Jump to content

Bill Buchanan (computer scientist): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Citation bot (talk | contribs)
Alter: title, url, template type, doi. URLs might have been anonymized. Add: doi, bibcode, arxiv, pmc, pmid, isbn, doi-access, s2cid, chapter-url, chapter, authors 1-1. Removed or converted URL. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Headbomb | Linked from Wikipedia:WikiProject_Academic_Journals/Journals_cited_by_Wikipedia/Sandbox3 | #UCB_webform_linked 228/2306
Line 66: Line 66:
* Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., ... & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. ''Entropy'', ''24''(10), 1379.<ref>{{Cite journal |last1=Ali |first1=Hisham |last2=Ahmad |first2=Jawad |last3=Jaroucheh |first3=Zakwan |last4=Papadopoulos |first4=Pavlos |last5=Pitropakis |first5=Nikolaos |last6=Lo |first6=Owen |last7=Abramson |first7=Will |last8=Buchanan |first8=William J. |date=October 2022 |title=Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform |journal=Entropy |language=en |volume=24 |issue=10 |pages=1379 |doi=10.3390/e24101379 |pmid=37420400 |pmc=9601302 |bibcode=2022Entrp..24.1379A |issn=1099-4300 |doi-access=free }}</ref>
* Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., ... & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. ''Entropy'', ''24''(10), 1379.<ref>{{Cite journal |last1=Ali |first1=Hisham |last2=Ahmad |first2=Jawad |last3=Jaroucheh |first3=Zakwan |last4=Papadopoulos |first4=Pavlos |last5=Pitropakis |first5=Nikolaos |last6=Lo |first6=Owen |last7=Abramson |first7=Will |last8=Buchanan |first8=William J. |date=October 2022 |title=Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform |journal=Entropy |language=en |volume=24 |issue=10 |pages=1379 |doi=10.3390/e24101379 |pmid=37420400 |pmc=9601302 |bibcode=2022Entrp..24.1379A |issn=1099-4300 |doi-access=free }}</ref>
* Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In ''2021 14th International Conference on Security of Information and Networks (SIN)'' (Vol. 1, pp.&nbsp;1–8). IEEE.<ref>{{Cite book |last1=Abubakar |first1=Mwrwan |last2=McCarron |first2=Pádraig |last3=Jaroucheh |first3=Zakwan |last4=Al Dubai |first4=Ahmed |last5=Buchanan |first5=Bill |title=2021 14th International Conference on Security of Information and Networks (SIN) |chapter=Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates |date=December 2021 |url=https://ieeexplore.ieee.org/document/9699221 |volume=1 |pages=1–8 |doi=10.1109/SIN54109.2021.9699221|arxiv=2112.10124 |isbn=978-1-7281-9266-6 |s2cid=245334671 }}</ref>
* Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In ''2021 14th International Conference on Security of Information and Networks (SIN)'' (Vol. 1, pp.&nbsp;1–8). IEEE.<ref>{{Cite book |last1=Abubakar |first1=Mwrwan |last2=McCarron |first2=Pádraig |last3=Jaroucheh |first3=Zakwan |last4=Al Dubai |first4=Ahmed |last5=Buchanan |first5=Bill |title=2021 14th International Conference on Security of Information and Networks (SIN) |chapter=Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates |date=December 2021 |url=https://ieeexplore.ieee.org/document/9699221 |volume=1 |pages=1–8 |doi=10.1109/SIN54109.2021.9699221|arxiv=2112.10124 |isbn=978-1-7281-9266-6 |s2cid=245334671 }}</ref>
* Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2021, December). A privacy-preserving distributed platform for COVID-19 vaccine passports. In ''Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion'' (pp.&nbsp;1–6).<ref name="doi.org">{{Cite journal |last1=Barati |first1=Masoud |last2=Buchanan |first2=William J. |last3=Lo |first3=Owen |last4=Rana |first4=Omer |date=2022-02-07 |title=A privacy-preserving distributed platform for COVID-19 vaccine passports |url=https://doi.org/10.1145/3492323.3495626 |journal=Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion |series=UCC '21 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/3492323.3495626 |isbn=978-1-4503-9163-4|s2cid=246635492 }}</ref>
* Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2021, December). A privacy-preserving distributed platform for COVID-19 vaccine passports. In ''Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion'' (pp.&nbsp;1–6).<ref name="doi.org">{{Cite book |last1=Barati |first1=Masoud |last2=Buchanan |first2=William J. |last3=Lo |first3=Owen |last4=Rana |first4=Omer |title=Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion |chapter=A privacy-preserving distributed platform for COVID-19 vaccine passports |date=2022-02-07 |chapter-url=https://doi.org/10.1145/3492323.3495626 |series=UCC '21 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/3492323.3495626 |isbn=978-1-4503-9163-4|s2cid=246635492 |url=https://napier-surface.worktribe.com/file/2826429/1/A%20Privacy-Preserving%20Platform%20For%20Recording%20COVID-19%20Vaccine%20Passports%20%28accepted%20version%29 }}</ref>
* Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-preserving passive dns. ''Computers'', ''9''(3), 64.<ref>{{Cite journal |last1=Papadopoulos |first1=Pavlos |last2=Pitropakis |first2=Nikolaos |last3=Buchanan |first3=William J. |last4=Lo |first4=Owen |last5=Katsikas |first5=Sokratis |date=September 2020 |title=Privacy-Preserving Passive DNS |journal=Computers |language=en |volume=9 |issue=3 |pages=64 |doi=10.3390/computers9030064 |issn=2073-431X |doi-access=free }}</ref>
* Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-preserving passive dns. ''Computers'', ''9''(3), 64.<ref>{{Cite journal |last1=Papadopoulos |first1=Pavlos |last2=Pitropakis |first2=Nikolaos |last3=Buchanan |first3=William J. |last4=Lo |first4=Owen |last5=Katsikas |first5=Sokratis |date=September 2020 |title=Privacy-Preserving Passive DNS |journal=Computers |language=en |volume=9 |issue=3 |pages=64 |doi=10.3390/computers9030064 |issn=2073-431X |doi-access=free }}</ref>
* Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020, July). TRUSTD: Combat fake content using blockchain and collective signature technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (pp.&nbsp;1235–1240). IEEE.<ref>{{Cite book |last1=Jaroucheh |first1=Zakwan |last2=Alissa |first2=Mohamad |last3=Buchanan |first3=William J |last4=Liu |first4=Xiaodong |title=2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) |chapter=TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies |date=July 2020 |chapter-url=https://ieeexplore.ieee.org/document/9202590 |pages=1235–1240 |doi=10.1109/COMPSAC48688.2020.00-87|isbn=978-1-7281-7303-0 |url=https://napier-surface.worktribe.com/2685662/1/TRUSTD%3A%20Combat%20Fake%20Content%20Using%20Blockchain%20And%20Collective%20Signature%20Technologies%20%28accepted%20version%29 }}</ref>
* Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020, July). TRUSTD: Combat fake content using blockchain and collective signature technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (pp.&nbsp;1235–1240). IEEE.<ref>{{Cite book |last1=Jaroucheh |first1=Zakwan |last2=Alissa |first2=Mohamad |last3=Buchanan |first3=William J |last4=Liu |first4=Xiaodong |title=2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) |chapter=TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies |date=July 2020 |chapter-url=https://ieeexplore.ieee.org/document/9202590 |pages=1235–1240 |doi=10.1109/COMPSAC48688.2020.00-87|isbn=978-1-7281-7303-0 |url=https://napier-surface.worktribe.com/2685662/1/TRUSTD%3A%20Combat%20Fake%20Content%20Using%20Blockchain%20And%20Collective%20Signature%20Technologies%20%28accepted%20version%29 }}</ref>
Line 76: Line 76:
In April 2020, Chaloner Chute<ref>{{Cite web |title=Chaloner Chute |url=https://www.dhi-scotland.comhttps//www.dhi-scotland.com/our-team/team/chaloner-chute |access-date=2023-08-06 |website=www.dhi-scotland.comhttps |language=en}}</ref> at the DHI defined a research brief for a team of experts from Edinburgh Napier University (Buchanan), the University of Glasgow (Professor Muhammad Imran<ref>{{Cite web |title=Muhammad Imran |url=https://ieeexplore.ieee.org/author/37265529100 |access-date=2023-08-06 |website=ieeexplore.ieee.org}}</ref> and Professor Jill Pell<ref>{{Cite web |title=Professor Jill Pell |url=https://www.ukri.org/people/professor-jill-pell/ |access-date=2023-08-06 |website=www.ukri.org |language=en-US}}</ref>), the University of Edinburgh (Dr Claudia Pagliari<ref>{{Cite web |date=2023-02-01 |title=Claudia Pagliari |url=https://www.ed.ac.uk/profile/claudia-pagliari |access-date=2023-08-06 |website=The University of Edinburgh |language=en}}</ref>) and University of Strathclyde (Dr Sanna Rimpiläinen<ref>{{Cite web |title=Sanna Rimpilainen |url=https://pureportal.strath.ac.uk/en/persons/sanna-rimpilainen |access-date=2023-08-06 |website=University of Strathclyde |language=en-GB}}</ref>). This brief involved a review the usage of contact tracing applications. Buchanan focused on answering the question, "How might the distributed system be architected to be secure and respectful of privacy from the outset?". Overall, each of the experts then reviewed key areas around the usage of contract tracing, and submitted a compiled report answering the key questions:
In April 2020, Chaloner Chute<ref>{{Cite web |title=Chaloner Chute |url=https://www.dhi-scotland.comhttps//www.dhi-scotland.com/our-team/team/chaloner-chute |access-date=2023-08-06 |website=www.dhi-scotland.comhttps |language=en}}</ref> at the DHI defined a research brief for a team of experts from Edinburgh Napier University (Buchanan), the University of Glasgow (Professor Muhammad Imran<ref>{{Cite web |title=Muhammad Imran |url=https://ieeexplore.ieee.org/author/37265529100 |access-date=2023-08-06 |website=ieeexplore.ieee.org}}</ref> and Professor Jill Pell<ref>{{Cite web |title=Professor Jill Pell |url=https://www.ukri.org/people/professor-jill-pell/ |access-date=2023-08-06 |website=www.ukri.org |language=en-US}}</ref>), the University of Edinburgh (Dr Claudia Pagliari<ref>{{Cite web |date=2023-02-01 |title=Claudia Pagliari |url=https://www.ed.ac.uk/profile/claudia-pagliari |access-date=2023-08-06 |website=The University of Edinburgh |language=en}}</ref>) and University of Strathclyde (Dr Sanna Rimpiläinen<ref>{{Cite web |title=Sanna Rimpilainen |url=https://pureportal.strath.ac.uk/en/persons/sanna-rimpilainen |access-date=2023-08-06 |website=University of Strathclyde |language=en-GB}}</ref>). This brief involved a review the usage of contact tracing applications. Buchanan focused on answering the question, "How might the distributed system be architected to be secure and respectful of privacy from the outset?". Overall, each of the experts then reviewed key areas around the usage of contract tracing, and submitted a compiled report answering the key questions:


* Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020). Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow: Digital Health and Care Institute, University of Strathclyde.<ref>{{Cite report |url=https://doi.org/10.17868/73197 |title=Use of Participatory Apps in Contact Tracing – Options and Implications for Public Health, Privacy and Trust |last=Buchanan |first=William |last2=Imran |first2=Muhammad |date=2020-07-14 |publisher=University of Strathclyde |location=Glasgow |language=en |last3=Pagliari |first3=Claudia |last4=Pell |first4=Jill |last5=Rimpiläinen |first5=Sanna}}</ref>
* Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020). Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow: Digital Health and Care Institute, University of Strathclyde.<ref>{{Cite report |url=https://doi.org/10.17868/73197 |title=Use of Participatory Apps in Contact Tracing – Options and Implications for Public Health, Privacy and Trust |last1=Buchanan |first1=William |last2=Imran |first2=Muhammad |date=2020-07-14 |publisher=University of Strathclyde |location=Glasgow |language=en |last3=Pagliari |first3=Claudia |last4=Pell |first4=Jill |last5=Rimpiläinen |first5=Sanna|doi=10.17868/73197 }}</ref>


Buchanan also applied his applied cryptography knowledge to areas of COVID-19 track and trace methods. This included collaborated work with the University of Glasgow on a blockchain-based methods named BeepTrace.<ref>{{Cite journal |last=Xu |first=Hao |last2=Zhang |first2=Lei |last3=Onireti |first3=Oluwakayode |last4=Fang |first4=Yang |last5=Buchanan |first5=William J. |last6=Imran |first6=Muhammad Ali |date=March 2021 |title=BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond |url=https://ieeexplore.ieee.org/abstract/document/9203904 |journal=IEEE Internet of Things Journal |volume=8 |issue=5 |pages=3915–3929 |doi=10.1109/JIOT.2020.3025953 |issn=2327-4662}}</ref> Buchanan also worked with teams on privacy-aware COVID-19 passwords using the Ethereum platform<ref>{{Cite journal |last=Barati |first=Masoud |last2=Buchanan |first2=William J. |last3=Lo |first3=Owen |last4=Rana |first4=Omer |date=2022-02-07 |title=A privacy-preserving distributed platform for COVID-19 vaccine passports |url=https://doi.org/10.1145/3492323.3495626 |journal=Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion |series=UCC '21 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/3492323.3495626 |isbn=978-1-4503-9163-4}}</ref>, reviewed the state-of-the-art in privacy-aware applications for track and trace,<ref>{{Cite journal |last=Buchanan |first=William J. |last2=Imran |first2=Muhammad Ali |last3=Ur-Rehman |first3=Masood |last4=Zhang |first4=Lei |last5=Abbasi |first5=Qammer H. |last6=Chrysoulas |first6=Christos |last7=Haynes |first7=David |last8=Pitropakis |first8=Nikolaos |last9=Papadopoulos |first9=Pavlos |date=2020 |title=Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing |url=https://www.frontiersin.org/articles/10.3389/frcmn.2020.583376 |journal=Frontiers in Communications and Networks |volume=1 |doi=10.3389/frcmn.2020.583376/full |issn=2673-530X}}</ref> and implemented privacy aware identity matching.<ref>{{Cite journal |last=Abramson |first=Will |last2=Buchanan |first2=William J. |last3=Sayeed |first3=Sarwar |last4=Pitropakis |first4=Nikolaos |last5=Lo |first5=Owen |date=December 2021 |title=PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching |url=https://ieeexplore.ieee.org/abstract/document/9699138 |journal=2021 14th International Conference on Security of Information and Networks (SIN) |volume=1 |pages=1–8 |doi=10.1109/SIN54109.2021.9699138}}</ref>
Buchanan also applied his applied cryptography knowledge to areas of COVID-19 track and trace methods. This included collaborated work with the University of Glasgow on a blockchain-based methods named BeepTrace.<ref>{{Cite journal |last1=Xu |first1=Hao |last2=Zhang |first2=Lei |last3=Onireti |first3=Oluwakayode |last4=Fang |first4=Yang |last5=Buchanan |first5=William J. |last6=Imran |first6=Muhammad Ali |date=March 2021 |title=BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond |url=https://ieeexplore.ieee.org/document/9203904 |journal=IEEE Internet of Things Journal |volume=8 |issue=5 |pages=3915–3929 |doi=10.1109/JIOT.2020.3025953 |s2cid=218718736 |issn=2327-4662}}</ref> Buchanan also worked with teams on privacy-aware COVID-19 passwords using the Ethereum platform<ref>{{Cite book |last1=Barati |first1=Masoud |last2=Buchanan |first2=William J. |last3=Lo |first3=Owen |last4=Rana |first4=Omer |title=Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion |chapter=A privacy-preserving distributed platform for COVID-19 vaccine passports |date=2022-02-07 |chapter-url=https://doi.org/10.1145/3492323.3495626 |series=UCC '21 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/3492323.3495626 |isbn=978-1-4503-9163-4|s2cid=246635492 |url=https://napier-surface.worktribe.com/file/2826429/1/A%20Privacy-Preserving%20Platform%20For%20Recording%20COVID-19%20Vaccine%20Passports%20%28accepted%20version%29 }}</ref>, reviewed the state-of-the-art in privacy-aware applications for track and trace,<ref>{{Cite journal |last1=Buchanan |first1=William J. |last2=Imran |first2=Muhammad Ali |last3=Ur-Rehman |first3=Masood |last4=Zhang |first4=Lei |last5=Abbasi |first5=Qammer H. |last6=Chrysoulas |first6=Christos |last7=Haynes |first7=David |last8=Pitropakis |first8=Nikolaos |last9=Papadopoulos |first9=Pavlos |date=2020 |title=Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing |journal=Frontiers in Communications and Networks |volume=1 |doi=10.3389/frcmn.2020.583376 |issn=2673-530X |doi-access=free }}</ref> and implemented privacy aware identity matching.<ref>{{Cite journal |last1=Abramson |first1=Will |last2=Buchanan |first2=William J. |last3=Sayeed |first3=Sarwar |last4=Pitropakis |first4=Nikolaos |last5=Lo |first5=Owen |date=December 2021 |title=PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching |url=https://ieeexplore.ieee.org/document/9699138 |journal=2021 14th International Conference on Security of Information and Networks (SIN) |volume=1 |pages=1–8 |doi=10.1109/SIN54109.2021.9699138|isbn=978-1-7281-9266-6 |s2cid=244908584 }}</ref>


Related outputs include:
Related outputs include:
Line 114: Line 114:


=== DACAR (Data Capture and Auto Identification Reference) ===
=== DACAR (Data Capture and Auto Identification Reference) ===
Buchanan was the Principal Investigator (PI) for the Edinburgh Napier University work within the EPSRC/TSB (Technology Strategy Board)-funded DACAR project, and which focused on citizen rights to share data within heath care.<ref>{{Cite web |title=Data Capture and Auto Identification Reference |url=https://napier-repository.worktribe.com/project/69584/data-capture-and-auto-identification-reference |access-date=2023-08-04 |website=napier-repository.worktribe.com}}</ref> It ran from November 2009 until November 2011 and involved a collaboration between CipherLab, Chelsea and Westminster Hospital,<ref>{{Cite web |title=Homepage |url=https://www.chelwest.nhs.uk/ |access-date=2023-08-04 |website=Chelsea and Westminster Hospital NHS Foundation Trust |language=en-gb}}</ref> GS1 UK,<ref>{{Cite web |title=GS1 UK {{!}} The Global Language of Business |url=https://www.gs1uk.org/ |access-date=2023-08-04 |website=www.gs1uk.org}}</ref> Imperial College London, and Kodit. A core contribution of the project was the creation of the SPoC<ref>{{Cite journal |last=Fan |first=L. |last2=Buchanan |first2=W. |last3=Thummler |first3=C. |last4=Lo |first4=O. |last5=Khedim |first5=A. |last6=Uthmani |first6=O. |last7=Lawson |first7=A. |last8=Bell |first8=D. |date=July 2011 |title=DACAR Platform for eHealth Services Cloud |url=https://ieeexplore.ieee.org/abstract/document/6008713 |journal=2011 IEEE 4th International Conference on Cloud Computing |pages=219–226 |doi=10.1109/CLOUD.2011.31}}</ref> (Single Point of Contact) approach to information sharing, and the integration of identity, role and access rights to every part of the capture, storage and consumption of health care data. Its integration within Chelsea and Westminster Hospital was led by Professor Derek Bell.<ref>{{Cite web |title=Home - Emeritus Professor Derek Bell |url=https://www.imperial.ac.uk/people/d.bell |access-date=2023-08-04 |website=www.imperial.ac.uk}}</ref>
Buchanan was the Principal Investigator (PI) for the Edinburgh Napier University work within the EPSRC/TSB (Technology Strategy Board)-funded DACAR project, and which focused on citizen rights to share data within heath care.<ref>{{Cite web |title=Data Capture and Auto Identification Reference |url=https://napier-repository.worktribe.com/project/69584/data-capture-and-auto-identification-reference |access-date=2023-08-04 |website=napier-repository.worktribe.com}}</ref> It ran from November 2009 until November 2011 and involved a collaboration between CipherLab, Chelsea and Westminster Hospital,<ref>{{Cite web |title=Homepage |url=https://www.chelwest.nhs.uk/ |access-date=2023-08-04 |website=Chelsea and Westminster Hospital NHS Foundation Trust |language=en-gb}}</ref> GS1 UK,<ref>{{Cite web |title=GS1 UK {{!}} The Global Language of Business |url=https://www.gs1uk.org/ |access-date=2023-08-04 |website=www.gs1uk.org}}</ref> Imperial College London, and Kodit. A core contribution of the project was the creation of the SPoC<ref>{{Cite journal |last1=Fan |first1=L. |last2=Buchanan |first2=W. |last3=Thummler |first3=C. |last4=Lo |first4=O. |last5=Khedim |first5=A. |last6=Uthmani |first6=O. |last7=Lawson |first7=A. |last8=Bell |first8=D. |date=July 2011 |title=DACAR Platform for eHealth Services Cloud |url=https://ieeexplore.ieee.org/document/6008713 |journal=2011 IEEE 4th International Conference on Cloud Computing |pages=219–226 |doi=10.1109/CLOUD.2011.31|isbn=978-1-4577-0836-7 |s2cid=14062712 }}</ref> (Single Point of Contact) approach to information sharing, and the integration of identity, role and access rights to every part of the capture, storage and consumption of health care data. Its integration within Chelsea and Westminster Hospital was led by Professor Derek Bell.<ref>{{Cite web |title=Home - Emeritus Professor Derek Bell |url=https://www.imperial.ac.uk/people/d.bell |access-date=2023-08-04 |website=www.imperial.ac.uk}}</ref>


The project was the first time that Buchanan formally worked with Professor Christoph Thummler,<ref>{{Cite web |title=Christoph Thuemmler |url=https://scholar.google.com/citations?user=CnpaaUUAAAAJ |access-date=2023-08-04 |website=scholar.google.com}}</ref> and who, at the time, had a post as a clinician at the Royal Infirmary of Edinburgh and at Edinburgh Napier University.<ref>{{Cite web |title=Prof Christoph Thuemmler |url=https://napier-repository.worktribe.com/person/110758/christoph-thuemmler |access-date=2023-08-04 |website=napier-repository.worktribe.com}}</ref> The core research team also involved Dr Owen Lo and Dr Lu Fan.<ref>{{Cite web |title=Lu Fan |url=https://scholar.google.com/citations?hl=en&user=N7U--o4AAAAJ |access-date=2023-08-04 |website=scholar.google.com}}</ref> The integration of GS1 UK allowed the integration of emerging RFID (Radio Frequency Identification) standards<ref>{{Cite journal |last=Thuemmler |first=Christoph |last2=Buchanan |first2=William |last3=Fekri |first3=Amir Hesam |last4=Lawson |first4=Alistair |date=2009 |title=Radio frequency identification (RFID) in pervasive healthcare |url=http://www.inderscience.com/link.php?id=23731 |journal=International Journal of Healthcare Technology and Management |language=en |volume=10 |issue=1/2 |pages=119 |doi=10.1504/IJHTM.2009.023731 |issn=1368-2156}}</ref><ref>{{Cite journal |last=Thuemmler |first=C. |last2=Buchanan |first2=W. |last3=Kumar |first3=V. |date=2007 |title=Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology |url=http://www.inderscience.com/link.php?id=13524 |journal=International Journal of Healthcare Technology and Management |language=en |volume=8 |issue=5 |pages=571 |doi=10.1504/IJHTM.2007.013524 |issn=1368-2156}}</ref> into the identification of medical artifacts, including tracking beds and medical equipment around the hospital.
The project was the first time that Buchanan formally worked with Professor Christoph Thummler,<ref>{{Cite web |title=Christoph Thuemmler |url=https://scholar.google.com/citations?user=CnpaaUUAAAAJ |access-date=2023-08-04 |website=scholar.google.com}}</ref> and who, at the time, had a post as a clinician at the Royal Infirmary of Edinburgh and at Edinburgh Napier University.<ref>{{Cite web |title=Prof Christoph Thuemmler |url=https://napier-repository.worktribe.com/person/110758/christoph-thuemmler |access-date=2023-08-04 |website=napier-repository.worktribe.com}}</ref> The core research team also involved Dr Owen Lo and Dr Lu Fan.<ref>{{Cite web |title=Lu Fan |url=https://scholar.google.com/citations?hl=en&user=N7U--o4AAAAJ |access-date=2023-08-04 |website=scholar.google.com}}</ref> The integration of GS1 UK allowed the integration of emerging RFID (Radio Frequency Identification) standards<ref>{{Cite journal |last1=Thuemmler |first1=Christoph |last2=Buchanan |first2=William |last3=Fekri |first3=Amir Hesam |last4=Lawson |first4=Alistair |date=2009 |title=Radio frequency identification (RFID) in pervasive healthcare |url=http://www.inderscience.com/link.php?id=23731 |journal=International Journal of Healthcare Technology and Management |language=en |volume=10 |issue=1/2 |pages=119 |doi=10.1504/IJHTM.2009.023731 |issn=1368-2156}}</ref><ref>{{Cite journal |last1=Thuemmler |first1=C. |last2=Buchanan |first2=W. |last3=Kumar |first3=V. |date=2007 |title=Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology |url=http://www.inderscience.com/link.php?id=13524 |journal=International Journal of Healthcare Technology and Management |language=en |volume=8 |issue=5 |pages=571 |doi=10.1504/IJHTM.2007.013524 |issn=1368-2156}}</ref> into the identification of medical artifacts, including tracking beds and medical equipment around the hospital.


After this project, Dr Owen Lo continued to work with Buchanan on a number of research projects, and was a co-inventor within the Cyan Forensics spin-out company<ref>{{Cite web |title=Owen Lo |url=https://www.napier.ac.uk/people/owen-lo/ |access-date=2023-08-04 |website=Napier |language=English}}</ref> and which changed its name to Cyacomb.<ref>{{Cite web |last=updates |date=2022-03-02 |title=Cyan Forensics changes its name to Cyacomb |url=https://www.scotlandis.com/blog/cyan-forensics-changes-its-name-to-cyacomb/ |access-date=2023-08-04 |website=ScotlandIS |language=en-GB}}</ref>
After this project, Dr Owen Lo continued to work with Buchanan on a number of research projects, and was a co-inventor within the Cyan Forensics spin-out company<ref>{{Cite web |title=Owen Lo |url=https://www.napier.ac.uk/people/owen-lo/ |access-date=2023-08-04 |website=Napier |language=English}}</ref> and which changed its name to Cyacomb.<ref>{{Cite web |last=updates |date=2022-03-02 |title=Cyan Forensics changes its name to Cyacomb |url=https://www.scotlandis.com/blog/cyan-forensics-changes-its-name-to-cyacomb/ |access-date=2023-08-04 |website=ScotlandIS |language=en-GB}}</ref>


=== Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures ===
=== Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures ===
From March 2011 to July 2013, Buchanan continued to partner with Professor Christoph Thummler, Dr Owen Lo and Dr Lu Fan, and was the Principal Investigator (PI) on the ESPRC-funded, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures"<ref>{{Cite web |title=scalable and open framework for humandigital trust between informalformal personal |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/scalable-and-open-framework-for-humandigital-trust-between-informalformal-personal/ |access-date=2023-08-04 |website=Napier |language=English}}</ref> project. This extended the work from the DACAR project but focused on assisted living, and involved a collaboration with Microsoft and HoIP (Health Over IP). While DACAR had focused on the sharing of health care information around hospitial data, this project extented the core concepts to create a novel governance policy infrastructure using a circle-of-trust relationship for assisted living. This linked to formal, role-based security for primary and secondary health care. New work also included the integration of the SPoC approach with the Microsoft Health Vault.<ref>{{Cite journal |last=Ekonomou |first=E. |last2=Fan |first2=L. |last3=Buchanan |first3=W. |last4=Thuemmler |first4=C. |date=November 2011 |title=An Integrated Cloud-based Healthcare Infrastructure |url=https://ieeexplore.ieee.org/abstract/document/6133189 |journal=2011 IEEE Third International Conference on Cloud Computing Technology and Science |pages=532–536 |doi=10.1109/CloudCom.2011.80}}</ref>
From March 2011 to July 2013, Buchanan continued to partner with Professor Christoph Thummler, Dr Owen Lo and Dr Lu Fan, and was the Principal Investigator (PI) on the ESPRC-funded, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures"<ref>{{Cite web |title=scalable and open framework for humandigital trust between informalformal personal |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/scalable-and-open-framework-for-humandigital-trust-between-informalformal-personal/ |access-date=2023-08-04 |website=Napier |language=English}}</ref> project. This extended the work from the DACAR project but focused on assisted living, and involved a collaboration with Microsoft and HoIP (Health Over IP). While DACAR had focused on the sharing of health care information around hospitial data, this project extented the core concepts to create a novel governance policy infrastructure using a circle-of-trust relationship for assisted living. This linked to formal, role-based security for primary and secondary health care. New work also included the integration of the SPoC approach with the Microsoft Health Vault.<ref>{{Cite journal |last1=Ekonomou |first1=E. |last2=Fan |first2=L. |last3=Buchanan |first3=W. |last4=Thuemmler |first4=C. |date=November 2011 |title=An Integrated Cloud-based Healthcare Infrastructure |url=https://ieeexplore.ieee.org/document/6133189 |journal=2011 IEEE Third International Conference on Cloud Computing Technology and Science |pages=532–536 |doi=10.1109/CloudCom.2011.80|isbn=978-1-4673-0090-2 |s2cid=18718402 }}</ref>


At the time, the work was known as Cloud4Health,<ref>{{Citation |title=Cloud4Health - Outline |url=https://www.youtube.com/watch?v=VfGgSg-GukU |access-date=2023-08-04 |language=en}}</ref> and Buchanan gave an overview of the approach in a submission for a Scotland IS award in May 2012.<ref>{{Citation |title=Cloud4Health - Overview - Scotland IS Video Submission |url=https://www.youtube.com/watch?v=FIQBKKgXceU |access-date=2023-08-04 |language=en}}</ref> Overall, the work in this project and DACAR laid the technical foundation for the Symphonic spin-out company from Edinburgh Napier University in 2013. It also the main focuse for the 4* rated - quality that is world-leading in terms of originality, significance and rigour - impact case study for UoA 11 in REF 2021 entitled, "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods".<ref name=":2" />
At the time, the work was known as Cloud4Health,<ref>{{Citation |title=Cloud4Health - Outline |url=https://www.youtube.com/watch?v=VfGgSg-GukU |access-date=2023-08-04 |language=en}}</ref> and Buchanan gave an overview of the approach in a submission for a Scotland IS award in May 2012.<ref>{{Citation |title=Cloud4Health - Overview - Scotland IS Video Submission |url=https://www.youtube.com/watch?v=FIQBKKgXceU |access-date=2023-08-04 |language=en}}</ref> Overall, the work in this project and DACAR laid the technical foundation for the Symphonic spin-out company from Edinburgh Napier University in 2013. It also the main focuse for the 4* rated - quality that is world-leading in terms of originality, significance and rigour - impact case study for UoA 11 in REF 2021 entitled, "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods".<ref name=":2" />
Line 132: Line 132:


=== Side Channel Analysis - Noise and RF Emmission ===
=== Side Channel Analysis - Noise and RF Emmission ===
Buchanan's work with Dr Owen Lo<ref>{{Cite web |title=Owen Lo |url=https://scholar.google.com/citations?user=mRf_1hQAAAAJ |access-date=2023-08-05 |website=scholar.google.com}}</ref> and Dr Nilupulee Gunathilake<ref>{{Cite web |title=Nilupulee Gunathilake |url=https://www.napier.ac.uk/people/nilupulee-gunathilake/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> has included an analysis of side channel attacks on the cryptography running on embedded devices using electrical noise generation and radio emissions. From Jan 2017 to Jan 2017, Buchanan and Owen Lo worked with Keysight on research related to "Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis", and co-funded by The Data Lab.<ref>{{Cite web |title=Bare Metal Forensics Pattern Analysis Heuristics Data Analysis |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/bare-metal-forensics-pattern-analysis-heuristics-data-analysis/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> This resulted in a paper entitled, "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)"<ref>{{Cite journal |last=Lo |first=Owen |last2=Buchanan |first2=William J. |last3=Carson |first3=Douglas |date=2017-04-02 |title=Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) |url=https://www.tandfonline.com/doi/full/10.1080/23742917.2016.1231523 |journal=Journal of Cyber Security Technology |language=en |volume=1 |issue=2 |pages=88–107 |doi=10.1080/23742917.2016.1231523 |issn=2374-2917}}</ref> and which cracked 128-bit AES encryption on an Arduino Uno from the electrical noise generated from the device. Douglas Carson from Keysight and Lo presented the work live on 21 September 2016 at an event in Edinburgh.<ref>{{Citation |title=Practical side-channel attacks on embedded device cryptography: Dr Owen Lo and Doug Carson |url=https://www.youtube.com/watch?v=d6Hp4M39dAk |access-date=2023-08-05 |language=en}}</ref><ref>{{Cite web |date=2016-04-30 |title=International Conference on Cryptography and High Performance Computing |url=https://thecyberacademy.org/crypto |access-date=2023-08-05 |website=The Cyber Academy |language=en-US}}</ref>
Buchanan's work with Dr Owen Lo<ref>{{Cite web |title=Owen Lo |url=https://scholar.google.com/citations?user=mRf_1hQAAAAJ |access-date=2023-08-05 |website=scholar.google.com}}</ref> and Dr Nilupulee Gunathilake<ref>{{Cite web |title=Nilupulee Gunathilake |url=https://www.napier.ac.uk/people/nilupulee-gunathilake/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> has included an analysis of side channel attacks on the cryptography running on embedded devices using electrical noise generation and radio emissions. From Jan 2017 to Jan 2017, Buchanan and Owen Lo worked with Keysight on research related to "Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis", and co-funded by The Data Lab.<ref>{{Cite web |title=Bare Metal Forensics Pattern Analysis Heuristics Data Analysis |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/bare-metal-forensics-pattern-analysis-heuristics-data-analysis/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> This resulted in a paper entitled, "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)"<ref>{{Cite journal |last1=Lo |first1=Owen |last2=Buchanan |first2=William J. |last3=Carson |first3=Douglas |date=2017-04-02 |title=Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA) |url=https://www.tandfonline.com/doi/full/10.1080/23742917.2016.1231523 |journal=Journal of Cyber Security Technology |language=en |volume=1 |issue=2 |pages=88–107 |doi=10.1080/23742917.2016.1231523 |s2cid=114293257 |issn=2374-2917}}</ref> and which cracked 128-bit AES encryption on an Arduino Uno from the electrical noise generated from the device. Douglas Carson from Keysight and Lo presented the work live on 21 September 2016 at an event in Edinburgh.<ref>{{Citation |title=Practical side-channel attacks on embedded device cryptography: Dr Owen Lo and Doug Carson |url=https://www.youtube.com/watch?v=d6Hp4M39dAk |access-date=2023-08-05 |language=en}}</ref><ref>{{Cite web |date=2016-04-30 |title=International Conference on Cryptography and High Performance Computing |url=https://thecyberacademy.org/crypto |access-date=2023-08-05 |website=The Cyber Academy |language=en-US}}</ref>


Lo, Buchanan and Carson also managed to break the PRESENT block cipher on an embedded device using CPA (Correlation Power Analysis) and electrical noise generation.<ref>{{Cite journal |last=Lo |first=Owen |last2=Buchanan |first2=William J. |last3=Carson |first3=Douglas |date=2018-08-27 |title=Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device |url=https://doi.org/10.1145/3230833.3232801 |journal=Proceedings of the 13th International Conference on Availability, Reliability and Security |series=ARES 2018 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/3230833.3232801 |isbn=978-1-4503-6448-5}}</ref> Gunathilake has since advanced the work in the analysis of radio emission from devices, including the cracking of the PRESENT light-weight encryption method.<ref>{{Cite journal |last=Gunathilake |first=Nilupulee A. |last2=Al-Dubai |first2=Ahmed |last3=Buchanan |first3=William J. |last4=Lo |first4=Owen |date=January 2022 |title=Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher |url=https://ieeexplore.ieee.org/abstract/document/9845293?casa_token=R8NajaDcB88AAAAA:V-Zn-92Ql_VGCfHFKopfmFF1YtKjhv10nwE5JiFhmBp3c4u69sP3_ussj7DuedI777jYGq3I |journal=2022 6th International Conference on Cryptography, Security and Privacy (CSP) |pages=51–55 |doi=10.1109/CSP55486.2022.00018}}</ref> The work includes:
Lo, Buchanan and Carson also managed to break the PRESENT block cipher on an embedded device using CPA (Correlation Power Analysis) and electrical noise generation.<ref>{{Cite book |last1=Lo |first1=Owen |last2=Buchanan |first2=William J. |last3=Carson |first3=Douglas |title=Proceedings of the 13th International Conference on Availability, Reliability and Security |chapter=Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device |date=2018-08-27 |chapter-url=https://doi.org/10.1145/3230833.3232801 |series=ARES 2018 |location=New York, NY, USA |publisher=Association for Computing Machinery |pages=1–6 |doi=10.1145/3230833.3232801 |isbn=978-1-4503-6448-5|s2cid=51980728 |url=https://napier-surface.worktribe.com/1274747/1/Correlation%20Power%20Analysis%20on%20the%20PRESENT%20Block%20Cipher%20on%20an%20Embedded%20Device }}</ref> Gunathilake has since advanced the work in the analysis of radio emission from devices, including the cracking of the PRESENT light-weight encryption method.<ref>{{Cite journal |last1=Gunathilake |first1=Nilupulee A. |last2=Al-Dubai |first2=Ahmed |last3=Buchanan |first3=William J. |last4=Lo |first4=Owen |date=January 2022 |title=Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher |url=https://ieeexplore.ieee.org/abstract/document/9845293 |journal=2022 6th International Conference on Cryptography, Security and Privacy (CSP) |pages=51–55 |doi=10.1109/CSP55486.2022.00018|isbn=978-1-6654-7975-2 |s2cid=245424991 }}</ref> The work includes:


* Lo, O., Buchanan, W. J., & Carson, D. (2017). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). ''Journal of Cyber Security Technology'', ''1''(2), 88-107.
* Lo, O., Buchanan, W. J., & Carson, D. (2017). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). ''Journal of Cyber Security Technology'', ''1''(2), 88-107.
Line 143: Line 143:
Dr Gordon Russell, Dr Thomas Tan and Buchanan were part of Peter McLaren's PhD supervision, and which resulted in a thesis entitled, "Investigations into decrypting live secure traffic in virtual environments".<ref>{{Cite web |title=investigations into decrypting live secure traffic in virtual environments |url=https://www.napier.ac.uk/research-and-innovation/research-search/phds/investigations-into-decrypting-live-secure-traffic-in-virtual-environments/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> Buchanan then was the Principal Investigator (PI) for the "MemCrypt" research project and which was funded from Sept 2020 to March 2021 by Scottish Enterrprise within its High Growth Spin-out Programme.<ref>{{Cite web |title=memcrypt hgsp |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/memcrypt-hgsp/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> Dr Owen Lo and McLaren then developed the work on the detection of encryption keys in memory, and scaled it to work with the detection of a range of ransomware families. From April 2020 to July 2020, Buchanan led an Innovate UK CyberASAP<ref>{{Cite web |title=CyberASAP - Innovate UK KTN |url=https://iuk.ktn-uk.org/programme/cyberasap/ |access-date=2023-08-05 |language=en-GB}}</ref> grant,<ref>{{Cite web |title=memcrypt |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/memcrypt/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> and which continued to a second phase from Sept 2020 to Feb 2021.<ref>{{Cite web |title=memcrypt cyberasap phase 2 |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/memcrypt-cyberasap-phase-2/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> This resulted in a spin-out company in January 2021 with Peter Jaco as CEO, and Peter Mclaren at CTO.<ref>{{Cite web |title=MEMCRYPT LIMITED overview - Find and update company information - GOV.UK |url=https://find-and-update.company-information.service.gov.uk/company/SC685619 |access-date=2023-08-05 |website=find-and-update.company-information.service.gov.uk |language=en}}</ref> Significant research outputs from research work includes:
Dr Gordon Russell, Dr Thomas Tan and Buchanan were part of Peter McLaren's PhD supervision, and which resulted in a thesis entitled, "Investigations into decrypting live secure traffic in virtual environments".<ref>{{Cite web |title=investigations into decrypting live secure traffic in virtual environments |url=https://www.napier.ac.uk/research-and-innovation/research-search/phds/investigations-into-decrypting-live-secure-traffic-in-virtual-environments/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> Buchanan then was the Principal Investigator (PI) for the "MemCrypt" research project and which was funded from Sept 2020 to March 2021 by Scottish Enterrprise within its High Growth Spin-out Programme.<ref>{{Cite web |title=memcrypt hgsp |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/memcrypt-hgsp/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> Dr Owen Lo and McLaren then developed the work on the detection of encryption keys in memory, and scaled it to work with the detection of a range of ransomware families. From April 2020 to July 2020, Buchanan led an Innovate UK CyberASAP<ref>{{Cite web |title=CyberASAP - Innovate UK KTN |url=https://iuk.ktn-uk.org/programme/cyberasap/ |access-date=2023-08-05 |language=en-GB}}</ref> grant,<ref>{{Cite web |title=memcrypt |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/memcrypt/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> and which continued to a second phase from Sept 2020 to Feb 2021.<ref>{{Cite web |title=memcrypt cyberasap phase 2 |url=https://www.napier.ac.uk/research-and-innovation/research-search/projects/memcrypt-cyberasap-phase-2/ |access-date=2023-08-05 |website=Napier |language=English}}</ref> This resulted in a spin-out company in January 2021 with Peter Jaco as CEO, and Peter Mclaren at CTO.<ref>{{Cite web |title=MEMCRYPT LIMITED overview - Find and update company information - GOV.UK |url=https://find-and-update.company-information.service.gov.uk/company/SC685619 |access-date=2023-08-05 |website=find-and-update.company-information.service.gov.uk |language=en}}</ref> Significant research outputs from research work includes:


* McLaren, P., Russell, G., & Buchanan, B. (2017, July). Mining malware command and control traces. In ''2017 Computing Conference'' (pp.&nbsp;788–794). IEEE.<ref>{{Cite journal |last=McLaren |first=Peter |last2=Russell |first2=Gordon |last3=Buchanan |first3=Bill |date=July 2017 |title=Mining malware command and control traces |url=https://ieeexplore.ieee.org/document/8252185 |journal=2017 Computing Conference |pages=788–794 |doi=10.1109/SAI.2017.8252185}}</ref>
* McLaren, P., Russell, G., & Buchanan, B. (2017, July). Mining malware command and control traces. In ''2017 Computing Conference'' (pp.&nbsp;788–794). IEEE.<ref>{{Cite journal |last1=McLaren |first1=Peter |last2=Russell |first2=Gordon |last3=Buchanan |first3=Bill |date=July 2017 |title=Mining malware command and control traces |url=https://ieeexplore.ieee.org/document/8252185 |journal=2017 Computing Conference |pages=788–794 |doi=10.1109/SAI.2017.8252185|isbn=978-1-5090-5443-5 |s2cid=32469879 }}</ref>
* McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 key streams from targeted memory analysis. ''Journal of Information Security and Applications'', ''48'', 102372.
* McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 key streams from targeted memory analysis. ''Journal of Information Security and Applications'', ''48'', 102372.
* Buchanan, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22.<ref name="Detection of ransomware"/>
* Buchanan, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22.<ref name="Detection of ransomware"/>
Line 149: Line 149:
Buchanan continues to work on ransomware work with Simon Davis and Rich Macfarlane, and recent work includes:
Buchanan continues to work on ransomware work with Simon Davis and Rich Macfarlane, and recent work includes:


* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of live forensic techniques in ransomware attack mitigation. ''Forensic Science International: Digital Investigation'', ''33'', 300979.<ref>{{Cite journal |last=Davies |first=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=2020-06-01 |title=Evaluation of live forensic techniques in ransomware attack mitigation |url=https://www.sciencedirect.com/science/article/pii/S2666281720300858 |journal=Forensic Science International: Digital Investigation |language=en |volume=33 |pages=300979 |doi=10.1016/j.fsidi.2020.300979 |issn=2666-2817}}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of live forensic techniques in ransomware attack mitigation. ''Forensic Science International: Digital Investigation'', ''33'', 300979.<ref>{{Cite journal |last1=Davies |first1=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=2020-06-01 |title=Evaluation of live forensic techniques in ransomware attack mitigation |url=https://www.sciencedirect.com/science/article/pii/S2666281720300858 |journal=Forensic Science International: Digital Investigation |language=en |volume=33 |pages=300979 |doi=10.1016/j.fsidi.2020.300979 |issn=2666-2817}}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021). Differential area analysis for ransomware attack detection within mixed file datasets. ''Computers & Security'', ''108'', 102377.<ref>{{Cite journal |last=Davies |first=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=2021-09-01 |title=Differential area analysis for ransomware attack detection within mixed file datasets |url=https://www.sciencedirect.com/science/article/pii/S0167404821002017 |journal=Computers & Security |language=en |volume=108 |pages=102377 |doi=10.1016/j.cose.2021.102377 |issn=0167-4048}}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021). Differential area analysis for ransomware attack detection within mixed file datasets. ''Computers & Security'', ''108'', 102377.<ref>{{Cite journal |last1=Davies |first1=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=2021-09-01 |title=Differential area analysis for ransomware attack detection within mixed file datasets |url=https://www.sciencedirect.com/science/article/pii/S0167404821002017 |journal=Computers & Security |language=en |volume=108 |pages=102377 |doi=10.1016/j.cose.2021.102377 |s2cid=235658473 |issn=0167-4048}}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022, January). Review of Current Ransomware Detection Techniques. In ''Proc. of the 7 th International Conference on Engineering and Emerging Technologies (ICEET)''. Institute of Electrical and Electronics Engineers.<ref>{{Cite journal |last=Davies |first=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=October 2021 |title=Review of Current Ransomware Detection Techniques |url=https://ieeexplore.ieee.org/document/9659643 |journal=2021 International Conference on Engineering and Emerging Technologies (ICEET) |pages=1–6 |doi=10.1109/ICEET53442.2021.9659643}}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022, January). Review of Current Ransomware Detection Techniques. In ''Proc. of the 7 th International Conference on Engineering and Emerging Technologies (ICEET)''. Institute of Electrical and Electronics Engineers.<ref>{{Cite journal |last1=Davies |first1=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=October 2021 |title=Review of Current Ransomware Detection Techniques |url=https://ieeexplore.ieee.org/document/9659643 |journal=2021 International Conference on Engineering and Emerging Technologies (ICEET) |pages=1–6 |doi=10.1109/ICEET53442.2021.9659643|isbn=978-1-6654-2714-2 |s2cid=245708554 }}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. ''Entropy'', ''24''(10), 1503.<ref>{{Cite journal |last=Davies |first=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=October 2022 |title=Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification |url=https://www.mdpi.com/1099-4300/24/10/1503 |journal=Entropy |language=en |volume=24 |issue=10 |pages=1503 |doi=10.3390/e24101503 |issn=1099-4300}}</ref>
* Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. ''Entropy'', ''24''(10), 1503.<ref>{{Cite journal |last1=Davies |first1=Simon R. |last2=Macfarlane |first2=Richard |last3=Buchanan |first3=William J. |date=October 2022 |title=Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification |journal=Entropy |language=en |volume=24 |issue=10 |pages=1503 |doi=10.3390/e24101503 |pmid=37420524 |pmc=9601406 |arxiv=2210.13376 |bibcode=2022Entrp..24.1503D |issn=1099-4300 |doi-access=free }}</ref>


== Health Care-related research ==
== Health Care-related research ==

Revision as of 08:48, 6 August 2023

William (Bill) Buchanan
OBE
Born6 March 1961
NationalityBritish
Other namesBill Buchanan
EducationPhD, Edinburgh Napier University, 1996
OccupationProfessor
EmployerEdinburgh Napier University
Known for
Children3
AwardsOfficer of the Order of the British Empire
HonoursOBE
Websiteasecuritysite.com
External videos
video icon "PROF BILL BUCHANAN OBE - BUILDING A NEW WORLD - Inspired Edinburgh", Interview with Bill Buchanan
video icon "IISP 2018: Futurist academic research into AI", Keynote talk by Bill Buchanan
video icon "BBC News Interview - 21 August 2018", BBC Interview by Bill Buchanan
video icon "Sky News Interview on Wannacry", Sky News Interview with Bill Buchanan
video icon "ABC Interview on Wannacry", ABC Interview with Bill Buchanan, 13 May 2017

William Johnston Buchanan OBE FBCS CEng PFHEA (born 6 March 1961) is a Scottish computer scientist. Buchanan is a professor in the School of Computing, Engineering and the Built Environment.[1] He currently leads the Blockpass ID Lab[2] and the Centre for Cybersecurity, IoT and Cyberphysical[3] at Edinburgh Napier University.[4] In 2017, he was appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security.

Buchanan has never hid his love of his home city of Edinburgh, and in April 2018, he presented alongside Richard Demarco in an event entitled, "Building a World-leading City in Arts & Science" and which discussed and debated the future of Edinburgh.[5]

In August 2017, Buchanan was interviewed by Elliot Reeves within the "Inspired Edinburgh" series of talks with famous Edinburgh citizens.[6] Within the talk he outlined the career route that he took in his early life and in following his father and grandfather into electrical engineering, and how he fell in love with the city the first moment he saw it.[7] In January 2018, Buchanan decided to receive his OBE[8] in his home city,[9] and received this from Queen Elizabeth II at Hollyrood Palace in July 2018.

Along with the love of the City of Edinburgh, Buchanan has deep passion for cryptography and innovation[10] and is quoted with a tagline of, "A Serial Innovator. An Old World Breaker. A New World Creator.”[11]

Early life and career

Buchanan was born in Falkirk, Scotland in 1961. He attended Victoria Park Primary School[12] in Falkirk and then attended Graeme High School.[13] On leaving school - from 1977 to 1981 - he was an Apprentice Electrician at the ICI Ltd in Grangemouth.[14] He spent 1977 to 1978 at Falkirk Technical College studying Electrical and Electronic Engineering.

Between 1981 and 1986, Buchanan studied for a BEng (Hons) in Communication and Electronic Engineering in the Department of Electrical and Electronic Engineering at Edinburgh Napier University. During this time, he undertook work placements with Racal-MESL and the Royal Observatory[15] in Edinburgh. Then, in 1986, he took up a post of a Lecturer and initially taught electronics, before moving onto computer engineering, data communications and networking.

Buchanan gained his PhD in 1996 with a thesis entitled, "Analysis of electromagnetic wave propogation using 3D finite-difference time-domain methods with parallel processing".[16] The work implemented 3D Finite-Difference Time-Domain (FDTD) methods to simulate structures in the time-domain using a direct form of Maxwell’s curl equations.

Research and Innovation

Buchanan's current research work focuses on areas of applied cryptography, blockchain, cybersecurity, citizen focused health care and digital identity. He is included in the World's Top 2% Scientists list for 2022,[17] and ranks in the Top 40 most cited research authors in Applied Cryptography.[18] Buchanan's leadership in research has led to a number of successful spin-out companies from Edinburgh Napier University.

On 6 May 2015 he launched The Cyber Academy at the Merchiston Campus of Edinburgh Napier University.[19] He received the Principal's Award for contribution to Knowledge Exchange/Research in 2016 (Innovation of the Year and also Best Contribution to Information Society research theme)[20] and in 2017 (Innovation of the year in Knowledge Exchange). Buchanan's research areas has recently focused on cryptography,[21] cybersecurity and digital identity.[22][23]

Patents

Buchanan has co-authored a number of patents including:

  • Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", published 2019-05-08, assigned to Fortinet Inc.[24]
  • Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11.[25]
  • Lanc, David; Fan, Lu & Mackinnon, Lachlan et al., "Resilient secret sharing cloud based architecture for data vault", published 2021-04-13, assigned to Leading Software Ltd.[26]
  • Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "System and method for management of confidential data", published 2018-10-11, assigned to Edinburgh Napier University.[27]
  • Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "Method for identification of digital content", published 2021-06-30, assigned to Cyan Forensics Ltd.[28]
  • Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", published 2015-05-26, assigned to The Court of Edinburgh Napier University.[29]
  • Buchanan, William Johnston; Lo, Owen Chin Wai & Penrose, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11.[30]
  • Buchanan, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22[31]

Blockpass ID Lab

Buchanan leads the Blockpass ID Lab (BIL) and which was initially co-funded by Blockpass IDN and Edinburgh Napier University. It is located on the Merchiston Campus and was launched on 26 September 2018.[32] Overall, it was the first research lab in the World to focus on digital identity, and hosts research work in areas on blockchain, digital identity, privacy preserving methods and applied cryptography, with key focus areas of around citizen focused data sharing. The lab has also hosted a number of related research grants, including GLASS[33] and TRUSTEE,[34] along with incubating the True Deploy future spin-out. BIL has generated a wide range of research outputs over the years, including:

  • Ali, H., Ahmad, J., Jaroucheh, Z., Papadopoulos, P., Pitropakis, N., Lo, O., ... & Buchanan, W. J. (2022). Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. Entropy, 24(10), 1379.[35]
  • Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN) (Vol. 1, pp. 1–8). IEEE.[36]
  • Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2021, December). A privacy-preserving distributed platform for COVID-19 vaccine passports. In Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion (pp. 1–6).[37]
  • Papadopoulos, P., Pitropakis, N., Buchanan, W. J., Lo, O., & Katsikas, S. (2020). Privacy-preserving passive dns. Computers, 9(3), 64.[38]
  • Jaroucheh, Z., Alissa, M., Buchanan, W. J., & Liu, X. (2020, July). TRUSTD: Combat fake content using blockchain and collective signature technologies. In 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC) (pp. 1235–1240). IEEE.[39]

Research Impact Case Studies

In Unit of Assessment 11 (Computer Science and Infomatics) within REF 2021, Buchanan led two research impact case studies: "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods",[40] and "Protecting Employees, Children and Sensitive Data using Innovative Approaches to Cyber Security".[41] Both of these impact case studies were graded as 4* (quality that is world-leading in terms of originality, significance and rigour[42]).[43]

COVID-19 privacy-aware contact tracing

In April 2020, Chaloner Chute[44] at the DHI defined a research brief for a team of experts from Edinburgh Napier University (Buchanan), the University of Glasgow (Professor Muhammad Imran[45] and Professor Jill Pell[46]), the University of Edinburgh (Dr Claudia Pagliari[47]) and University of Strathclyde (Dr Sanna Rimpiläinen[48]). This brief involved a review the usage of contact tracing applications. Buchanan focused on answering the question, "How might the distributed system be architected to be secure and respectful of privacy from the outset?". Overall, each of the experts then reviewed key areas around the usage of contract tracing, and submitted a compiled report answering the key questions:

  • Buchanan, B., Imran, M., Pagliari, C., Pell, J., & Rimpiläinen, S. (2020). Use Of Participatory Apps In Contact Tracing: Options And Implications for Public Health, Privacy and Trust. Glasgow: Digital Health and Care Institute, University of Strathclyde.[49]

Buchanan also applied his applied cryptography knowledge to areas of COVID-19 track and trace methods. This included collaborated work with the University of Glasgow on a blockchain-based methods named BeepTrace.[50] Buchanan also worked with teams on privacy-aware COVID-19 passwords using the Ethereum platform[51], reviewed the state-of-the-art in privacy-aware applications for track and trace,[52] and implemented privacy aware identity matching.[53]

Related outputs include:

  • Buchanan, W. J., Imran, M. A., Ur-Rehman, M., Zhang, L., Abbasi, Q. H., Chrysoulas, C., ... & Papadopoulos, P. (2020). Review and critical analysis of privacy-preserving infection tracking and contact tracing. Frontiers in Communications and Networks, 1, 583376.
  • Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (2020). BeepTrace: Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond. IEEE Internet of Things Journal, 8(5), 3915-3929.
  • Barati, M., Buchanan, W. J., Lo, O., & Rana, O. (2021, December). A privacy-preserving distributed platform for COVID-19 vaccine passports. In Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion (pp. 1-6).
  • Abramson, W., Buchanan, W. J., Sayeed, S., Pitropakis, N., & Lo, O. (2021, December). PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching. In 2021 14th International Conference on Security of Information and Networks (SIN) (Vol. 1, pp. 1-8). IEEE.

MPhil and PhD supervision

Buchanan has supervised 37 PhD and MPhil students to successful completion.[54] These include:

  • Dr Nikos Migas, "MARIAN: Mobile Agents for Routing in Ad-Hoc Networks", PhD, 2002-2005.[55]
  • Dr Jamie Graves, "Forensic verification of operating system activity via novel data, acquisition and analysis techniques", PhD, 2005-2009.[56]
  • Dr Zbigniew Kwecka, "Cryptographic privacy-preserving enhancement method for investigative data acquisition", PhD, 2006-2011.[57]
  • Dr Nicole van Deursen, "HI-Risk: a socio-technical method to identify and monitor heathcare information security risks in the information society", PhD, 2009-2014.[58]
  • Dr Solomon Uwagbole, "A pattern-driven corpus to predictive analytics in mitigating SQL injection attack", PhD, 2011-2018.[59]
  • Dr Phil Penrose, "Forensic analysis of large capacity digital storage devices", PhD, 2013-2017.[60]
  • Dr Grzegorz Spyra, "Embedded document security using sticky policies and identity based encryption", PhD, 2013-2019.[61]
  • Dr Adrian Smales. "Test-bed and evaluation of a home-based adverse event prediction infrastructure", PhD, 2013-2021.[62]
  • Dr Peter Mclaren, "Investigations into decrypting live secure traffic in virtual environments", PhD, 2016-2019.[63]
  • Dr Pavlos Papadopoulos, "Privacy-preserving systems around security, trust and identity", PhD, 2019-2022.[64]

Research projects

Buchanan has undertaken many research and innovation projects over the years, including recent ones of:

  • Distributed single sign-on-stack-on e-Governance Paradigm based on a distributed peer-to-peer (P2P) file exchange network for security, transparency, cost effectiveness and trust - GLASS.[65] EU Horizon, Jan 2021-Dec 2023.
  • KTP Miracl,[66] Innovate UK, Apr 2023-Oct 2025.
  • TruElect,[67] Innovate UK, Dec 2022-Mar 2023.
  • TRUSTEE (Trust and Privacy Preserving Computing Platform for Crossborder Federation of Personal Data),[68] EU Horizon, Jul 2022-Dec 2025.
  • AI-based privacy-preserving biometric authentication with mass-market smart devices,[69] The Data Lab, Oct 2021-Sept 2024.
  • PhD Studentship, CyberHunt,[70] The Research Funding Council of Norway, Feb 2021-Jan 2025.
  • PhD Studentship (Homomorphic Encryption),[71] 6G Health Institute GmbH, Oct 2023-Sept 2026.
  • MemCrypt (HGSP),[72] Scottish Enterprise, Sep 2020-Mar 2021.

DACAR (Data Capture and Auto Identification Reference)

Buchanan was the Principal Investigator (PI) for the Edinburgh Napier University work within the EPSRC/TSB (Technology Strategy Board)-funded DACAR project, and which focused on citizen rights to share data within heath care.[73] It ran from November 2009 until November 2011 and involved a collaboration between CipherLab, Chelsea and Westminster Hospital,[74] GS1 UK,[75] Imperial College London, and Kodit. A core contribution of the project was the creation of the SPoC[76] (Single Point of Contact) approach to information sharing, and the integration of identity, role and access rights to every part of the capture, storage and consumption of health care data. Its integration within Chelsea and Westminster Hospital was led by Professor Derek Bell.[77]

The project was the first time that Buchanan formally worked with Professor Christoph Thummler,[78] and who, at the time, had a post as a clinician at the Royal Infirmary of Edinburgh and at Edinburgh Napier University.[79] The core research team also involved Dr Owen Lo and Dr Lu Fan.[80] The integration of GS1 UK allowed the integration of emerging RFID (Radio Frequency Identification) standards[81][82] into the identification of medical artifacts, including tracking beds and medical equipment around the hospital.

After this project, Dr Owen Lo continued to work with Buchanan on a number of research projects, and was a co-inventor within the Cyan Forensics spin-out company[83] and which changed its name to Cyacomb.[84]

Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures

From March 2011 to July 2013, Buchanan continued to partner with Professor Christoph Thummler, Dr Owen Lo and Dr Lu Fan, and was the Principal Investigator (PI) on the ESPRC-funded, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures"[85] project. This extended the work from the DACAR project but focused on assisted living, and involved a collaboration with Microsoft and HoIP (Health Over IP). While DACAR had focused on the sharing of health care information around hospitial data, this project extented the core concepts to create a novel governance policy infrastructure using a circle-of-trust relationship for assisted living. This linked to formal, role-based security for primary and secondary health care. New work also included the integration of the SPoC approach with the Microsoft Health Vault.[86]

At the time, the work was known as Cloud4Health,[87] and Buchanan gave an overview of the approach in a submission for a Scotland IS award in May 2012.[88] Overall, the work in this project and DACAR laid the technical foundation for the Symphonic spin-out company from Edinburgh Napier University in 2013. It also the main focuse for the 4* rated - quality that is world-leading in terms of originality, significance and rigour - impact case study for UoA 11 in REF 2021 entitled, "Enabling Sensitive Personal Data to be Shared with Trust using Novel Digital Security Methods".[40]

GLASS research project

Buchanan is the Principal Investigator (PI) for the Edinburgh Napier University work[89] within the EU Horizon funded GLASS project,[90] and which is a new paradigm for sharing or transfer of personal information with the citizen in control. It started in January 2021 and completed in December 2023 (Grant aggrement No 959879).[91] The research project includ es collaborators from TAGES (Teknoloji Arastirma ve Gelistirme Endustriyel Urunler Bilisim Teknolojileri San. ve Tic. A.S.), Fraunhofer FOKUS, UBITECH Limited, University of Patras, Suite 5, Hellenic Ministry of Digital Governance, and Istanbul Metropolitan Municipality. This has built a citizen focused digital wallet and new models data sharing[92] using Hyperledger Fabric and IPFS (InterPlanetary File System). In 2022, the GLASS project received "Leading Light Innovation" award at the Scottish Cybersecurity Awards.[93]

vSoC (Virtual SOC)

Buchanan has innovated the vSoC teaching and training environment within Edinburgh Napier University, and which is used by students within the cybersecurity and networking-related subjects. The work started within a grant funded by DG Home[94] related to the "Prevention Of and Fight against Crime" theme and was entitled, "DFET (Digital Forensics Evaluation and Training)".[95][96] It was led by Buchanan, and included collaborators of Stefan Institute (JSI), Stockholm University, Police Scotland, and Aconite Internet Solutions. This provided the basic cloud infrastructure for the environment and used a VMWare vSphere virtualised environment that was hosted within the Merchiston Campus at Edinburgh Napier University. From December 2015 to February 2017, the Advanced HE advanced the work by funding a project entitled, "vSOC - Virtualised Security Operations Centre",[97] and which scaled vSoC into cybersecurity areas. The work continued with the funding of a KTP (Knowledge Transfer Parternship) from Innovate UK and Satisnet Limited and which integrated SIEM tools into the environment.[98] From June 2019 to May 2020, The Data Lab[99] funded integrated of data science and cybersecurity.[100]

Side Channel Analysis - Noise and RF Emmission

Buchanan's work with Dr Owen Lo[101] and Dr Nilupulee Gunathilake[102] has included an analysis of side channel attacks on the cryptography running on embedded devices using electrical noise generation and radio emissions. From Jan 2017 to Jan 2017, Buchanan and Owen Lo worked with Keysight on research related to "Bare Metal Forensics - Pattern Analysis Heuristics - Data Analysis", and co-funded by The Data Lab.[103] This resulted in a paper entitled, "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)"[104] and which cracked 128-bit AES encryption on an Arduino Uno from the electrical noise generated from the device. Douglas Carson from Keysight and Lo presented the work live on 21 September 2016 at an event in Edinburgh.[105][106]

Lo, Buchanan and Carson also managed to break the PRESENT block cipher on an embedded device using CPA (Correlation Power Analysis) and electrical noise generation.[107] Gunathilake has since advanced the work in the analysis of radio emission from devices, including the cracking of the PRESENT light-weight encryption method.[108] The work includes:

  • Lo, O., Buchanan, W. J., & Carson, D. (2017). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107.
  • Lo, O., Buchanan, W. J., & Carson, D. (2018, August). Correlation power analysis on the PRESENT block cipher on an embedded device. In Proceedings of the 13th International Conference on Availability, Reliability and Security (pp. 1–6).
  • Gunathilake, N. A., Al-Dubai, A., Buchanan, W. J., & Lo, O. (2022, January). Electromagnetic side-channel attack resilience against present lightweight block cipher. In 2022 6th International Conference on Cryptography, Security and Privacy (CSP) (pp. 51–55). IEEE.

Ransomware research projects

Dr Gordon Russell, Dr Thomas Tan and Buchanan were part of Peter McLaren's PhD supervision, and which resulted in a thesis entitled, "Investigations into decrypting live secure traffic in virtual environments".[109] Buchanan then was the Principal Investigator (PI) for the "MemCrypt" research project and which was funded from Sept 2020 to March 2021 by Scottish Enterrprise within its High Growth Spin-out Programme.[110] Dr Owen Lo and McLaren then developed the work on the detection of encryption keys in memory, and scaled it to work with the detection of a range of ransomware families. From April 2020 to July 2020, Buchanan led an Innovate UK CyberASAP[111] grant,[112] and which continued to a second phase from Sept 2020 to Feb 2021.[113] This resulted in a spin-out company in January 2021 with Peter Jaco as CEO, and Peter Mclaren at CTO.[114] Significant research outputs from research work includes:

  • McLaren, P., Russell, G., & Buchanan, B. (2017, July). Mining malware command and control traces. In 2017 Computing Conference (pp. 788–794). IEEE.[115]
  • McLaren, P., Buchanan, W. J., Russell, G., & Tan, Z. (2019). Deriving ChaCha20 key streams from targeted memory analysis. Journal of Information Security and Applications, 48, 102372.
  • Buchanan, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22.[31]

Buchanan continues to work on ransomware work with Simon Davis and Rich Macfarlane, and recent work includes:

  • Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2020). Evaluation of live forensic techniques in ransomware attack mitigation. Forensic Science International: Digital Investigation, 33, 300979.[116]
  • Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021). Differential area analysis for ransomware attack detection within mixed file datasets. Computers & Security, 108, 102377.[117]
  • Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022, January). Review of Current Ransomware Detection Techniques. In Proc. of the 7 th International Conference on Engineering and Emerging Technologies (ICEET). Institute of Electrical and Electronics Engineers.[118]
  • Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification. Entropy, 24(10), 1503.[119]

Along with cybersecurity and cryptography, Buchanan has a driving passion for improving health care through research methods, and with a special focus on citizen-focused care. This can be traced back to work from March 2011 to July 2013, and where he led work at Edinburgh Napier University in a partnership with Edinburgh Napier University, Microsoft and HoIP. This project was funded by EPSRC and entitled, "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures".[120] It involved the creation of a novel governance policy infrastructure using a circle-of-trust relationship for assisted living, and with links to formal, role-based security for primary and secondary health care.

Buchanan then teamed up with his PhD student (Adrian Smales), and kick-started the "e-FRAIL - Early detection of FRAilty and Illness" research project and which ran from October 2015 to December 2016 and funded by the Digital Health Institute (DHI).[121] The partnership continued to advance from August 2017 to Feb 2018 with "e-Frail - Phase 2" which added key risk assessments using a Delphi method for understanding of fraility.[122] This led to a collaboration with CM2000[123] on the development of the Advanced Risk Modelling for Early Detection (ARMED) product and which won the ‘Innovation of the Year’ award at Scottish Knowledge Exchange Awards in 2020.[124]

Alongside the work on fraility, Buchanan led a number of research which integrated digital trust and blockchain into next generation health care systems. This involved leading a research project for the tracking of medical devices within a health care environment though public blockchain methods. The work involved a collaboration with Spiritus within the "Health Blockchain"[125] project and was funded by The Data Lab (August 2017-March 2019).[126] Work continued with the development of a trusted health care infrastructure with "Next Generation Trust Architecture" from March 2018 to February 2020,[127] and "Next Generation Connectivity with Health and Well-being" from October 2018 to July 2021.[128] Both were frunded and funded by the DHI. New research work involves the investigation of 6G and homomorphic encryption methods with privacy-aware health care records.[129]

Selected health care related papers include:

  • Fan, L., Buchanan, W., Thummler, C., Lo, O., Khedim, A., Uthmani, O., ... & Bell, D. (2011, July). DACAR platform for eHealth services cloud. In 2011 IEEE 4th international conference on cloud computing (pp. 219–226). IEEE.[130]
  • Thuemmler, C., Fan, L., Buchanan, W. J., Lo, O., Ekonomou, E., & Khedim, A. S. (2012). E-health: Chances and challenges of distributed, service oriented architectures.[131]
  • Van Deursen, N., Buchanan, W. J., & Duff, A. (2013). Monitoring information security risks within health care. computers & security, 37, 31-45.[132]
  • Thuemmler, C., Rolffs, C., Bollmann, A., Hindricks, G., & Buchanan, W. (2018, October). Requirements for 5G based telemetric cardiac monitoring. In 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) (pp. 1–4). IEEE.[133]
  • Bell, L., Buchanan, W. J., Cameron, J., & Lo, O. (2018). Applications of Blockchain Within Healthcare. Blockchain in healthcare today.[134]
  • Abubakar, M., McCarron, P., Jaroucheh, Z., Al Dubai, A., & Buchanan, B. (2021, December). Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates. In 2021 14th International Conference on Security of Information and Networks (SIN) (Vol. 1, pp. 1–8). IEEE.[135]

After completing his PhD in 2021, Adrian Smales left the research team to join Smplicare as the Chief Innovation Officer.[136]

Selected research works

Selected publications include:

  • Xu, H., Zhang, L., Onireti, O., Fang, Y., Buchanan, W. J., & Imran, M. A. (2020). BeepTrace: Blockchain-enabled privacy-preserving contact tracing for COVID-19 pandemic and beyond. IEEE Internet of Things Journal, 8(5), 3915-3929.[137]
  • Popov, S., & Buchanan, W. J. (2021). Fpc-bi: Fast probabilistic consensus within byzantine infrastructures. Journal of Parallel and Distributed Computing, 147, 77-86.[138]
  • Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2021). Differential area analysis for ransomware attack detection within mixed file datasets. Computers & Security, 108, 102377.[139]
  • Li, S., Choo, K. K. R., Sun, Q., Buchanan, W. J., & Cao, J. (2019). IoT forensics: Amazon echo as a use case. IEEE Internet of Things Journal, 6(4), 6487-6497.[140]
  • Masood, F., Driss, M., Boulila, W., Ahmad, J., Rehman, S. U., Jan, S. U., ... & Buchanan, W. J. (2022). A lightweight chaos-based medical image encryption scheme using random shuffling and XOR operations. Wireless Personal Communications, 127(2), 1405-1432.[141]
  • Lo, O., Buchanan, W. J., & Carson, D. (2017). Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA). Journal of Cyber Security Technology, 1(2), 88-107.[142]
  • Kim, T. H., Goyat, R., Rai, M. K., Kumar, G., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE access, 7, 184133-184144.[143]
  • Sieklik, B., Macfarlane, R., & Buchanan, W. J. (2016). Evaluation of TFTP DDoS amplification attack. computers & security, 57, 67-92.[144]

Academic spin-outs

Buchanan has led research which has led to three successful spin-out companies: Zonefox,[145] Symphonic[146] and Cyan Forensics.[147] In October 2018, Zonefox was acquired by Fortinet,[148] and in November 2020, Symphonic were acquired by Ping Identity.[149]

Zonefox

The work of Dr Jamie Graves[150] and Buchanan on a PhD project ("Forensic verification of operating system activity via novel data, acquisition and analysis techniques"[151][152]) led to the incorporation of Inquisitive Systems Limited in 2008.[153] This led to the submission of patents entitled "Improvements in or relating to digital forensics" and "Digital Forensics" in Oct 2008,[154] and Sept 2009,[155] respectively. The "Improvements in or relating to digital forensics" was published for world-wide status in March 2010,[156] and granted in the EU[157] in May 2019. The "Digital Forensics" patent was granted on Nov 2014 for the US.[25]

The patents captured the core research:[158] defining activity footprints as a ‘digital DNA’ sequence, which can be used with a new matching algorithm (BLAST DNA) to determine the probability of a sequence match to a malicious event, significantly outperforming existing signature-based methods. This proved particularly useful in detecting insider threats such as copying source-code to a USB device. The original patent owner was Edinburgh Napier University, and where the existing EU patent is owned by Fortinet Inc.[157]

After funding from Scottish Enterprise in the Proof of Concept programme[159] from September 2008 to August 2010, the research work was spun-out from Edinburgh Napier University in September 2010, and where Graves was the CEO, and who continued in this post until Zonefox was acquired by Fortinet Inc. The company, in 2013, changed its trading name to Zonefox. On 23 October 2018, Fortinet Inc announced that it had fully acquired Zonefox[160] and that Zonefox's product range would be integrated into the Fortinet Security Fabric offering. Edinburgh Napier University was one of the significant shareholders in the acquistion, along with the co-inventors.

Graves returned back to Edinburgh Napier University in Feb 2021 to take up a post "Entrepreneur in Residence" with a Royal Society-funded grant.[161]

Symphonic

For over a decade, Buchanan has run research work related to sharing and integrating the rights of the citizen. It addresses gaps around data governance related to ownership rights, governance, and privacy through the creation of a framework that set out new processes relating to citizen-defined access policies.[162] A major output of the work was the Symphonic Trust spin-out, and which was acquired by Ping Identity in 2020.[163]

The research began in 2008 with a collaboration with Police Scotland, looking at weaknesses around information sharing within law enforcement,[164] and in developed new ways to integrate large-scale integration of rights across interconnected domains. It resulted in the submission of a patent for the US in January 2013,[165] for the World in Jun 2014.[166] The US patent was granted in July 2014.[166]

Other related research led by Buchanan was funded within two EPSRC/Innovate UK funded projects: "Data Capture and Auto Identification Reference" [167](DACAR)[168] and "Scalable and Open Framework for Human/Digital Trust between Informal/Formal Personal Health Care Infrastructures".[169] This work was then further developed by introducing the concept of data-buckets owned by the citizen, and in the concept of using a SPoC (Single Point of Contact) for sharing information between interconnected domains.[170]

From March 2012 to October 2013, the work was in a project entitled, "sa.FIRE" (Secure Analysis and FIltering Risk Engine)[171] and funded from Scottish Enterprise on their HGSP programme, and where Derick James,[172] Richard Lewis (as a Commercial Champion) and Niall Burns[173] came on board. The company spun out of Edinburgh Napier University in 2014, and received initial investment from Par Equity.[174] Derick James became the CEO and Niall Burns was the CTO. The company eventually dropped the "Trust" part of its name and just traded as Symphonic. On 2 November 2020, it announced that Symphonic had been acquired by Ping Identity[175] for $32 million.[176] Edinburgh Napier University was one of the significant shareholders in the acquistion, along with the co-inventors (Buchanan, Dr Lu Fan, Alistair Lawson and Omair Uthmani).

Cyacomb

From 2014 to 2017, Buchanan and Rich Macfarlane[177] supervised Dr Phil Penrose for a PhD. The work was submitted in 2017, and entitled "Forensic analysis of large capacity digital storage devices".[178] This core work led to a UK patent application entitled, "Method for identification of digital content" in April 2017.[179] The UK patent was granted in the UK in June 2021, and published as a World patent in October 2018,[30] an EU patent in February 2020,[180] a Canadian patent in October 2018,[181] and a US patent in September 2021.[182]

From March 2015 to January 2016, the work was funded by Scottish Enterprise as part of a Proof of Concept grant.[183] In Jne 2016, Cyan Forensics was first incorporated,[184] and became a spin-out from Edinburgh Napier University. The CEO was Ian Stevenson and the CTO was Bruce Ramsay.[185] The co-inventors of the core technology for the spin-out were Buchanan, Dr Phil Penrose, Rich Macfarlane, Bruce Ramsay and Dr Owen Lo.

In March 2022, Cyan Forensics changed their trading name to Cyacomb.[186] In 2022, Cyacomb were awarded with a Technology Pioneer by World Economic Forum,[187] and an innovation award winner at the GovTech Summit in 2019.[188] The company also received a Cybersecurity award in the same year for "Best Cyber Breakthrough" in 2019 at the Scottish Cyber Awards.[189]

Par Equity led a £5 million Series A funding round in March 2021.[190]

In 2022, Ian Stevenson, the CEO of Cyacomb, wrote an open letter to the Secretary of State for Digital, Culture Media and Sport related to the uses of encrypted messaging in the UK with the comment of "To pass the Online Safety Bill in a form that does not allow for the possibility of secure, privacy protecting CSAM detection solutions now or in the future would be to miss a crucial opportunity to do enormous good".[191]

MemCrypt

Buchanan supported the creation of the MemCrypt spin-out, and which focuses on the discovery of cryptographic keys in memory (based on the PhD work of Dr Peter McLaren[192]). The team then progressed this work by including triage methods into the discovery of encryption keys within memory.[193][194] Key contributions include being the first to detect the presence of ChaCha20 encryption keys in running memory (one of the most popular encryption methods used in secure communications), and identifying a major vulnerability within tools such as OpenSSL.[195]

The work has since been applied to ransomware detection and recovery.[196] From September 2020 until March 2021, the work received funding from Scottish Enterprise as part of their HGSP grant awards,[72] and, from September 2020 until Feb 2021 from the Innovate UK Cyber ASAP programme.[197] MemCrypt Limited spun out of Edinburgh Napier University in Oct 2020[198] and incorporated in Jun 2021.[199] In November 2021, the research work related to MemCrypt received a Leading Light Innovation award at the Scottish Cybersecurity awards.[200]

Learning and Teaching

In 2018, Buchanan became a Principal Fellow of the Higher Education Academy (PFHEA).[201] He is the creator and sole author of the Asecuritysite.com web site, and which focuses on covering cryptography and various areas of networking and cybersecurity, from both a theoretical and practical approach. Buchanan was also the software creator of the Bright Red Publishing Digital Zone, and which contains Web-based content for many of the subjects included in the Scottish Qualifications Authority (SQA) N5, Higher and Advanced Higher syllabus' in Scotland.[202][201]

He has also created a number of novel learning environments, including vSoC (Virtualised Security Operation Center)[203] and which is a cloud-based infrastructure for cybersecurity learning. Along with this, Buchanan has developed an online Cipher Capture The Flag set of challenges,[204] and Web-based Cisco device simulators (previously known as Networksims ProfSIMs).[205]

Buchanan writes on areas of cryptography, cybersecurity and computer science within the blog entiled "ASecuritySite: When Bob Met Alice" [206] and has a YouTube channel containing a range of lectures, tutorials and demonstrations,[207] along with related Apple,[208] Spotify[209] and Audible[210] podcasts. In this teaching, He has received a number of teaching-related awards, including for the Best Lecturer for Computing in the ENSA Student-voted Excellence Awards in the School of Computing, Engineering and the Built Environment in 2019,[211] 2020[212] and 2023.[213] In 2017, he was awarded with the "Cyber Evangelist of the Year" at the first Scottish Cybersecurity awards.[214]

Bright Red Publishing Digital Zone

Bright Red Publishing[215] is an Edinburgh-based book publisher that focus on textbooks for schools related to N5, Higher and Advanced Higher topics. The first phase of the first between a collaboration between Bright Red Publishing and Buchanan ran from July 2012 to Dec 2012, and was funded by Interface Online.[216][217] This created the Digital Zone[218] and which was an innovative method of converting electronic version of the books into an online format, while provided a novel range of Mathematics and Physics abstactions, such as for formula translation and solution checkers. It was coded in C# and uses a Microsoft ASP.NET infrastructure. The second phase of the collaboration focused on "Innovation and Integrated Learning Environment for Engaging and Ever-changing Educational Content".[219] It involved using Buchanan developing a dynamic challenges in the generation for test questions. This allowed for template questions, and which could be used to generate ever-changing questions. Buchanan and Bright Red Publishing have continued to collaborate, and with 26 N5 books,[220] 20 Higher books,[221] and eight Advanced Higher Books. All of the code produced for the Digital Zone was written by Buchanan.

Cryptography

Buchanan teaches Network Security and Applied Cryptography in the School of Computing, Engineering and the Built Environment at Edinburgh Napier University, and his reseach focus is around digital identity, cryptography and blockchain. This applies into areas of health care[222] and cybersecurity.[223] He is the sole author and creator of ASecuritySite, and which hosts a wide range of cryptography applications, including within public key encryption, symmetric key encryption, digital signatures and key exchange methods.

Buchanan is documented as a passioniate believer in the power of cryptography in building a more trusted digital world, "I believe that we live in a digital world that was created in the 20th Century. We thus need to build a more trusted world, and put the rights of the citizen at the centre of this world. This new world will respect privacy, consent and ownership, and we should be able to trust every single transaction."[11] In July 2023, he was one of the 68 signatories on an open letter related to the UK's Online Safety Bill.[224]

For privacy-aware COVID-19 tracing, Buchanan collaborated on work related to the usage of privacy-aware blockchain methods and applied cryptography.[225][37][226] His work, too, has involved the creation of new methods to detect ransomware. This has included the discovery of encryption keys in memory,[227] and in the usage of entropy detection methods.[228]

Invited Talks and Engagements

Over the years Buchanan has presented at many events, and has a reputation for high impact, fun and engaging presentations. This has included live demonstrations of cyber security threats. With a documentary on Cyber Security, broadcast on Monday 8 November 2015, Buchanan and his team set up a fake Web site for hackers to gain access to, as part of the BBC Panorama programme.[229] In 2016, Buchanan was also included in the FutureScot list for the "Top 50 Scottish Tech People Who Are Changing The World".[230]

Invited talks

Examples of recent invited presentations include:

  • Apr 2017, presented an invited for Sidney Michaelson Memorial Lecture at the Edinburgh Science Festival.[231]
  • Oct 2017, presented an invited talk at Scotchain 17[232] at the RBS Gogarburn Campus.
  • Dec 2018, presented at FutureScot 2018 on innovation.[233]
  • Jun 2018, presented at the Crypto Valley Conference[234] on Blockchain Technology in Zug, Switzerland.
  • Jun 2019, presented on "Creating a more trusted, secure and citizen-focused world" at Cybersecurity (Public Sector) 2019.[235]
  • Oct 2019, presented an invited talk at Interrupt 19 at West Lothian College.[236]
  • Nov 2019, presented at invited talk on "The Risks of Cybersecurity" at Digit Expo 2019 in the Edinburgh International Conference Centre.[237]
  • Jun 2020, presented in the "Security and Resilience at the Heart of Transformation" session at Digital Scotland 2020.[238]
  • Mar 2021, presented "Innovation in Cybersecurity" at Scot-Secure Virtual Summit.[239]
  • Nov 2021, presented, "Cybersecurity Threats", at Digital Scotland 2021.[240]
  • Feb 2022, presented on "Building a more trusted digital world" at FutureScot Annual Conference.[241]
  • Feb 2023, presented in "The future of cybersecurity: Offering citizens a safer digital world, from digital signing, to quantum, AI defence and the blockchain" session at FutureScot Cybersecurity 2023.[242]

He regularly presents in the media, including with a podcast on the BBC World Service entitled, "Will we ever run out of cloud storage?".[243]

Interviews with World-leaders in Cryptography

Buchanan's passion for cryptography is evident from his social media presence, teaching and research. He has a deep interest in understanding the motivations and the lives of those who have led the way in cryptography. This passion has been integrated with his teaching through a series of talks entitled, "World-leaders in Cryptography".

Martin (Marty) Hellman - ACM Turing Award winner in 2015 - has appeared twice in this series, and who oulined his work as one of the co-creators of public key encryption, and on his work alongside Whitfield Diffie in the creation of the widely used Diffie-Hellman method. In an interview on 10 March 2023,[244] Hellman outlined an event in 1984 where Adi Shamir broke the Merkle-Hellman public key encryption method at a live Rump session at a conference.[245]

On 1 April 2023, Buchanan interviewed another Turing Prize Award winner - Len Adleman - and who outlined how Martin Gardner's opened up the world to the RSA method.[246] In Feb 2023, Buchanan interviewed Neal I. Koblitz[247] - the co-inventor of Elliptic Curve Cryptography (ECC) and Professor of Mathematics at the University of Washington. Within this interview,[248] Neal outlined how the work of Hendrick Lenstra showed how elliptic curves could be factoring large integers and attacking RSA, and it was this work his motivated him to co-invent Elliptic Curve Cryptography (ECC).

Another key inventor within public key encryption was Tahir ElGamal[249] - the creator of the ElGamal encryption and signature method. Buchanan interview him on 27 October 2022,[250] and outlined that his PhD supervisor (Martin Hellman) told him, "here are 12 problems that are not solvable at the current time, go investigate them".

In an interview on April 2023,[251] Torben P Pedersen[252] - the inventor of the Pedersen commitment - outlined, "At the time, there was also inefficient commitments, that had the property of being unconditionally hiding, and I thought it would be nice to have a verifiable secret share where you don’t have to rely on any computational assumptions, in order to be sure that your secret is not revealed when you do a secret share".[251]

Other interviews have include Jean-Philippe (JP) Aumasson[253] (co-inventor of the BLAKE hashing method) [254] on 11 February 2023, Professor Keith Martin[255] (from Royal Holloway, University of London) - on 3 July 2020,[256] and Nick Sullivan[257] - the Head of Research at Cloudflare - on 1 May 2020.[258]

Awards and recognition

Buchanan's awards and recent recognition includes:

  • In 2015, named in the "50 most influential UK higher education professionals on social media".[259]
  • In 2016, awarded "Cyber Evangelist of the Year" at the first Scottish Cybersecurity awards,[214] along with leading a project that was awarded the best collaborative project with Police Scotland.[260]
  • In 2016, gave a keynote talk on Cybersecurity at SISCA DEMOfest 2016.[261]
  • In 2016, included in the "The Digital List: 50 people from various areas of Scotland’s technology industries who are changing the world".[262]
  • In 2017, appointed Officer of the Order of the British Empire (OBE) in the 2017 Birthday Honours for services to cyber security, and was the first person to receive an OBE related to cyber security.[263]
  • From 2017-2021, appointed Chief Editor of the Journal of Cybersecurity Technology.[264]
  • In 2018, received an "Outstanding Contribution to Knowledge Exchange" award at the Scottish Knowledge Exchange awards.[265]
  • In 2018, appointed co-Chair on Technical Committee for IEEE Systems, Man, and Cybernetics Society (SMC) on Blockchain.[266]
  • In 2018, became a member of the IOTA Research Council.[267]
  • In 2019, presented a keynote talk at the 5th International Conference on Information Systems Security and Privacy (ICISSP).[268]
  • In 2019, awarded an Honorary Professorship from Spoleczna Akademia Nauk.[269]
  • In 2019, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[270]
  • From 2020, served as co-Chief Editor of Blockchain in Health Today.[271]
  • In 2020, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[272]
  • In 2020, Advanced Risk Modelling for Early Detection (ARMED) product won the ‘Innovation of the Year’ award at Scottish Knowledge Exchange Awards (with CM200 and Adrian Smales).[124]
  • In 2021, presented a keynote talk at the 14th International Conference on Security of Information and Networks.[273]
  • In 2021, winner of the Best Paper Award at 14th International Conference on Security of Information and Networks for the paper entitled, "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching".[274][275]
  • In 2022, the EU-funded GLASS project won the Leading Light Innovation Award at the Scottish Cyber Awards,[276] of which he is the Principal Investigator (PI) for the project.
  • In 2022, presented a keynote at talk entitled "The Future of Cryptography, Blockchain and Trust" at International Blockchain Summit Istanbul, 2022.[277]
  • In 2022, presented a keynote talk at Cyber Security 2023 in Cardiff.[278]
  • In 2023, appointed to the Advisory Board of the Zero Trust Special Interest Group.[279]
  • In 2023, awarded best Best Lecturer/Tutor in the School of Computing at Edinburgh Napier University within the student-nominated excellence awards.[280]
  • In 2023, appointed the co-Chair for Blockchain & FinTech within IEEE Blockchain Technical Community (BCTC).[281]

References

  1. ^ "School of Computing, Engineering & The Built Environment". www.napier.ac.uk. Retrieved 24 June 2023.
  2. ^ "Blockpass Identity Lab - Napier University". identity-lab.blockpass.org. Retrieved 18 August 2021.
  3. ^ "Centre for Cybersecurity, IoT & Cyberphysical Systems". Napier. Retrieved 24 June 2023.
  4. ^ "Bill Buchanan". Napier. Retrieved 2 August 2018.
  5. ^ "Buchanan & Demarco: Building a World-leading City in Arts & Science: 30-Apr-18". www.linkedin.com. Retrieved 1 August 2023.
  6. ^ "INSPIRED EDINBURGH HOME OF POWERFUL CONVERSATIONS - YouTube". www.youtube.com. Retrieved 1 August 2023.
  7. ^ "Professor Bill Buchanan OBE - Building A New World". INSPIRED EDINBURGH. 23 August 2017. Retrieved 1 August 2023.
  8. ^ "OBE awarded to Buchanan". Instagram. Retrieved 1 August 2023.
  9. ^ "@billatnapier". Twitter. Retrieved 1 August 2023.
  10. ^ "Professor Opens Up on His Love of Edinburgh, Cryptography and Innovation". Napier. Retrieved 1 August 2023.
  11. ^ a b "Welcome Bill Buchanan to the IOTA Research Council". IOTA Foundation Blog. 16 November 2018. Retrieved 1 August 2023.
  12. ^ "Primary schools - Victoria Primary School | Falkirk Council". www.falkirk.gov.uk. Retrieved 31 July 2023.
  13. ^ "Graeme High School Falkirk - Home Page". graemehigh.com. Retrieved 31 July 2023.
  14. ^ "History". CalaChem Fine Chemicals. Retrieved 31 July 2023.
  15. ^ "Royal Observatory Edinburgh". www.ukri.org. Retrieved 31 July 2023.
  16. ^ "Research Output". Napier. Retrieved 31 July 2023.
  17. ^ Ioannidis, John P. A. (10 October 2022). "September 2022 data-update for "Updated science-wide author databases of standardized citation indicators"". 4. Elsevier BV. doi:10.17632/btchxktzyw.4. {{cite journal}}: Cite journal requires |journal= (help)
  18. ^ "Profiles". scholar.google.com. Retrieved 2 August 2023.
  19. ^ McCulloch, Scott (5 May 2015). "Napier University to launch new International Cyber Academy". businessInsider. Retrieved 9 July 2023.
  20. ^ "2016 Research Awards -". Retrieved 9 July 2023.
  21. ^ "Security and So Many Things". asecuritysite.com. Retrieved 9 July 2023.
  22. ^ "Blockpass Identity Lab Furthers Research and Understanding". www.blockpass.org. Retrieved 9 July 2023.
  23. ^ "2017 – Research Excellence Awards". Retrieved 9 July 2023.
  24. ^ EP 2347366, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", published 2019-05-08, assigned to Fortinet Inc. 
  25. ^ a b US8887274B2, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11 
  26. ^ US 10979222, Lanc, David; Fan, Lu & Mackinnon, Lachlan et al., "Resilient secret sharing cloud based architecture for data vault", published 2021-04-13, assigned to Leading Software Ltd. 
  27. ^ GB application 2561176, Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "System and method for management of confidential data", published 2018-10-11, assigned to Edinburgh Napier University 
  28. ^ GB 2561177, Stevenson, Ian; Bruce, Ramsay & Buchanan, William Johnston et al., "Method for identification of digital content", published 2021-06-30, assigned to Cyan Forensics Ltd. 
  29. ^ US 9043867, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", published 2015-05-26, assigned to The Court of Edinburgh Napier University 
  30. ^ a b WO2018185455A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11 
  31. ^ a b WO2022195254A1, BUCHANAN, Bill; Mclaren, Peter & Gordon, Russell et al., "Detection of ransomware", issued 2022-09-22 
  32. ^ "BIL Launch Advances a Future of Self-Sovereign Identity". www.blockpass.org. Retrieved 31 July 2023.
  33. ^ "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 31 July 2023.
  34. ^ "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 31 July 2023.
  35. ^ Ali, Hisham; Ahmad, Jawad; Jaroucheh, Zakwan; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Lo, Owen; Abramson, Will; Buchanan, William J. (October 2022). "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform". Entropy. 24 (10): 1379. Bibcode:2022Entrp..24.1379A. doi:10.3390/e24101379. ISSN 1099-4300. PMC 9601302. PMID 37420400.
  36. ^ Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
  37. ^ a b Barati, Masoud; Buchanan, William J.; Lo, Owen; Rana, Omer (7 February 2022). "A privacy-preserving distributed platform for COVID-19 vaccine passports". Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. UCC '21. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3492323.3495626. ISBN 978-1-4503-9163-4. S2CID 246635492.
  38. ^ Papadopoulos, Pavlos; Pitropakis, Nikolaos; Buchanan, William J.; Lo, Owen; Katsikas, Sokratis (September 2020). "Privacy-Preserving Passive DNS". Computers. 9 (3): 64. doi:10.3390/computers9030064. ISSN 2073-431X.
  39. ^ Jaroucheh, Zakwan; Alissa, Mohamad; Buchanan, William J; Liu, Xiaodong (July 2020). "TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies". 2020 IEEE 44th Annual Computers, Software, and Applications Conference (COMPSAC). pp. 1235–1240. doi:10.1109/COMPSAC48688.2020.00-87. ISBN 978-1-7281-7303-0.
  40. ^ a b "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
  41. ^ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
  42. ^ England, Higher Funding Council of. "Guidance on REF 2021 results - REF 2021". Higher Education Funding Council for England. Retrieved 24 June 2023.
  43. ^ "Unit of assessment 11: Computer Science and Informatics : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 24 June 2023.
  44. ^ "Chaloner Chute". www.dhi-scotland.comhttps. Retrieved 6 August 2023.
  45. ^ "Muhammad Imran". ieeexplore.ieee.org. Retrieved 6 August 2023.
  46. ^ "Professor Jill Pell". www.ukri.org. Retrieved 6 August 2023.
  47. ^ "Claudia Pagliari". The University of Edinburgh. 1 February 2023. Retrieved 6 August 2023.
  48. ^ "Sanna Rimpilainen". University of Strathclyde. Retrieved 6 August 2023.
  49. ^ Buchanan, William; Imran, Muhammad; Pagliari, Claudia; Pell, Jill; Rimpiläinen, Sanna (14 July 2020). Use of Participatory Apps in Contact Tracing – Options and Implications for Public Health, Privacy and Trust (Report). Glasgow: University of Strathclyde. doi:10.17868/73197.
  50. ^ Xu, Hao; Zhang, Lei; Onireti, Oluwakayode; Fang, Yang; Buchanan, William J.; Imran, Muhammad Ali (March 2021). "BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond". IEEE Internet of Things Journal. 8 (5): 3915–3929. doi:10.1109/JIOT.2020.3025953. ISSN 2327-4662. S2CID 218718736.
  51. ^ Barati, Masoud; Buchanan, William J.; Lo, Owen; Rana, Omer (7 February 2022). "A privacy-preserving distributed platform for COVID-19 vaccine passports". Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion. UCC '21. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3492323.3495626. ISBN 978-1-4503-9163-4. S2CID 246635492.
  52. ^ Buchanan, William J.; Imran, Muhammad Ali; Ur-Rehman, Masood; Zhang, Lei; Abbasi, Qammer H.; Chrysoulas, Christos; Haynes, David; Pitropakis, Nikolaos; Papadopoulos, Pavlos (2020). "Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing". Frontiers in Communications and Networks. 1. doi:10.3389/frcmn.2020.583376. ISSN 2673-530X.
  53. ^ Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). 1: 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
  54. ^ "Bill Buchanan". Napier. Retrieved 24 July 2023.
  55. ^ "MARIAN Mobile Agents for Routing in AdHoc Networks". Napier. Retrieved 24 July 2023.
  56. ^ "Forensic verification of operating system activity via novel data acquisition and analysis". Napier. Retrieved 24 July 2023.
  57. ^ "Cryptographic privacypreserving enhancement method for investigative data acquisition". Napier. Retrieved 24 July 2023.
  58. ^ "HIRisk a sociotechnical method to identify and monitor heathcare information security risks in". Napier. Retrieved 24 July 2023.
  59. ^ "a pattern driven corpus to predictive analytics in mitigating sql injection attack". Napier. Retrieved 24 July 2023.
  60. ^ "forensic analysis of large capacity digital storage devices". Napier. Retrieved 24 July 2023.
  61. ^ "embedded document security using sticky policies and identity based encryption". Napier. Retrieved 24 July 2023.
  62. ^ "test bed and evaluation of a home based adverse event prediction infrastructure". Napier. Retrieved 24 July 2023.
  63. ^ "investigations into decrypting live secure traffic in virtual environments". Napier. Retrieved 24 July 2023.
  64. ^ "privacy preserving systems around security trust and identity". Napier. Retrieved 24 July 2023.
  65. ^ "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 27 July 2023.
  66. ^ "ktp miracl". Napier. Retrieved 27 July 2023.
  67. ^ "truelect". Napier. Retrieved 27 July 2023.
  68. ^ "trust and privacy preserving computing platform for crossborder federation of personal". Napier. Retrieved 27 July 2023.
  69. ^ "ai based privacy preserving biometric authentication with mass market smart devices". Napier. Retrieved 27 July 2023.
  70. ^ "cyber hunt". Napier. Retrieved 27 July 2023.
  71. ^ "phd studentship homomorphic encryption". Napier. Retrieved 27 July 2023.
  72. ^ a b "memcrypt hgsp". Napier. Retrieved 27 July 2023.
  73. ^ "Data Capture and Auto Identification Reference". napier-repository.worktribe.com. Retrieved 4 August 2023.
  74. ^ "Homepage". Chelsea and Westminster Hospital NHS Foundation Trust. Retrieved 4 August 2023.
  75. ^ "GS1 UK | The Global Language of Business". www.gs1uk.org. Retrieved 4 August 2023.
  76. ^ Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing: 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
  77. ^ "Home - Emeritus Professor Derek Bell". www.imperial.ac.uk. Retrieved 4 August 2023.
  78. ^ "Christoph Thuemmler". scholar.google.com. Retrieved 4 August 2023.
  79. ^ "Prof Christoph Thuemmler". napier-repository.worktribe.com. Retrieved 4 August 2023.
  80. ^ "Lu Fan". scholar.google.com. Retrieved 4 August 2023.
  81. ^ Thuemmler, Christoph; Buchanan, William; Fekri, Amir Hesam; Lawson, Alistair (2009). "Radio frequency identification (RFID) in pervasive healthcare". International Journal of Healthcare Technology and Management. 10 (1/2): 119. doi:10.1504/IJHTM.2009.023731. ISSN 1368-2156.
  82. ^ Thuemmler, C.; Buchanan, W.; Kumar, V. (2007). "Setting safety standards by designing a low-budget and compatible patient identification system based on passive RFID technology". International Journal of Healthcare Technology and Management. 8 (5): 571. doi:10.1504/IJHTM.2007.013524. ISSN 1368-2156.
  83. ^ "Owen Lo". Napier. Retrieved 4 August 2023.
  84. ^ updates (2 March 2022). "Cyan Forensics changes its name to Cyacomb". ScotlandIS. Retrieved 4 August 2023.
  85. ^ "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 4 August 2023.
  86. ^ Ekonomou, E.; Fan, L.; Buchanan, W.; Thuemmler, C. (November 2011). "An Integrated Cloud-based Healthcare Infrastructure". 2011 IEEE Third International Conference on Cloud Computing Technology and Science: 532–536. doi:10.1109/CloudCom.2011.80. ISBN 978-1-4673-0090-2. S2CID 18718402.
  87. ^ Cloud4Health - Outline, retrieved 4 August 2023
  88. ^ Cloud4Health - Overview - Scotland IS Video Submission, retrieved 4 August 2023
  89. ^ "distributed single sign on stack on e governance paradigm based on a distributed 1". Napier. Retrieved 28 July 2023.
  90. ^ "Home". GLASS-H2020. Retrieved 28 July 2023.
  91. ^ EU Commission. "SinGLe Sign-on eGovernAnce paradigm based on a distributed file exchange network for Security, transparency, cost effectiveness and truSt".
  92. ^ Lo, Owen; Buchanan, William J.; Sayeed, Sarwar; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Chrysoulas, Christos (January 2022). "GLASS: A Citizen-Centric Distributed Data-Sharing Model within an e-Governance Architecture". Sensors. 22 (6): 2291. arXiv:2203.08781. Bibcode:2022Senso..22.2291L. doi:10.3390/s22062291. ISSN 1424-8220. PMC 8949250. PMID 35336462.
  93. ^ Kelly, Ross (24 November 2022). "Winners Announced at 2022 Scottish Cyber Awards". DIGIT. Retrieved 28 July 2023.
  94. ^ "Migration and Home Affairs". commission.europa.eu. Retrieved 2 August 2023.
  95. ^ "Research Output". Napier. Retrieved 2 August 2023.
  96. ^ Buchanan, William J.; Ramsay, Bruce; Macfarlane, Richard; Smales, Adrian; Keane, Eamonn; Callahan, Cormac; Blazic, Borka Jerman; Popov, Oliver (3 September 2015). "Evaluation of the DFET Cloud". {{cite journal}}: Cite journal requires |journal= (help)
  97. ^ "vSOC Virtualised Security Operations Centre". Napier. Retrieved 2 August 2023.
  98. ^ "virtualised security operations centre vsoc ktp". Napier. Retrieved 2 August 2023.
  99. ^ "Home". The Data Lab. Retrieved 2 August 2023.
  100. ^ "Cyber & Data". asecuritysite.com. Retrieved 2 August 2023.
  101. ^ "Owen Lo". scholar.google.com. Retrieved 5 August 2023.
  102. ^ "Nilupulee Gunathilake". Napier. Retrieved 5 August 2023.
  103. ^ "Bare Metal Forensics Pattern Analysis Heuristics Data Analysis". Napier. Retrieved 5 August 2023.
  104. ^ Lo, Owen; Buchanan, William J.; Carson, Douglas (2 April 2017). "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)". Journal of Cyber Security Technology. 1 (2): 88–107. doi:10.1080/23742917.2016.1231523. ISSN 2374-2917. S2CID 114293257.
  105. ^ Practical side-channel attacks on embedded device cryptography: Dr Owen Lo and Doug Carson, retrieved 5 August 2023
  106. ^ "International Conference on Cryptography and High Performance Computing". The Cyber Academy. 30 April 2016. Retrieved 5 August 2023.
  107. ^ Lo, Owen; Buchanan, William J.; Carson, Douglas (27 August 2018). "Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device". Proceedings of the 13th International Conference on Availability, Reliability and Security. ARES 2018. New York, NY, USA: Association for Computing Machinery. pp. 1–6. doi:10.1145/3230833.3232801. ISBN 978-1-4503-6448-5. S2CID 51980728.
  108. ^ Gunathilake, Nilupulee A.; Al-Dubai, Ahmed; Buchanan, William J.; Lo, Owen (January 2022). "Electromagnetic Side-Channel Attack Resilience against PRESENT Lightweight Block Cipher". 2022 6th International Conference on Cryptography, Security and Privacy (CSP): 51–55. doi:10.1109/CSP55486.2022.00018. ISBN 978-1-6654-7975-2. S2CID 245424991.
  109. ^ "investigations into decrypting live secure traffic in virtual environments". Napier. Retrieved 5 August 2023.
  110. ^ "memcrypt hgsp". Napier. Retrieved 5 August 2023.
  111. ^ "CyberASAP - Innovate UK KTN". Retrieved 5 August 2023.
  112. ^ "memcrypt". Napier. Retrieved 5 August 2023.
  113. ^ "memcrypt cyberasap phase 2". Napier. Retrieved 5 August 2023.
  114. ^ "MEMCRYPT LIMITED overview - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 5 August 2023.
  115. ^ McLaren, Peter; Russell, Gordon; Buchanan, Bill (July 2017). "Mining malware command and control traces". 2017 Computing Conference: 788–794. doi:10.1109/SAI.2017.8252185. ISBN 978-1-5090-5443-5. S2CID 32469879.
  116. ^ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 June 2020). "Evaluation of live forensic techniques in ransomware attack mitigation". Forensic Science International: Digital Investigation. 33: 300979. doi:10.1016/j.fsidi.2020.300979. ISSN 2666-2817.
  117. ^ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 September 2021). "Differential area analysis for ransomware attack detection within mixed file datasets". Computers & Security. 108: 102377. doi:10.1016/j.cose.2021.102377. ISSN 0167-4048. S2CID 235658473.
  118. ^ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (October 2021). "Review of Current Ransomware Detection Techniques". 2021 International Conference on Engineering and Emerging Technologies (ICEET): 1–6. doi:10.1109/ICEET53442.2021.9659643. ISBN 978-1-6654-2714-2. S2CID 245708554.
  119. ^ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (October 2022). "Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification". Entropy. 24 (10): 1503. arXiv:2210.13376. Bibcode:2022Entrp..24.1503D. doi:10.3390/e24101503. ISSN 1099-4300. PMC 9601406. PMID 37420524.
  120. ^ "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 2 August 2023.
  121. ^ "Digital Health & Care Innovation Centre". www.dhi-scotland.comhttps. Retrieved 2 August 2023.
  122. ^ "e frail phase 2". Napier. Retrieved 2 August 2023.
  123. ^ CM2000 ARMED Solution, retrieved 2 August 2023
  124. ^ a b "Wearable tech scoops two prizes for supporting independent living". Med-Tech Innovation. 11 March 2020. Retrieved 2 August 2023.
  125. ^ "Blockchain technology to be used to monitor medical devices". Napier. Retrieved 2 August 2023.
  126. ^ "health blockchain". Napier. Retrieved 2 August 2023.
  127. ^ "next generation trust architecture". Napier. Retrieved 2 August 2023.
  128. ^ "next generation connectivity with health and well being". Napier. Retrieved 2 August 2023.
  129. ^ "phd studentship homomorphic encryption". Napier. Retrieved 2 August 2023.
  130. ^ Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing (PDF). pp. 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
  131. ^ Thuemmler, Christoph; Fan, Lu; Buchanan, William; Lo, Owen; Ekonomou, Elias; Khedim, Abou Sofyane (10 January 2012). "E-Health: Chances and Challenges of Distributed, Service oriented Architectures". Journal of Cyber Security and Mobility: 37–52. doi:10.13052/jcsm2245-1439.113. ISSN 2245-4578.
  132. ^ van Deursen, Nicole; Buchanan, William J.; Duff, Alistair (1 September 2013). "Monitoring information security risks within health care". Computers & Security. 37: 31–45. doi:10.1016/j.cose.2013.04.005. ISSN 0167-4048.
  133. ^ Thuemmler, Christoph; Rolffs, Claudia; Bollmann, Andreas; Hindricks, Gerhard; Buchanan, William (October 2018). "Requirements for 5G based telemetric cardiac monitoring". 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). pp. 1–4. doi:10.1109/WiMOB.2018.8589139. ISBN 978-1-5386-6876-4. S2CID 57189925.
  134. ^ Bell, Liam; Buchanan, William J.; Cameron, Jonathan; Lo, Owen (29 May 2018). "Applications of Blockchain Within Healthcare". Blockchain in Healthcare Today. 1. doi:10.30953/bhty.v1.8. ISSN 2573-8240. S2CID 169773440.
  135. ^ Abubakar, Mwrwan; McCarron, Pádraig; Jaroucheh, Zakwan; Al Dubai, Ahmed; Buchanan, Bill (December 2021). "Blockchain-based Platform for Secure Sharing and Validation of Vaccination Certificates". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. arXiv:2112.10124. doi:10.1109/SIN54109.2021.9699221. ISBN 978-1-7281-9266-6. S2CID 245334671.
  136. ^ "SmpliCare". Smplicare.com. Retrieved 2 August 2023.
  137. ^ Xu, Hao; Zhang, Lei; Onireti, Oluwakayode; Fang, Yang; Buchanan, William J.; Imran, Muhammad Ali (2021). "BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond". IEEE Internet of Things Journal. 8 (5): 3915–3929. doi:10.1109/JIOT.2020.3025953. ISSN 2327-4662. S2CID 218718736.
  138. ^ Popov, Serguei; Buchanan, William J. (1 January 2021). "FPC-BI: Fast Probabilistic Consensus within Byzantine Infrastructures". Journal of Parallel and Distributed Computing. 147: 77–86. doi:10.1016/j.jpdc.2020.09.002. ISSN 0743-7315. S2CID 198179629.
  139. ^ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (1 September 2021). "Differential area analysis for ransomware attack detection within mixed file datasets". Computers & Security. 108: 102377. doi:10.1016/j.cose.2021.102377. ISSN 0167-4048. S2CID 235658473.
  140. ^ Li, Shancang; Choo, Kim-Kwang Raymond; Sun, Qindong; Buchanan, William J.; Cao, Jiuxin (2019). "IoT Forensics: Amazon Echo as a Use Case". IEEE Internet of Things Journal. 6 (4): 6487–6497. doi:10.1109/JIOT.2019.2906946. ISSN 2327-4662. S2CID 149509079.
  141. ^ Masood, Fawad; Driss, Maha; Boulila, Wadii; Ahmad, Jawad; Rehman, Sadaqat Ur; Jan, Sana Ullah; Qayyum, Abdullah; Buchanan, William J. (1 November 2022). "A Lightweight Chaos-Based Medical Image Encryption Scheme Using Random Shuffling and XOR Operations". Wireless Personal Communications. 127 (2): 1405–1432. doi:10.1007/s11277-021-08584-z. ISSN 1572-834X. S2CID 235692068.
  142. ^ Lo, Owen; Buchanan, William J.; Carson, Douglas (2 April 2017). "Power analysis attacks on the AES-128 S-box using differential power analysis (DPA) and correlation power analysis (CPA)". Journal of Cyber Security Technology. 1 (2): 88–107. doi:10.1080/23742917.2016.1231523. ISSN 2374-2917. S2CID 114293257.
  143. ^ Kim, Tai-Hoon; Goyat, Rekha; Rai, Mritunjay Kumar; Kumar, Gulshan; Buchanan, William J.; Saha, Rahul; Thomas, Reji (2019). "A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks". IEEE Access. 7: 184133–184144. doi:10.1109/ACCESS.2019.2960609. ISSN 2169-3536. S2CID 209696506.
  144. ^ Sieklik, Boris; Macfarlane, Richard; Buchanan, William J. (1 March 2016). "Evaluation of TFTP DDoS amplification attack". Computers & Security. 57: 67–92. doi:10.1016/j.cose.2015.09.006. ISSN 0167-4048.
  145. ^ "University spinout becomes part of the Fortinet family". Napier. Retrieved 7 March 2021.
  146. ^ OSullivan, Kevin (22 June 2017). "Prof Bill Buchanan rewarded with OBE for cyber security work". FutureScot. Retrieved 7 March 2021.
  147. ^ "Spinout set to revolutionise digital forensics worldwide". Napier. Retrieved 7 March 2021.
  148. ^ "Fortinet acquires ZoneFox". Fortinet. Retrieved 7 March 2021.
  149. ^ "Ping Identity to Acquire Symphonic Software to Accelerate Dynamic Authorization for Enterprises Pursuing Zero Trust Identity Security". www.pingidentity.com. Retrieved 7 March 2021.
  150. ^ Pete (30 January 2019). "Q&A: Jamie Graves, Founder and Former CEO, ZoneFox". DIGIT. Retrieved 27 July 2023.
  151. ^ "Forensic verification of operating system activity via novel data acquisition and analysis". Napier. Retrieved 27 July 2023.
  152. ^ Graves, Jamie (31 December 2009). "Forensic verification of operating system activity via novel data, acquisition and analysis techniques". {{cite journal}}: Cite journal requires |journal= (help)
  153. ^ "ZONEFOX HOLDINGS LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
  154. ^ GB0816556D0, "Improvements in or relating to digital forensics", issued 2008-10-15 
  155. ^ US8887274B2, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Digital forensics", issued 2014-11-11 
  156. ^ WO2010029346A1, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", issued 2010-03-18 
  157. ^ a b EP2347366B1, Buchanan, William Johnston; Graves, Jamie Robert & Bose, Niladri, "Improvements in or relating to digital forensics", issued 2019-05-08 
  158. ^ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
  159. ^ "DigitalDNA". Napier. Retrieved 27 July 2023.
  160. ^ "US takeover for Scottish cyber security firm ZoneFox". BBC News. 23 October 2018. Retrieved 27 July 2023.
  161. ^ ronaitken (4 February 2021). "Royal Society fund two Entrepreneur in Residence appointments". The School of Applied Sciences. Retrieved 27 July 2023.
  162. ^ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
  163. ^ Raywood, Dan (2 November 2020). "Ping Identity Acquires Symphonic to Boost API and Data Security Offering". Infosecurity Magazine. Retrieved 27 July 2023.
  164. ^ "Information Sharing between the Police and their Community Partners". Napier. Retrieved 27 July 2023.
  165. ^ US9043867B2, Uthmani, Omair; Buchanan, William & Lawson, Alistair et al., "Information sharing", issued 2015-05-26 
  166. ^ a b WO2014108678A1, UTHMANI, Omair; Buchanan, William & Lawson, Alistair et al., "Improved information sharing", issued 2014-07-17 
  167. ^ Fan, L.; Buchanan, W.; Thummler, C.; Lo, O.; Khedim, A.; Uthmani, O.; Lawson, A.; Bell, D. (July 2011). "DACAR Platform for eHealth Services Cloud". 2011 IEEE 4th International Conference on Cloud Computing (PDF). pp. 219–226. doi:10.1109/CLOUD.2011.31. ISBN 978-1-4577-0836-7. S2CID 14062712.
  168. ^ "Data Capture and Auto Identification Reference". Napier. Retrieved 27 July 2023.
  169. ^ "scalable and open framework for humandigital trust between informalformal personal". Napier. Retrieved 27 July 2023.
  170. ^ Fan, Lu; Buchanan, William J.; Lo, Owen; Thuemmler, Christoph; Lawson, Alistair; Uthmani, Omair; Ekonomou, Elias; Khedim, Abou Sofyane (31 December 2012). "SPoC: Protecting Patient Privacy for e-Health Services in the Cloud". {{cite journal}}: Cite journal requires |journal= (help)
  171. ^ "saFire". Napier. Retrieved 2 August 2023.
  172. ^ "Derick James, Symphonic Software". www.sourcesecurity.com. Retrieved 27 July 2023.
  173. ^ "Niall Burns | F6S Member Profile". F6S. Retrieved 27 July 2023.
  174. ^ "Ping Identity Aquires Symphonic Software to Accelerate Dynamic Authorization for Enterprises Pursuing Zero Trust Identity Security". www.parequity.com. 3 November 2020. Retrieved 27 July 2023.
  175. ^ updates (4 November 2020). "Ping Identity to Acquires Symphonic Software". ScotlandIS. Retrieved 27 July 2023.
  176. ^ MarketScreener (2 November 2020). "Ping Identity Holding Corp. acquired Symphonic Software for $32 million". www.marketscreener.com. Retrieved 27 July 2023.
  177. ^ "Rich Macfarlane". Napier. Retrieved 4 August 2023.
  178. ^ "forensic analysis of large capacity digital storage devices". Napier. Retrieved 27 July 2023.
  179. ^ GB2561177B, Ian, Stevenson; Bruce, Ramsay & William, Johnston Buchanan et al., "Method for identification of digital content", issued 2021-06-30 
  180. ^ EP3607467A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2020-02-12 
  181. ^ CA3059013A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2018-10-11 
  182. ^ US20210294878A1, Buchanan, William Johnston; LO, Owen Chin Wai & PENROSE, Philip et al., "Method for reducing false-positives for identification of digital content", issued 2021-09-23 
  183. ^ "Fragment Finder". Napier. Retrieved 27 July 2023.
  184. ^ "CYACOMB LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
  185. ^ "Team Biographies". Cyacomb. Retrieved 27 July 2023.
  186. ^ updates (2 March 2022). "Cyan Forensics changes its name to Cyacomb". ScotlandIS. Retrieved 27 July 2023.
  187. ^ "Cyacomb Awarded as Technology Pioneer by World Economic Forum". Cyacomb. Retrieved 27 July 2023.
  188. ^ MacRae, Duncan (19 November 2019). "Edinburgh Tech Startup Cyan Forensics Scoops Award at GovTech Summit". DIGIT. Retrieved 27 July 2023.
  189. ^ "Double success at the Scottish Cyber Awards". Napier. Retrieved 27 July 2023.
  190. ^ "Cyacomb (formerly Cyan Forensics)". www.parequity.com. 30 March 2021. Retrieved 27 July 2023.
  191. ^ "Cyacomb Open Letter to the Secretary of State for Digital, Culture Media and Sport". Cyacomb. Retrieved 27 July 2023.
  192. ^ updates (26 May 2021). "Edinburgh Napier spin-out appoints Pete Jaco as CEO to tackle growing ransomware threat". ScotlandIS. Retrieved 25 November 2021.
  193. ^ McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
  194. ^ McLaren, Peter; Russell, Gordon; Buchanan, William J.; Tan, Zhiyuan (1 June 2019). "Decrypting live SSH traffic in virtual environments". Digital Investigation. 29: 109–117. doi:10.1016/j.diin.2019.03.010. ISSN 1742-2876. S2CID 133574611.
  195. ^ "Impact case study : Results and submissions : REF 2021". results2021.ref.ac.uk. Retrieved 27 July 2023.
  196. ^ "Home". Memcrypt. Retrieved 25 November 2021.
  197. ^ "memcrypt cyberasap phase 2". Napier. Retrieved 27 July 2023.
  198. ^ Editor, DIGIT (6 October 2020). "Edinburgh Napier University Spinout Memcrypt to Fight Ransomware". DIGIT. Retrieved 27 July 2023. {{cite web}}: |last= has generic name (help)
  199. ^ "MEMCRYPT LIMITED filing history - Find and update company information - GOV.UK". find-and-update.company-information.service.gov.uk. Retrieved 27 July 2023.
  200. ^ "University spinout honoured at Scottish Cyber Awards 2021". Napier. Retrieved 25 November 2021.
  201. ^ a b "News Details". staff.napier.ac.uk. Retrieved 9 July 2023.
  202. ^ "Minister learns how pupils benefit from business-academic partnership | Interface Knowledge Connection". interface-online.org.uk. 2 May 2017. Retrieved 8 November 2021.
  203. ^ "vSOC Virtualised Security Operations Centre". Napier. Retrieved 24 June 2023.
  204. ^ "CipherCTF". asecuritysite.com. Retrieved 22 July 2023.
  205. ^ "Cisco Simulators". asecuritysite.com. Retrieved 22 July 2023.
  206. ^ Buchanan, Bill. "ASecuritySite: When Bob Met Alice". ASecuritySite: When Bob Met Alice. Retrieved 24 June 2023.{{cite web}}: CS1 maint: url-status (link)
  207. ^ "Bill Buchanan OBE - YouTube". www.youtube.com. Retrieved 24 June 2023.
  208. ^ "ASecuritySite Podcast on Apple Podcasts". Apple Podcasts. 22 July 2023. Retrieved 22 July 2023.
  209. ^ "ASecuritySite Podcast". Spotify. Retrieved 22 July 2023.
  210. ^ Buchanan, Bill. ASecuritySite Podcast. Audible.
  211. ^ "Excellence Awards - The Winners". www.napierstudents.com. Retrieved 2 August 2023.
  212. ^ "Excellence Awards - The Winners". www.napierstudents.com. Retrieved 2 August 2023.
  213. ^ "Excellence Awards 2023 Nominees". www.napierstudents.com. Retrieved 2 August 2023.
  214. ^ a b Scottish Cyber Awards 2017 with Prof Bill Buchanan of Napier University, retrieved 28 October 2022
  215. ^ "Bright Red Publishing Blog". Bright Red Publishing Blog. 17 October 2018. Retrieved 30 July 2023.
  216. ^ "Integration of Stimulating and Engaging Education Assessments". Napier. Retrieved 30 July 2023.
  217. ^ Online, Interface. "Interface Online | Interface Knowledge Connection | Academia". Interface Online. Retrieved 30 July 2023.
  218. ^ "BrightRED DIGITAL ZONE". www.brightredbooks.net. Retrieved 30 July 2023.
  219. ^ "innovation and integrated learning environment for engaging and ever changing educational". Napier. Retrieved 30 July 2023.
  220. ^ "Bright Red Publishing Home Page". www.brightredbooks.net. Retrieved 30 July 2023.
  221. ^ "Bright Red Publishing Home Page". www.brightredbooks.net. Retrieved 30 July 2023.
  222. ^ Stamatellis, Charalampos; Papadopoulos, Pavlos; Pitropakis, Nikolaos; Katsikas, Sokratis; Buchanan, William J. (January 2020). "A Privacy-Preserving Healthcare Framework Using Hyperledger Fabric". Sensors. 20 (22): 6587. arXiv:2011.09260. Bibcode:2020Senso..20.6587S. doi:10.3390/s20226587. ISSN 1424-8220. PMC 7698751. PMID 33218022.
  223. ^ Masood, Fawad; Boulila, Wadii; Ahmad, Jawad; Arshad; Sankar, Syam; Rubaiee, Saeed; Buchanan, William J. (January 2020). "A Novel Privacy Approach of Digital Aerial Images Based on Mersenne Twister Method with DNA Genetic Encoding and Chaos". Remote Sensing. 12 (11): 1893. Bibcode:2020RemS...12.1893M. doi:10.3390/rs12111893. ISSN 2072-4292.
  224. ^ Lomas, Natasha (5 July 2023). "Security researchers latest to blast UK's Online Safety Bill as encryption risk". TechCrunch. Retrieved 1 August 2023.
  225. ^ Xu, Hao; Zhang, Lei; Onireti, Oluwakayode; Fang, Yang; Buchanan, William J.; Imran, Muhammad Ali (March 2021). "BeepTrace: Blockchain-Enabled Privacy-Preserving Contact Tracing for COVID-19 Pandemic and Beyond". IEEE Internet of Things Journal. 8 (5): 3915–3929. doi:10.1109/JIOT.2020.3025953. ISSN 2327-4662. S2CID 218718736.
  226. ^ Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
  227. ^ McLaren, Peter; Buchanan, William J.; Russell, Gordon; Tan, Zhiyuan (1 October 2019). "Deriving ChaCha20 key streams from targeted memory analysis". Journal of Information Security and Applications. 48: 102372. doi:10.1016/j.jisa.2019.102372. ISSN 2214-2126. S2CID 198968271.
  228. ^ Davies, Simon R.; Macfarlane, Richard; Buchanan, William J. (October 2022). "Comparison of Entropy Calculation Methods for Ransomware Encrypted File Identification". Entropy. 24 (10): 1503. arXiv:2210.13376. Bibcode:2022Entrp..24.1503D. doi:10.3390/e24101503. ISSN 1099-4300. PMC 9601406. PMID 37420524.
  229. ^ "BBC Panorama".
  230. ^ "The Digital List". FutureScot. 24 February 2016. Retrieved 28 March 2022.
  231. ^ "@asmales". Twitter. Retrieved 18 July 2023.
  232. ^ MBN Solutions: ScotChain17 - Towards Truly Smart Cities and Communities, retrieved 9 July 2023
  233. ^ "@TheresaSwayne". Twitter. Retrieved 18 July 2023.
  234. ^ 2018 Crypto Valley Conference: Day 2 - William Buchanan - Napier University, retrieved 9 July 2023
  235. ^ "Agenda: Cyber Security Scotland 2019". canongate.swoogo.com. Retrieved 18 July 2023.
  236. ^ Interrupt19: Bill Buchanan OBE PhD FBCS, retrieved 5 August 2023
  237. ^ "@simonianrobb". Twitter. Retrieved 18 July 2023.
  238. ^ "Digital Scotland 2020 - Virtual Event - 01 Dec 20". canongate.swoogo.com. Retrieved 18 July 2023.
  239. ^ Kelly, Ross (10 March 2021). "Scot-Secure 2021 Virtual Summit | Just Two Weeks to Go!". DIGIT. Retrieved 6 August 2023.
  240. ^ "DigitalScotland 2021". FutureScot. Retrieved 6 August 2023.
  241. ^ "@Futurescot_News". Twitter. Retrieved 18 July 2023.
  242. ^ "Cyber Security 2023". FutureScot. Retrieved 18 July 2023.
  243. ^ "BBC World Service - The Inquiry, Will we ever run out of cloud storage?". BBC. Retrieved 9 July 2023.
  244. ^ World-leaders in Cryptography: Martin Hellman, retrieved 3 August 2023
  245. ^ World-leaders in Cryptography: Len Adleman, retrieved 3 August 2023
  246. ^ "Mathematical Games, August 1977". Scientific American. doi:10.1038/scientificamerican0877-120. Retrieved 3 August 2023.
  247. ^ "Neal I. Koblitz | Department of Mathematics | University of Washington". math.washington.edu. Retrieved 3 August 2023.
  248. ^ An Interview With Neal Koblitz (part of World-leaders in Cryptography series), retrieved 3 August 2023
  249. ^ testsiteadmin (27 September 2019). "Taher Elgamal, 2019". The Marconi Society. Retrieved 3 August 2023.
  250. ^ World-leaders in Cryptography: Taher ElGamal, retrieved 3 August 2023
  251. ^ a b World Leaders in Cryptography: Torben P Pedersen, retrieved 3 August 2023
  252. ^ Concordium (10 June 2020). "From the Pedersen Commitment to Concordium". Concordium. Retrieved 3 August 2023.
  253. ^ "Jean-Philippe Aumasson". www.aumasson.jp. Retrieved 3 August 2023.
  254. ^ World-leaders in Cryptography: Jean-Philippe (JP) Aumasson, retrieved 3 August 2023
  255. ^ "Keith's Electronic Domicile". www.isg.rhul.ac.uk. Retrieved 3 August 2023.
  256. ^ World Leaders in Cryptography: Professor Keith Martin, retrieved 3 August 2023
  257. ^ "Cloudflare Research". research.cloudflare.com. Retrieved 3 August 2023.
  258. ^ World-leaders in Cryptography: Nick Sullivan, retrieved 3 August 2023
  259. ^ "The 50 most influential UK higher education professionals on social media". Times Higher Education (THE). 7 October 2015. Retrieved 9 July 2023.
  260. ^ "University dominates Scottish Cyber Awards". Napier. Retrieved 28 October 2022.
  261. ^ "SICSA DEMOfest 2016 – Delegate Registration now open!". SICSA - The Scottish Informatics & Computer Science Alliance. 20 September 2016. Retrieved 9 July 2023.
  262. ^ O'Sullivan, Kevin (24 February 2016). "The Digital List". FutureScot. Retrieved 9 July 2023.
  263. ^ "Judy Murray among Scots on honours list". BBC News. 16 June 2017. Retrieved 9 July 2023.
  264. ^ Taylor and Francis Online (9 July 2023). "Journal for Cybersecurity Technology". Journal for Cybersecurity Technology. Retrieved 9 July 2023.{{cite web}}: CS1 maint: url-status (link)
  265. ^ "Scottish Knowledge Exchange Awards 2018 Winners announced - Innovate UK KTN". 26 February 2018. Retrieved 9 July 2023.
  266. ^ ieeesmc (10 July 2018). "New TC Chair and Co-Chairs on Blockchain". IEEE SMC. Retrieved 9 July 2023.
  267. ^ "Welcome Bill Buchanan to the IOTA Research Council". IOTA Foundation Blog. 16 November 2018. Retrieved 18 July 2023.
  268. ^ ICISSP (9 July 2023). "Keynote Lectures". ICISSP 2019 Keynote Lectures. Retrieved 9 July 2023.{{cite web}}: CS1 maint: url-status (link)
  269. ^ Buchanan, William (1 November 2023). "Honorary Professorship from Spoleczna Akademia Auk". www.instagram.com. Retrieved 28 July 2023.
  270. ^ "Excellence Awards - The Winners - Edinburgh Napier Students' Association". www.napierstudents.com. Retrieved 18 August 2021.
  271. ^ "Editorial Team | Blockchain in Healthcare Today". blockchainhealthcaretoday.com. Retrieved 9 July 2023.
  272. ^ "Excellence Awards - The Winners - Edinburgh Napier Students' Association". www.napierstudents.com. Retrieved 18 August 2021.
  273. ^ "SINCONF 2021". www.sinconf.org. Retrieved 9 July 2023.
  274. ^ "SINFCON 2023 Closing Session" (PDF). SINCONF 2021. 17 December 2021. Retrieved 19 July 2023.
  275. ^ Abramson, Will; Buchanan, William J.; Sayeed, Sarwar; Pitropakis, Nikolaos; Lo, Owen (December 2021). "PAN-DOMAIN: Privacy-preserving Sharing and Auditing of Infection Identifier Matching". 2021 14th International Conference on Security of Information and Networks (SIN). Vol. 1. pp. 1–8. doi:10.1109/SIN54109.2021.9699138. ISBN 978-1-7281-9266-6. S2CID 244908584.
  276. ^ aoifeosullivan (28 November 2022). "Triple success for Edinburgh Napier University at Scottish Cyber Awards". Research Innovation Enterprise. Retrieved 8 January 2023.
  277. ^ "Im Event - Event & Conference one page WordPress Theme". IEEE Turkey Blockchain Initiative. Retrieved 9 July 2023.
  278. ^ "Keynotes & Industry". Cyber Science 2023. Retrieved 9 July 2023.
  279. ^ "Professor Bill Buchanan OBE, appointed to new Zero Trust Special Interest Group Advisory Board". Zero Trust SIG. Retrieved 18 July 2023.
  280. ^ @napierstudents. "Congratulations to Prof Bill Buchanan, who is the winner of Best Lecturer/Tutor (Computing)". Twitter. Retrieved 29 May 2023.
  281. ^ "About - IEEE Blockchain Technical Community". blockchain.ieee.org. Retrieved 9 July 2023.