Dr Sye Loong Keoh

  • Associate Professor (Computing Science)

telephone: +65 6908 6044
email: SyeLoong.Keoh@glasgow.ac.uk

Research interests

Personal site: http://www.dcs.gla.ac.uk/~sye

Biography:

Sye Loong Keoh is an Assistant Professor in the School of Computing Science, University of Glasgow, Singapore. He obtained his PhD in computing science from Imperial College London in 2005. Prior to joining Glasgow, he was a Senior Scientist at Philips Research Eindhoven (2008 - 2013) and a Postdoctoral Research Associate at Imperial College London (2005 - 2008). While working at Philips Research, he was responsible for standardizing Digital Rights Management (DRM) technology for content protection. He was also involved in projects related to medical security and security protocols design for Philips lighting systems.

He has been actively contributing to the standardization of security protocols for Internet of Things (IoT) in the Internet Engineering Task Force (IETF) since 2011, specifically he contributes to the Constrained Restful Environment (CoRE), DTLS in Constrained Environment (DICE) and Lightweight Implementation Guidance (LWIG) working groups. His research interests include policy-based management, building and home automation, security protocol design, security and trust management, Internet of Things and pervasive computing.

Research Interests:
- Security Protocol Design
- Authentication and Access Control Model
- Wireless Sensor Networks
- Policy-based Management
- Pervasive Computing Security
- Internet of Things

Grants

  1. EPSILON (ε): End-to-end Protection for Smart-metering Communication Infrastructure within a Local Field Area Network (FAN)
    Ministry of Education Translational R&D and Innovation Fund (MOE-TIF)
    Project Duration: 2016 - 2018
    Award: S$311,167
    Consortium: University of Glasgow, Republic Polytechnic Singapore, RFNet Technology and Wi-SUN Alliance

Publications

List by: Type | Date

Jump to: 2017 | 2016 | 2015 | 2014 | 2013 | 2012 | 2011 | 2010 | 2009 | 2008 | 2007 | 2005 | 2004 | 2002
Number of items: 43.

2017

Ko, H., Jin, J. and Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In: 3rd ACM Cyber-Physical System Security Workshop (CPSS), Abu Dhabi, UAE, 02 Apr 2017, pp. 69-80. ISBN 9781450349567 (doi:10.1145/3055186.3055194)

Sim, L. J. H., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. In: IEEE Technologies for Smart Nation (TENCON), Marina Bay Sands, Singapore, 22-25 Nov 2016, pp. 2513-2516. ISBN 9781509025978 (doi:10.1109/TENCON.2016.7848486)

Yin, X. and Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. In: IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12-14 Dec 2016, pp. 666-671. ISBN 9781509041305 (doi:10.1109/WF-IoT.2016.7845398)

2016

Ko, H., Jin, J. and Keoh, S. L. (2016) Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet of Things Journal, 3(6), pp. 1006-1014. (doi:10.1109/JIOT.2016.2545926)

Syed, A. R., Yau, K.-L. A., Qadir, J., Mohamad, H., Ramli, N. and Keoh, S. L. (2016) Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study. IEEE Access, 4, pp. 6304-6324. (doi:10.1109/ACCESS.2016.2613122)

Ang, Y. H., Keoh, S. L. and Tang, Z. (2016) Privacy-preserving spatial and temporal aggregation of smart energy data. Journal of Information Assurance and Security, 11(4), pp. 214-222.

Ko, H., Keoh, S. L. and Jin, J. (2016) Privacy protection for cloud-based robotic networks. In: Houbing, S., Fink, G. A., Rosner, G. L. and Jeschke, S. (eds.) Security and Privacy in Cyber-Physical Systems: Foundations and Applications. Wiley. (In Press)

Lim, W. L. H., Lum, J. T. W., Yeo, I. J. W. and Keoh, S. L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: First International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, Sydney, Australia, 14-18 Mar 2016, pp. 1-6. ISBN 9781509019410 (doi:10.1109/PERCOMW.2016.7457088)

2015

Keoh, S. L., Ang, Y. H. and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 Dec 2015,

Keoh, S. L., Au, K. W. K. and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, 8 Dec 2015,

Chuan, W. B., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2015) Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, Asia, 26-27 Oct 2015,

2014

Keoh, S. L. and Tang, Z. (2014) Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In: IEEE 10th International Conference on Information Assurrance and Security (IAS), Okinawa, Japan, 27 - 29 Nov 2014,

Keoh, S. L., Kumar, S. S. and Tschofenig, H. (2014) Securing the Internet of Things: a standardization perspective. IEEE Internet of Things Journal, 1(3), pp. 265-275. (doi:10.1109/JIOT.2014.2323395)

2013

Soni, A., Keoh, S.L., Kumar, S.S. and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, Leicester, UK, 16-17 Sep 2013,

Garcia-Morchon, O., Keoh, S.L., Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F. and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17 Apr 2013, pp. 119-124. (doi:10.1145/2462096.2462117)

Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets. .

Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S. and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25-28 Mar 2013, pp. 1331-1336. (doi:10.1109/WAINA.2013.158)

Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems. .

2012

Brachmann, M., Keoh, S.L., Morchon, O.G. and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 Jul - 2 Aug 2012, pp. 1-5. (doi:10.1109/ICCCN.2012.6289292)

Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations. .

Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption. .

2011

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S. and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61(3), pp. 527-542. (doi:10.1007/s11277-011-0385-5)

Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49(11), pp. 174-180. (doi:10.1109/MCOM.2011.6069726)

Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan, 5 - 9 Jun 2011, pp. 1-6. (doi:10.1109/icc.2011.5962805)

Keoh, S.L., Asim, M., Kumar, S.S. and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, 12 Jun 2011,

2010

Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666

2009

Zhu, Y., Keoh, S.L., Sloman, M. and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6(3), pp. 137-148. (doi:10.1109/TNSM.2009.03.090301)

Keoh, S.L., Lupu, E. and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9-13 Mar 2009, pp. 1-6. (doi:10.1109/PERCOM.2009.4912756)

Keoh, S.L. and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA, 9 Nov 2009, pp. 29-38. (doi:10.1145/1655048.1655054)

Zhu, Y., Sloman, M., Lupu, E. and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., London, UK, 1-3 Apr 2009, (doi:10.4108/ICST.PERVASIVEHEALTH2009.5939)

2008

Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L. and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20(3), pp. 277-295. (doi:10.1002/cpe.1194)

Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L., Lobo, J. and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), Bremen, Germany, 1-3 Jul 2008, pp. 1-14. (doi:10.1007/978-3-540-70587-1_1)

Yanmin, Z., Keoh, S.L., Sloman, M., Lupu, E., Yu, Z., Dulay, N. and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 Sep - 2 Oct 2008, pp. 428-433. (doi:10.1109/MAHSS.2008.4660033)

Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08., Melbourne, Australia, 8-10 Dec 2008, pp. 383-390. (doi:10.1109/ICPADS.2008.52)

Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Hong Kong, China, 1-3 Jun 2008, pp. 37-40. (doi:10.1109/ISSMDBS.2008.4575010)

2007

Keoh, S.L., Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6-10 Aug 2007, pp. 1-5. (doi:10.1109/MOBIQ.2007.4451009)

Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Aachen, Germany, 26-28 March 2007, pp. 92-98.

Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L., Twidle, K., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 9-11 Jul 2007, pp. 224-236. (doi:10.1109/SASO.2007.64)

Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L., Lupu, E., Schaeffer-Filho, A.E., Sloman, M. and Sventek, J.S. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.

2005

Keoh, S.L. and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, Boppard, Germany, 5-8 April 2005, pp. 210-224. (doi:10.1007/978-3-540-32004-3_21)

2004

Keoh, S.L., Lupu, E. and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6-10 Dec, 2004, pp. 386-395. (doi:10.1109/CSAC.2004.26)

Keoh, S.L. and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, Paris, France, 20-23 Jun 2004,

2002

Keoh, S.L. and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, 30-31 Oct, 2002, pp. 58-65. (doi:10.1145/584490.584503)

This list was generated on Wed Aug 16 01:46:09 2017 BST.
Number of items: 43.

Articles

Ko, H., Jin, J. and Keoh, S. L. (2016) Secure service virtualization in IoT by dynamic service dependency verification. IEEE Internet of Things Journal, 3(6), pp. 1006-1014. (doi:10.1109/JIOT.2016.2545926)

Syed, A. R., Yau, K.-L. A., Qadir, J., Mohamad, H., Ramli, N. and Keoh, S. L. (2016) Route selection for multi-hop cognitive radio networks using reinforcement learning: an experimental study. IEEE Access, 4, pp. 6304-6324. (doi:10.1109/ACCESS.2016.2613122)

Ang, Y. H., Keoh, S. L. and Tang, Z. (2016) Privacy-preserving spatial and temporal aggregation of smart energy data. Journal of Information Assurance and Security, 11(4), pp. 214-222.

Keoh, S. L., Kumar, S. S. and Tschofenig, H. (2014) Securing the Internet of Things: a standardization perspective. IEEE Internet of Things Journal, 1(3), pp. 265-275. (doi:10.1109/JIOT.2014.2323395)

Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S. and Wehrle, K. (2011) Security challenges in the IP-based internet of things. Wireless Personal Communications, 61(3), pp. 527-542. (doi:10.1007/s11277-011-0385-5)

Keoh, S.L. (2011) Marlin: toward seamless content sharing and rights management. IEEE Communications Magazine, 49(11), pp. 174-180. (doi:10.1109/MCOM.2011.6069726)

Zhu, Y., Keoh, S.L., Sloman, M. and Lupu, E. (2009) A lightweight policy system for body sensor networks. IEEE Transactions on Network and Service Management, 6(3), pp. 137-148. (doi:10.1109/TNSM.2009.03.090301)

Lupu, E., Dulay, N., Sloman, M., Sventek, J., Heeps, S., Strowes, S., Twidle, K., Keoh, S.L. and Schaeffer-Filho, A. (2008) AMUSE: autonomic management of ubiquitous e-health systems. Concurrency and Computation: Practice and Experience, 20(3), pp. 277-295. (doi:10.1002/cpe.1194)

Books

Keoh, S.L. (2010) A Policy-Based Security Framework for Ad-Hoc Networks: Secure Formation, Evolution and Management. VDM Verlag Dr. Müller. ISBN 9783639272666

Book Sections

Ko, H., Keoh, S. L. and Jin, J. (2016) Privacy protection for cloud-based robotic networks. In: Houbing, S., Fink, G. A., Rosner, G. L. and Jeschke, S. (eds.) Security and Privacy in Cyber-Physical Systems: Foundations and Applications. Wiley. (In Press)

Research Reports or Papers

Strowes, S.D., Dulay, N., Heeps, S., Keoh, S.L., Lupu, E., Schaeffer-Filho, A.E., Sloman, M. and Sventek, J.S. (2007) Wide-area SMC interaction, implementation and emulation. Technical Report. Dept of Computing Science, University of Glasgow, Glasgow, UK.

Conference Proceedings

Ko, H., Jin, J. and Keoh, S. L. (2017) ViotSOC: Controlling Access to Dynamically Virtualized IoT Services using Service Object Capability. In: 3rd ACM Cyber-Physical System Security Workshop (CPSS), Abu Dhabi, UAE, 02 Apr 2017, pp. 69-80. ISBN 9781450349567 (doi:10.1145/3055186.3055194)

Sim, L. J. H., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2017) A Cloud Authentication Protocol using One-Time Pad. In: IEEE Technologies for Smart Nation (TENCON), Marina Bay Sands, Singapore, 22-25 Nov 2016, pp. 2513-2516. ISBN 9781509025978 (doi:10.1109/TENCON.2016.7848486)

Yin, X. and Keoh, S. L. (2017) Personalized Ambience: An Integration of Learning Model and Intelligent Lighting Control. In: IEEE World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12-14 Dec 2016, pp. 666-671. ISBN 9781509041305 (doi:10.1109/WF-IoT.2016.7845398)

Lim, W. L. H., Lum, J. T. W., Yeo, I. J. W. and Keoh, S. L. (2016) A Crowd-Assisted Real-time Public Transport Information Service: No More Endless Wait. In: First International Workshop on Context-Aware Smart Cities and Intelligent Transport Systems, Sydney, Australia, 14-18 Mar 2016, pp. 1-6. ISBN 9781509019410 (doi:10.1109/PERCOMW.2016.7457088)

Keoh, S. L., Ang, Y. H. and Tang, Z. (2015) A Lightweight Privacy-Preserved Spatial and Temporal Aggregation of Energy Data. In: IEEE 11th International Conference on Information Assurance and Security (IAS), Marrakech, Morocco, 14-16 Dec 2015,

Keoh, S. L., Au, K. W. K. and Tang, Z. (2015) Securing Industrial Control System: An End-to-End Integrity Verification Approach. In: Industrial Control System Security (ICSS) Workshop in conjunction with 31st Annual Computer Security Applications Conference (ACSAC), Los Angeles, CA, USA, 8 Dec 2015,

Chuan, W. B., Ren, S. Q., Keoh, S. L. and Aung, K. M. M. (2015) Flexible Yet Secure De-Duplication Service for Enterprise Data on Cloud Storage. In: International Conference on Cloud Computing Research and Innovation (ICCCRI), Singapore, Asia, 26-27 Oct 2015,

Keoh, S. L. and Tang, Z. (2014) Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. In: IEEE 10th International Conference on Information Assurrance and Security (IAS), Okinawa, Japan, 27 - 29 Nov 2014,

Soni, A., Keoh, S.L., Kumar, S.S. and Garcia-Morchon, O. (2013) HADA: hybrid access decision architecture for building automation and control systems. In: 1st International Symposium for ICS & SCADA Cyber Security, Leicester, UK, 16-17 Sep 2013,

Garcia-Morchon, O., Keoh, S.L., Kumar, S., Moreno-Sanchez, P., Vidal-Meca, F. and Ziegeldorf, J.H. (2013) Securing the IP-based internet of things with HIP and DTLS. In: 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Budapest, Hungary, 17 Apr 2013, pp. 119-124. (doi:10.1145/2462096.2462117)

Meca, F.V., Ziegeldorf, J.H., Sanchez, P.M., Morchon, O.G., Kumar, S.S. and Keoh, S.L. (2013) HIP security architecture for the IP-based internet of things. In: 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Barcelona, Spain, 25-28 Mar 2013, pp. 1331-1336. (doi:10.1109/WAINA.2013.158)

Brachmann, M., Keoh, S.L., Morchon, O.G. and Kumar, S.S. (2012) End-to-end transport security in the IP-based internet of things. In: 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 Jul - 2 Aug 2012, pp. 1-5. (doi:10.1109/ICCCN.2012.6289292)

Keoh, S.L. (2011) Efficient group key management and authentication for body sensor networks. In: IEEE International Conference on Communications (ICC), Kyoto, Japan, 5 - 9 Jun 2011, pp. 1-6. (doi:10.1109/icc.2011.5962805)

Keoh, S.L., Asim, M., Kumar, S.S. and Lenoir, P. (2011) Secure spontaneous emergency access to personal health record. In: 3rd International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI/SPMU), San Francisco, CA, USA, 12 Jun 2011,

Keoh, S.L., Lupu, E. and Sloman, M. (2009) Securing body sensor networks: sensor association and key management. In: IEEE International Conference on Pervasive Computing and Communications, Galveston, TX, USA, 9-13 Mar 2009, pp. 1-6. (doi:10.1109/PERCOM.2009.4912756)

Keoh, S.L. and Vrielink, K. (2009) An implementation experience of domain management in marlin. In: Nineth ACM Workshop on Digital Rights Management, Chicago, IL, USA, 9 Nov 2009, pp. 29-38. (doi:10.1145/1655048.1655054)

Zhu, Y., Sloman, M., Lupu, E. and Keoh, S.L. (2009) Vesta: a secure and autonomic system for pervasive healthcare. In: 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009. PervasiveHealth 2009., London, UK, 1-3 Apr 2009, (doi:10.4108/ICST.PERVASIVEHEALTH2009.5939)

Schaeffer-Filho, A., Lupu, E., Sloman, M., Keoh, S.L., Lobo, J. and Calo, S. (2008) A role-based infrastructure for the management of dynamic communities. In: Second International Conference on Autonomous Infrastructure, Management and Security (AIMS), Bremen, Germany, 1-3 Jul 2008, pp. 1-14. (doi:10.1007/978-3-540-70587-1_1)

Yanmin, Z., Keoh, S.L., Sloman, M., Lupu, E., Yu, Z., Dulay, N. and Pryce, N. (2008) Finger: an efficient policy system for body sensor networks. In: 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Atlanta, GA, USA, 29 Sep - 2 Oct 2008, pp. 428-433. (doi:10.1109/MAHSS.2008.4660033)

Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) An efficient policy system for body sensor networks. In: 14th IEEE International Conference on Parallel and Distributed Systems, 2008. ICPADS '08., Melbourne, Australia, 8-10 Dec 2008, pp. 383-390. (doi:10.1109/ICPADS.2008.52)

Zhu, Y., Keoh, S.L., Sloman, M., Lupu, E., Dulay, N. and Pryce, N. (2008) A policy system to support adaptability and security on body sensors. In: 5th International Workshop on Wearable and Implantable Body Sensor Networks (BSN), Hong Kong, China, 1-3 Jun 2008, pp. 37-40. (doi:10.1109/ISSMDBS.2008.4575010)

Keoh, S.L., Dulay, N., Lupu, E., Twidle, K., Schaeffer-Filho, A.E., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Self-managed cell: a middleware for managing body-sensor networks. In: MobiQuitous 2007: 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Philadelphia, PA, USA, 6-10 Aug 2007, pp. 1-5. (doi:10.1109/MOBIQ.2007.4451009)

Keoh, S.L. et al. (2007) Policy-based management of body-sensor networks. In: 4th International Workshop on Wearable and Implantable Body Sensor Networks (BSN 2007), Aachen, Germany, 26-28 March 2007, pp. 92-98.

Schaeffer-Filho, A., Lupu, E., Dulay, N., Keoh, S.L., Twidle, K., Sloman, M., Heeps, S., Strowes, S. and Sventek, J. (2007) Towards supporting interactions between self-managed cells. In: SASO'07: First International Conference on Self-Adaptive and Self-Organizing Systems, Cambridge, MA, USA, 9-11 Jul 2007, pp. 224-236. (doi:10.1109/SASO.2007.64)

Keoh, S.L. and Lupu, E. (2005) An efficient access control model for mobile ad-hoc communities. In: Second International Conference on Security in Pervasive Computing, Boppard, Germany, 5-8 April 2005, pp. 210-224. (doi:10.1007/978-3-540-32004-3_21)

Keoh, S.L., Lupu, E. and Sloman, M. (2004) PEACE: a policy-based establishment of ad-hoc communities. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, USA, 6-10 Dec, 2004, pp. 386-395. (doi:10.1109/CSAC.2004.26)

Keoh, S.L. and Lupu, E. (2004) Peer trust in mobile ad-hoc communities. In: 11th HP-OVUA Annual Planetary Workshop, Paris, France, 20-23 Jun 2004,

Keoh, S.L. and Lupu, E. (2002) Towards flexible credential verification in mobile ad-hoc networks. In: 2nd ACM International Workshop on Principles of Mobile Computing (POMC), Toulouse, France, 30-31 Oct, 2002, pp. 58-65. (doi:10.1145/584490.584503)

Patents

Koninklijke Philips N.V. (2013) Methods, Devices and Systems for Establishing End-To-End Secure Connections and for Securely Communicating Data Packets. .

Koninklijke Philips N.V. (2013) System and Method for Access Decision Evaluation for Building Automation and Control Systems. .

Koninklijke Philips Electronics N.V. (2012) Secure Access to Personal Health Records in Emergency Situations. .

Koninklijke Philips N.V. (2012) Resource Metering System and Method Using Such a System for Smart Energy Consumption. .

This list was generated on Wed Aug 16 01:46:09 2017 BST.