Assessing the performance of phantom routing on source location privacy in wireless sensor networks C Gu, M Bradbury, A Jhumka, M Leeke 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing …, 2015 | 20 | 2015 |
Towards fake sources for source location privacy in wireless sensor networks with multiple sources JF Laikin, M Bradbury, C Gu, M Leeke 2016 IEEE International Conference on Communication Systems (ICCS), 1-6, 2016 | 17 | 2016 |
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks C Gu, M Bradbury, J Kirton, A Jhumka Future Generation Computer Systems 87, 514-526, 2018 | 14 | 2018 |
Phantom walkabouts in wireless sensor networks C Gu, M Bradbury, A Jhumka Proceedings of the Symposium on Applied Computing, 609-616, 2017 | 7 | 2017 |
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks C Gu, M Bradbury, A Jhumka Concurrency and Computation: Practice and Experience, e5304, 2019 | 4 | 2019 |
Semi-automatic ladderisation: improving code security through rewriting and dependent types C Brown, AD Barwell, Y Marquer, O Zendra, T Richmond, C Gu Proceedings of the 2022 ACM SIGPLAN International Workshop on Partial …, 2022 | | 2022 |
Throughput Aware Authentication Prioritisation for Vehicular Communication Networks H Yuan, M Bradbury, C Maple, C Gu IEEE 90th Vehicular Technology Conference: VTC2019-Fall, 1-5, 2019 | | 2019 |