Follow
Anne Kayem
Anne Kayem
University of Exeter, UK
Verified email at mykayem.org - Homepage
Title
Cited by
Cited by
Year
Adaptive cryptographic access control
AVDM Kayem, SG Akl, P Martin
Springer Science & Business Media, 2010
412010
Are motorways rational from slime mould's point of view?
A Adamatzky, S Akl, R Alonso-Sanz, W Van Dessel, Z Ibrahim, ...
International Journal of Parallel, Emergent and Distributed Systems 28 (3 …, 2013
382013
A cyber risk based moving target defense mechanism for microservice architectures
KA Torkura, MIH Sukmana, AVDM Kayem, F Cheng, C Meinel
2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications …, 2018
352018
Graphical Passwords--A Discussion
AVDM Kayem
2016 30th International Conference on Advanced Information Networking and …, 2016
262016
A usable and secure crime reporting system for technology resource constrained context
AB Sakpere, AVDM Kayem, T Ndlovu
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
232015
Adaptive cryptographic access control for dynamic data sharing environments
A Kayem, P Martin, SG Akl
Canadian theses, 2008
192008
Securing cloud storage brokerage systems through threat models
KA Torkura, MIH Sukmana, M Meinig, AVDM Kayem, F Cheng, ...
2018 IEEE 32nd international conference on advanced information networking …, 2018
162018
On replacing cryptographic keys in hierarchical key management systems
AVDM Kayem, SG Akl, P Martin
Journal of Computer Security 16 (3), 289-309, 2008
162008
Key management for secure demand data communication in constrained micro-grids
AVDM Kayem, H Strauss, SD Wolthusen, C Meinel
2016 30th International Conference on Advanced Information Networking and …, 2016
152016
A distributed continuous double auction framework for resource constrained microgrids
AMC Marufu, AVDM Kayem, SD Wolthusen
Critical Information Infrastructures Security: 10th International Conference …, 2016
142016
Secure and efficient mobile personal health data sharing in resource constrained environments
R Ssembatya, AVDM Kayem
2015 IEEE 29th International Conference on Advanced Information Networking …, 2015
142015
A state-of-the-art review of data stream anonymization schemes
AB Sakpere, AVDM Kayem
Information security in diverse computing environments, 24-50, 2014
142014
K-anonymity for privacy preserving crime data publishing in resource constrained environments
MJ Burke, AVDM Kayem
2014 28th International Conference on Advanced Information Networking and …, 2014
132014
A smart micro-grid architecture for resource constrained environments
AVDM Kayem, C Meinel, SD Wolthusen
2017 IEEE 31st International Conference on Advanced Information Networking …, 2017
122017
Decentralised scheduling of power consumption in micro-grids: Optimisation and security
GK Weldehawaryat, PL Ambassa, AMC Marufu, SD Wolthusen, ...
Security of Industrial Control Systems and Cyber-Physical Systems: Second …, 2017
122017
Automated k-Anonymization and l-Diversity for Shared Data Privacy
AVDM Kayem, CT Vester, C Meinel
Database and Expert Systems Applications: 27th International Conference …, 2016
122016
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids
PL Ambassa, SD Wolthusen, AVDM Kayem, C Meinel
2015 IEEE Innovative Smart Grid Technologies-Asia (ISGT ASIA), 1-6, 2015
122015
Adaptive buffer resizing for efficient anonymization of streaming data with minimal information loss
AB Sakpere, AVDM Kayem
2015 international conference on information systems security and privacy …, 2015
112015
Heuristics for improving cryptographic key assignment in a hierarchy
AVDM Kayem, P Martin, SG Akl
21st International Conference on Advanced Information Networking and …, 2007
112007
Cok: A survey of privacy challenges in relation to data meshes
NJ Podlesny, AVDM Kayem, C Meinel
International Conference on Database and Expert Systems Applications, 85-102, 2022
102022
The system can't perform the operation now. Try again later.
Articles 1–20