The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

A review of mobile forensic investigation process models

A Al-Dhaqm, S Abd Razak, RA Ikuesan… - IEEE …, 2020 - ieeexplore.ieee.org
Mobile Forensics (MF) field uses prescribed scientific approaches with a focus on recovering
Potential Digital Evidence (PDE) from mobile devices leveraging forensic techniques …

A robust and lightweight secure access scheme for cloud based E-healthcare services

M Masud, GS Gaba, K Choudhary, R Alroobaea… - Peer-to-peer Networking …, 2021 - Springer
Traditional healthcare services have transitioned into modern healthcare services where
doctors remotely diagnose the patients. Cloud computing plays a significant role in this …

Digital forensics subdomains: the state of the art and future directions

A Al-Dhaqm, RA Ikuesan, VR Kebande… - IEEE …, 2021 - ieeexplore.ieee.org
For reliable digital evidence to be admitted in a court of law, it is important to apply
scientifically proven digital forensic investigation techniques to corroborate a suspected …

Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing

D Koo, J Hur - Future Generation Computer Systems, 2018 - Elsevier
The explosion in the volume of data generated by end-point devices, arising from IoT
proliferation, has lead to the adoption of data outsourcing to dedicated data centers …

New secure healthcare system using cloud of things

EA Alkeem, D Shehada, CY Yeun, MJ Zemerly, J Hu - Cluster Computing, 2017 - Springer
Modern healthcare services are serving patients needs by using new technologies such as
wearable devices or cloud of things. The new technology provides more facilities and …

Windows instant messaging app forensics: Facebook and Skype as case studies

TY Yang, A Dehghantanha, KKR Choo, Z Muda - PloS one, 2016 - journals.plos.org
Instant messaging (IM) has changed the way people communicate with each other.
However, the interactive and instant nature of these applications (apps) made them an …

Novel digital forensic readiness technique in the cloud environment

VR Kebande, HS Venter - Australian Journal of Forensic Sciences, 2018 - Taylor & Francis
This paper examines the design and implementation of a feasible technique for performing
Digital Forensic Readiness (DFR) in cloud computing environments. The approach employs …

A comprehensive survey on artifact recovery from social media platforms: approaches and future research directions

K Gupta, D Oladimeji, C Varol, A Rasheed… - Information, 2023 - mdpi.com
Social media applications have been ubiquitous in modern society, and their usage has
grown exponentially over the years. With the widespread adoption of these platforms, social …

Forensic analysis of social networking applications on an android smartphone

A Menahil, W Iqbal, M Iftikhar… - Wireless …, 2021 - Wiley Online Library
Smartphone users spend a substantial amount of time in browsing, emailing, and
messaging through different social networking apps. The use of social networking apps on …