default search action
Hannan Xiao
- > Home > Persons > Hannan Xiao
Publications
- 2022
- [j14]Aldo Febro, Hannan Xiao, Joseph Spring, Bruce Christianson:
Edge security for SIP-enabled IoT devices with P4. Comput. Networks 203: 108698 (2022) - [j13]Aldo Febro, Hannan Xiao, Joseph Spring, Bruce Christianson:
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain. Comput. Networks 216: 109267 (2022) - [j12]Eric Chiejina, Hannan Xiao, Bruce Christianson, Alexios Mylonas, Chidinma Chiejina:
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. Sensors 22(2): 571 (2022) - 2018
- [c34]Tamsanqa Ngalo, Hannan Xiao, Bruce Christianson, Ying Zhang:
Threat Analysis of Software Agents in Online Banking and Payments. DASC/PiCom/DataCom/CyberSciTech 2018: 716-723 - 2016
- [j8]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks. IEEE J. Biomed. Health Informatics 20(3): 763-774 (2016) - [c31]Hannan Xiao, Awatif Ali Alshehri, Bruce Christianson:
A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels. Trustcom/BigDataSE/ISPA 2016: 332-339 - [c29]Chaminda Alocious, Hannan Xiao, Bruce Christianson:
Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks. WCNC 2016: 1-6 - 2015
- [j7]Eric Chiejina, Hannan Xiao, Bruce Christianson:
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. Comput. 4(2): 87-112 (2015) - [c28]Chaminda Alocious, Hannan Xiao, Bruce Christianson, James A. Malcolm:
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. CIT/IUCC/DASC/PICom 2015: 1853-1860 - [c26]Hannan Xiao, Nitin Sidhu, Bruce Christianson:
Guarantor and reputation based trust model for Social Internet of Things. IWCMC 2015: 600-605 - [c25]Chaminda Alocious, Hannan Xiao, Bruce Christianson:
Analysis of DoS attacks at MAC Layer in mobile adhoc networks. IWCMC 2015: 811-816 - 2014
- [j4]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
A Survey of Access Control Models in Wireless Sensor Networks. J. Sens. Actuator Networks 3(2): 150-180 (2014) - [c23]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. Healthcom 2014: 130-135 - [c20]Hannan Xiao, Dashti M. Ibrahim, Bruce Christianson:
Energy consumption in Mobile Ad Hoc Networks. WCNC 2014: 2599-2604 - 2013
- [c19]Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model for medical data in Wireless Sensor Networks. Healthcom 2013: 303-309 - 2012
- [c17]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Trustworthiness and authentication in ubiquitous computing. MOBIWAC 2012: 135-138 - [c16]Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. Q2SWinet 2012: 81-84 - 2010
- [j3]Hannan Xiao, Ying Zhang, James A. Malcolm, Bruce Christianson, Kee Chaing Chua:
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. Wirel. Sens. Netw. 2(7): 493-503 (2010) - 2009
- [c14]Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Extending Trust in Peer-to-Peer Networks. ADBIS (Workshops) 2009: 145-152 - [c12]Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Trust*: Using Local Guarantees to Extend the Reach of Trust. Security Protocols Workshop 2009: 171-178 - 2008
- [c11]Hannan Xiao, Bruce Christianson, Ying Zhang:
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. IAS 2008: 15-20 - 2007
- [c10]Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. IAS 2007: 50-55 - [c9]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing. MobiQuitous 2007: 1-3
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint