default search action
Simon J. Shepherd
Person information
- affiliation: University of Bradford, Bradford, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j30]José Carlos Ribeiro, Firooz B. Saghezchi, Georgios Mantas, Jonathan Rodriguez, Simon J. Shepherd, Raed A. Abd-Alhameed:
An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. Mob. Networks Appl. 25(1): 164-172 (2020)
2010 – 2019
- 2018
- [c14]José Carlos Ribeiro, Georgios Mantas, Firooz B. Saghezchi, Jonathan Rodriguez, Simon J. Shepherd, Raed A. Abd-Alhameed:
Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices. BROADNETS 2018: 139-148 - 2017
- [j29]Maria Marcella Laganà, Simon J. Shepherd, Pietro Cecconi, Clive B. Beggs:
Intracranial volumetric changes govern cerebrospinal fluid flow in the Aqueduct of Sylvius in healthy adults. Biomed. Signal Process. Control. 36: 84-92 (2017) - [j28]Muhammad Adeka, Kelvin O. O. Anoh, Mohammad Ngala, Simon J. Shepherd, E. Ibrahim, Issa T. E. Elfergani, Ash S. Hussaini, Jonathan Rodriguez, R. A. Abd-Alhameed:
Africa: cyber-security and its mutual impacts with computerisation, miniaturisation and location-based authentication. EAI Endorsed Trans. Mob. Commun. Appl. 3(11): e4 (2017) - 2015
- [j27]Trust Tshepo Mapoka, Simon J. Shepherd, Yousef A. S. Dama, Haider M. AlSabbagh, Raed A. Abd-Alhameed:
Multi-Service Group Key Management for High Speed Wireless Mobile Multicast Networks. EAI Endorsed Trans. Mob. Commun. Appl. 2(6): e4 (2015) - [j26]Trust Tshepo Mapoka, Simon J. Shepherd, Raed A. Abd-Alhameed:
A New Multiple Service Key Management Scheme for Secure Wireless Mobile Multicast. IEEE Trans. Mob. Comput. 14(8): 1545-1559 (2015) - [c13]Trust Tshepo Mapoka, Simon J. Shepherd, Raed A. Abd-Alhameed, Kelvin O. O. Anoh:
Handover Optimised Authentication Scheme for High Mobility Wireless Multicast. UKSim 2015: 526-531 - 2014
- [c12]Trust Tshepo Mapoka, Simon J. Shepherd, Raed A. Abd-Alhameed, Kelvin O. O. Anoh:
Efficient authenticated multi-service group key management for secure wireless mobile multicast. FGCT 2014: 66-71 - [c11]Trust Tshepo Mapoka, Simon J. Shepherd, Raed Abd-Alhameed, Kelvin O. O. Anoh:
Novel rekeying approach for secure multiple multicast groups over wireless mobile networks. IWCMC 2014: 839-844 - [c10]Trust Tshepo Mapoka, Haider M. AlSabbagh, Yousef A. S. Dama, Simon J. Shepherd, Raed Abd-Alhameed, Mohammad S. Bin-Melha, Kelvin O. O. Anoh:
A Multi-service Cluster-Based Decentralized Group Key Management Scheme for High Mobility Users. WICON 2014: 305-312 - [c9]Muhammad Adeka, Mohammad Ngala, Mohammad S. Bin-Melha, E. Ibrahim, Simon J. Shepherd, Issa T. E. Elfergani, Ash S. Hussaini, Fauzi Elmegri, Raed Abd-Alhameed:
Nigeria: Cyber Space Security Vis a Vis Computerisation, Miniaturisation and Location-Based Authentication. WICON 2014: 322-334
2000 – 2009
- 2008
- [j25]Gang Wang, Nini Rao, Simon J. Shepherd, Clive B. Beggs:
Extraction of Desired Signal Based on AR Model with Its Application to Atrial Activity Estimation in Atrial Fibrillation. EURASIP J. Adv. Signal Process. 2008 (2008) - 2007
- [j24]Simon J. Shepherd:
The Tiny Encryption Algorithm. Cryptologia 31(3): 233-245 (2007) - [j23]Simon J. Shepherd:
Concepts and architectures for next-generation information search engines. Int. J. Inf. Manag. 27(1): 3-8 (2007) - [j22]Ashraf D. Elbayoumy, Simon J. Shepherd:
Stream or Block Cipher for Securing VoIP? Int. J. Netw. Secur. 5(2): 128-133 (2007) - [j21]Ashraf D. Elbayoumy, Simon J. Shepherd:
A Comprehensive Secure VoIP Solution. Int. J. Netw. Secur. 5(2): 233-240 (2007) - [j20]Yuan Zhou, James M. Noras, Simon J. Shepherd:
Novel design of multiplier-less FFT processors. Signal Process. 87(6): 1402-1407 (2007) - 2006
- [c8]Nini Rao, Simon J. Shepherd:
Clustering Gene Expression Data for Periodic Genes Based on INMF. ICIC (3) 2006: 412-423 - 2005
- [j19]Simon J. Shepherd:
Bradford: Building a new cremona? Int. J. Inf. Manag. 25(5): 473-477 (2005) - [c7]Ashraf D. Elbayoumy, Simon J. Shepherd:
QoS Control Using an End-Point CPU Capability Detector in a Secure VoIP System. ISCC 2005: 792-797 - 2004
- [c6]Nini Rao, Simon J. Shepherd:
Extracting Characteristic Patterns from Genome - Wide Expression Data by Non-Negative Matrix Factorization. CSB 2004: 570-571 - 2002
- [j18]J. Carlos Mex-Perera, Simon J. Shepherd:
Cryptanalysis of a summation generator with 2-bit memory. Signal Process. 82(12): 2025-2028 (2002) - 2001
- [j17]Nini Rao, Simon J. Shepherd:
Analysis of KMM¯ Sequences as Spreading Codes for A-CDMA Systems. Wirel. Pers. Commun. 16(3): 193-201 (2001) - 2000
- [j16]José María Sierra, Simon J. Shepherd:
New Phase 1 Exchange Mode for IKE framework. ACM SIGOPS Oper. Syst. Rev. 34(4): 34-40 (2000)
1990 – 1999
- 1999
- [j15]Danai Patiyoot, Simon J. Shepherd:
WASS: Wireless ATM Security System. ACM SIGOPS Oper. Syst. Rev. 33(2): 29-35 (1999) - [j14]Danai Patiyoot, Simon J. Shepherd:
Cryptographic Security Techniques for Wireless Networks. ACM SIGOPS Oper. Syst. Rev. 33(2): 36-50 (1999) - [j13]Danai Patiyoot, Simon J. Shepherd:
Modeling and Evaluation of security induced delays in Wireless ATM Networks. ACM SIGOPS Oper. Syst. Rev. 33(3): 26-31 (1999) - [j12]Danai Patiyoot, Simon J. Shepherd:
Security Issues in ATM Networks. ACM SIGOPS Oper. Syst. Rev. 33(4): 22-35 (1999) - [j11]Danai Patiyoot, Simon J. Shepherd:
WASS: A Security Services for Wireless ATM Networks. ACM SIGOPS Oper. Syst. Rev. 33(4): 36-41 (1999) - [j10]Chintha Tellambura, Matthew Geoffrey Parker, Y. Jay Guo, Simon J. Shepherd, Stephen K. Barton:
Optimal sequences for channel estimation using discrete Fourier transform techniques. IEEE Trans. Commun. 47(2): 230-238 (1999) - 1998
- [j9]Danai Patiyoot, Simon J. Shepherd:
Techniques for Authentication Protocols and Key Distribution on Wireless ATM Networks. ACM SIGOPS Oper. Syst. Rev. 32(4): 25-32 (1998) - [j8]Simon J. Shepherd, John Orriss, Stephen K. Barton:
Asymptotic limits in peak envelope power reduction by redundant coding in orthogonal frequency-division multiplex modulation. IEEE Trans. Commun. 46(1): 5-10 (1998) - [c5]Danai Patiyoot, Simon J. Shepherd:
Security issues for wireless ATM networks. PIMRC 1998: 1555-1559 - 1997
- [c4]Bo Lin, Simon J. Shepherd:
LABYRINTH: a New Ultra High Speed Stream Cipher. IMACC 1997: 192-198 - [c3]Simon J. Shepherd, Stephen K. Barton, Andrew H. Kemp:
An efficient key exchange protocol for cryptographically secure CDMA systems. PIMRC 1997: 480-484 - [c2]Danai Patiyoot, Simon J. Shepherd:
Security of wireless ATM networks. PIMRC 1997: 485-489 - 1996
- [j7]Stephen K. Barton, I. R. Johnson, Simon J. Shepherd, Peter W. J. Van Eetvelt:
Simulation and analysis of the distortion generated by the bulk-FFT demultiplexer. Signal Process. 54(3): 285-294 (1996) - 1995
- [j6]Simon J. Shepherd:
A high speed software implementation of the Data Encryption Standard. Comput. Secur. 14(4): 349-357 (1995) - [j5]Y. O. Al-Jalili, Stephen K. Barton, Simon J. Shepherd:
Distortion analysis of the bulk FFT structure for multi-carrier demodulators. Signal Process. 42(2): 215-219 (1995) - [j4]Peter W. J. Van Eetvelt, Simon J. Shepherd, Stephen K. Barton:
The distribution of peak factor in QPSK Multi-Carrier modulation. Wirel. Pers. Commun. 2(1-2): 87-96 (1995) - [j3]William Wyatt-Millington, Simon J. Shepherd, Stephen K. Barton:
A pipelined implementation of the Winograd FFT for satellite on-board multi-carrier demodulation. Wirel. Pers. Commun. 2(4): 321-334 (1995) - 1994
- [c1]Syed Hussain, Stephen K. Barton, Simon J. Shepherd:
Non-coherent detection of MFSK signals in the presence of oscillator phase noise in an AWGN channel. VTC 1994: 1552-1556 - 1993
- [j2]Simon J. Shepherd, Peter W. Sanders, Colin T. Stockel:
The Quadratic Residue Cipher and Some Notes on Implementation. Cryptologia 17(3): 264-282 (1993) - 1990
- [j1]Simon J. Shepherd, Peter W. Sanders, A. Patel:
A comprehensive security system - the concepts, agents and protocols. Comput. Secur. 9(7): 631-643 (1990)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint