Encrypted message authentication by firewalls C Gamage, J Leiwo, Y Zheng Public Key Cryptography: Second International Workshop on Practice and …, 1999 | 162 | 1999 |
Taking sensor networks from the lab to the jungle AS Tanenbaum, C Gamage, B Crispo Computer 39 (8), 98-100, 2006 | 131 | 2006 |
An efficient scheme for secure message transmission using proxy-signcryption C Gamage, J Leiwo, Y Zheng Proceedings of the Twenty Second Australasian Computer Science Conference, 18-21, 1999 | 129 | 1999 |
An identity-based ring signature scheme with enhanced privacy C Gamage, B Gras, B Crispo, AS Tanenbaum 2006 Securecomm and Workshops, 1-5, 2006 | 112 | 2006 |
Enabling DRM-preserving digital content redistribution SK Nair, BC Popescu, C Gamage, B Crispo, AS Tanenbaum Seventh IEEE International Conference on E-Commerce Technology (CEC'05), 151-158, 2005 | 57 | 2005 |
Employee perception towards electronic monitoring at work place and its impact on job satisfaction of software professionals in Sri Lanka V Samaranayake, C Gamage Telematics and Informatics 29 (2), 233-244, 2012 | 47 | 2012 |
A framework for whole-body gesture recognition from video feeds CN Joseph, S Kokulakumaran, K Srijeyanthan, A Thusyanthan, ... 2010 5th international conference on industrial and information systems, 430-435, 2010 | 34 | 2010 |
Enhanced real-time machine inspection with mobile augmented reality for maintenance and repair: Demo abstract M Jayaweera, I Wijesooriya, D Wijewardana, T De Silva, C Gamage Proceedings of the Second International Conference on Internet-of-Things …, 2017 | 29* | 2017 |
Organizational modeling for efficient specification of information security requirements J Leiwo, C Gamage, Y Zheng Advances in Databases and Information Systems: Third East European …, 1999 | 24 | 1999 |
Security for the mythical air-dropped sensor network C Gamage, K Bicakci, B Crispo, AS Tanenbaum 11th IEEE Symposium on Computers and Communications (ISCC'06), 41-47, 2006 | 23 | 2006 |
Quantitative and qualitative evaluation of performance and robustness of image stitching algorithms V Dissanayake, S Herath, S Rasnayaka, S Seneviratne, ... 2015 International Conference on Digital Image Computing: Techniques and …, 2015 | 20 | 2015 |
One-time sensors: A novel concept to mitigate node-capture attacks K Bicakci, C Gamage, B Crispo, AS Tanenbaum Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop …, 2005 | 17 | 2005 |
Evaluating effective use of social networks for recruitment M Amadoru, C Gamage Proceedings of the 2016 ACM SIGMIS Conference on Computers and People …, 2016 | 16 | 2016 |
A security design for a wide-area distributed system J Leiwo, C Hänle, P Homburg, C Gamage, AS Tanenbaum Information Security and Cryptology-ICISC’99: Second International …, 2000 | 16 | 2000 |
Case study of WSN as a replacement for SCADA C Amarawardhana, KS Dayananada, H Porawagama, C Gamage 2009 International Conference on Industrial and Information Systems (ICIIS …, 2009 | 15 | 2009 |
Canning spam in wireless gossip networks D Gavidia, GP Jesi, C Gamage, M van Steen 2007 Fourth Annual Conference on Wireless on Demand Network Systems and …, 2007 | 13* | 2007 |
Chaos theory based cryptography in digital image distribution MHP Ranmuthugala, C Gamage 2010 International Conference on Advances in ICT for Emerging Regions (ICTer …, 2010 | 11 | 2010 |
A secure peer sampling service GP Jesi, D Gavidia, C Gamage, M van Steen UBLCS, 2006 | 11* | 2006 |
Optimization of RSSI based indoor localization and tracking to monitor workers in a hazardous working zone using Machine Learning techniques P Aravinda, S Sooriyaarachchi, C Gamage, N Kottege 2021 International Conference on Information Networking (ICOIN), 305-310, 2021 | 10 | 2021 |
Towards reusing esb services in different esb architectures I Kumara, C Gamage 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 10 | 2010 |