Project Details
| Status | Finished |
|---|---|
| Effective start/end date | 11/05/09 → 10/05/11 |
Funding
- US Army/MOD: £443,554.00
-
Signal-flow-based analysis of wireless security protocols
Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In: Information and Computation. 226, p. 37–56Research output: Contribution to journal › Article › peer-review
-
Breaking An Identity-Based Encryption Scheme based on DHIES
Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
A guide to trust in mobile ad hoc networks
Balfe, S., Paterson, K. & Yau, P.-W., 2010, In: Security and Communication Networks. 3, 6, p. 503-516Research output: Contribution to journal › Article › peer-review