scispace - formally typeset
R

Robin Doss

Researcher at Deakin University

Publications -  172
Citations -  1888

Robin Doss is an academic researcher from Deakin University. The author has contributed to research in topics: Computer science & Authentication. The author has an hindex of 18, co-authored 143 publications receiving 1303 citations. Previous affiliations of Robin Doss include Chang'an University & IBM.

Papers
More filters
Journal ArticleDOI

Traceback of DDoS Attacks Using Entropy Variations

TL;DR: This paper proposes a novel traceback method for DDoS attacks that is based on entropy variations between normal and DDoS attack traffic, which is fundamentally different from commonly used packet marking techniques and is memory nonintensive, efficiently scalable, robust against packet pollution, and independent of attack traffic patterns.
Journal ArticleDOI

An Improved Authentication Scheme for Internet of Vehicles Based on Blockchain Technology

TL;DR: The simulation under the veins framework is carried out to verify the feasibility of the scheme in reducing the selfish behavior and malicious attacks in IoV and propose an effective decentralized authentication mechanism for IoV on the basis of the consensus algorithm of blockchain technology.
Posted Content

Security Analysis Methods on Ethereum Smart Contract Vulnerabilities: A Survey.

TL;DR: This survey aims to identify the key vulnerabilities in smart contracts on Ethereum in the perspectives of their internal mechanisms and software security vulnerabilities by correlating 16 Ethereum vulnerabilities and 19 software security issues.
Journal ArticleDOI

Information theory based detection against network behavior mimicking DDoS attacks

TL;DR: The analysis and the preliminary experiments indicate that the proposed method- can discriminate mimicking flooding attacks from legitimate accessing efficiently and effectively.
Journal ArticleDOI

A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems

TL;DR: This scheme is the first quadratic residues based scheme to achieve compliance to EPC Class-1 Gen-2 specifications and achieves authentication of the tag, reader and back-end server in the RFID system and protects the privacy of the communication without the need for tags to implement expensive hash functions.