranant and Esko Alasaarela and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Hybrid Cloud Service Based Healthcare Solutions}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {25--30}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.42}, doi = {10.1109/WAINA.2015.42}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/LeeBNAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BruceKPL15, author = {Bruce Ndibanje and Hyunho Kim and Suhyun Park and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {An Efficient and Provable Secret Shared Key Computation for Cryptographic Protocol Across Insecure Channel}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {143--147}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.178}, doi = {10.1109/AINA.2015.178}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/BruceKPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KimKBPL15, author = {Hyunho Kim and Young{-}Jin Kang and Bruce Ndibanje and Suhyun Park and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Smartphone-Based Secure Access Control in Wireless Network Analysis}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {AINA} 2015 Workshops, Gwangju, South Korea, March 24-27, 2015}, pages = {344--347}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/WAINA.2015.91}, doi = {10.1109/WAINA.2015.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KimKBPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/BruceKKLL15, author = {Bruce Ndibanje and Hyunho Kim and Young{-}Jin Kang and Young{-}Sil Lee and Hoon{-}Jae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {On Modeling Protocol-Based Clustering Tag in {RFID} Systems with Formal Security Analysis}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {498--505}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.227}, doi = {10.1109/AINA.2015.227}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/BruceKKLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/KangKBPL15, author = {Young{-}Jin Kang and Hyunho Kim and Bruce Ndibanje and Younggoo Park and Hoonjae Lee}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {Correlation Power Analysis Attack on the Ping Pong-128 Key Stream Generator}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {506--509}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.228}, doi = {10.1109/AINA.2015.228}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/KangKBPL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/NdibanjeKSL15, author = {Bruce Ndibanje and Young{-}Jin Kang and Mangal Sain and Hoon{-}Jae Lee}, editor = {Jian Pei and Fabrizio Silvestri and Jie Tang}, title = {An Approach to Designing a Network Security-based Application for Communications Safety}, booktitle = {Proceedings of the 2015 {IEEE/ACM} International Conference on Advances in Social Networks Analysis and Mining, {ASONAM} 2015, Paris, France, August 25 - 28, 2015}, pages = {1002--1009}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808797.2808808}, doi = {10.1145/2808797.2808808}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/NdibanjeKSL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/NdibanjeLLL15, author = {Bruce Ndibanje and Young{-}Sil Lee and Sanggon Lee and Hoon{-}Jae Lee}, title = {A Privacy Preserving Security Protocol-Based Application for Wireless Communication System}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1651--1656}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.79}, doi = {10.1109/HPCC-CSS-ICESS.2015.79}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/NdibanjeLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/LeeNAKL15, author = {Young{-}Sil Lee and Bruce Ndibanje and Esko Alasaarela and Tae{-}Yong Kim and Hoon{-}Jae Lee}, title = {An Effective and Secure User Authentication and Key Agreement Scheme in m-Healthcare Systems}, booktitle = {17th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2015, 7th {IEEE} International Symposium on Cyberspace Safety and Security, {CSS} 2015, and 12th {IEEE} International Conference on Embedded Software and Systems, {ICESS} 2015, New York, NY, USA, August 24-26, 2015}, pages = {1685--1690}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/HPCC-CSS-ICESS.2015.91}, doi = {10.1109/HPCC-CSS-ICESS.2015.91}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/LeeNAKL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicce/MarpaungNL14, author = {Jonathan A. P. Marpaung and Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Higher-Order Countermeasures against Side-Channel Cryptanalysis on Rabbit Stream Cipher}, journal = {J. Inform. and Commun. Convergence Engineering}, volume = {12}, number = {4}, pages = {237--245}, year = {2014}, url = {https://doi.org/10.6109/jicce.2014.12.4.237}, doi = {10.6109/JICCE.2014.12.4.237}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jicce/MarpaungNL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/NdibanjeLL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee and Sanggon Lee}, title = {Security Analysis and Improvements of Authentication and Access Control in the Internet of Things}, journal = {Sensors}, volume = {14}, number = {8}, pages = {14786--14805}, year = {2014}, url = {https://doi.org/10.3390/s140814786}, doi = {10.3390/S140814786}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/NdibanjeLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gcce/BruceL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {An enhanced passivation layer for secure consumer integrated circuit devices}, booktitle = {{IEEE} 3rd Global Conference on Consumer Electronics, {GCCE} 2014, Tokyo, Japan, 7-10 October 2014}, pages = {300--301}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GCCE.2014.7031254}, doi = {10.1109/GCCE.2014.7031254}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/gcce/BruceL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icoin/NdibanjeL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Cryptographic computation of private shared key based mutual authentication protocol: Simulation and modeling over wireless networks}, booktitle = {The International Conference on Information Networking 2014, {ICOIN} 2014, Phuket, Thailand, February 10-12, 2014}, pages = {578--582}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICOIN.2014.6799747}, doi = {10.1109/ICOIN.2014.6799747}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icoin/NdibanjeL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/BruceL14, author = {Bruce Ndibanje and Hoon{-}Jae Lee}, title = {Anonymization algorithm for security and confidentiality of health data set across social network}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2014, Busan, South Korea, October 22-24, 2014}, pages = {65--70}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICTC.2014.6983085}, doi = {10.1109/ICTC.2014.6983085}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/BruceL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/NdibanjeKL13, author = {Bruce Ndibanje and Tae{-}Yong Kim and Hoon{-}Jae Lee}, title = {Improved Security Patch on Secure Communication among Cell Phones and Sensor Networks}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/348783}, doi = {10.1155/2013/348783}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/NdibanjeKL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ictc/BruceHL13, author = {Bruce Ndibanje and Gi{-}Hyun Hwang and Hoon{-}Jae Lee}, title = {A hybrid and fast authentication protocol for handoff support in e-healthcare systems among WSNs}, booktitle = {International Conference on Information and Communication Technology Convergence, {ICTC} 2013, Jeju Island, South Korea, 4-16 October 2013}, pages = {72--77}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICTC.2013.6675309}, doi = {10.1109/ICTC.2013.6675309}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ictc/BruceHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/NdibanjeKL12, author = {Bruce Ndibanje and Tae{-}Yong Kim and Hoon{-}Jae Lee}, editor = {Tai{-}Hoon Kim and Dae{-}Sik Ko and Thanos Vasilakos and Adrian Stoica and Jemal H. Abawajy}, title = {Data Link Layer' Security Analysis for Wireless Sensor Networks}, booktitle = {Computer Applications for Communication, Networking, and Digital Contents - International Conferences, {FGCN} and {DCA} 2012, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2012, Gangneug, Korea, December 16-19, 2012. Proceedings}, series = {Communications in Computer and Information Science}, volume = {350}, pages = {25--32}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35594-3\_4}, doi = {10.1007/978-3-642-35594-3\_4}, timestamp = {Tue, 23 May 2017 01:07:31 +0200}, biburl = {https://dblp.org/rec/conf/fgit/NdibanjeKL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ichit/ChoudhuryPBLLL11, author = {Amlan Jyoti Choudhury and Beum{-}Su Park and Bruce Ndibanje and Young{-}Sil Lee and Hyotaek Lim and Hoon{-}Jae Lee}, editor = {Geuk Lee and Daniel Howard and Dominik Slezak}, title = {An Efficient Hardware Countermeasure against Differential Power Analysis Attack}, booktitle = {Convergence and Hybrid Information Technology - 5th International Conference, {ICHIT} 2011, Daejeon, Korea, September 22-24, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {206}, pages = {153--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24106-2\_20}, doi = {10.1007/978-3-642-24106-2\_20}, timestamp = {Thu, 28 Dec 2017 16:02:42 +0100}, biburl = {https://dblp.org/rec/conf/ichit/ChoudhuryPBLLL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.