1. 2020
  2. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Forthcoming

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 2 Dec 2020, (Accepted/In press) In : IET Information Security . 17 p.

    Research output: Contribution to journalArticle

  4. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  5. Published

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 28 Nov 2020, Journal of Mathematical Cryptology, p. 45-59, 15 p.

    Research output: Working paper

  6. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Forthcoming

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., 16 Nov 2020, (Accepted/In press) In : Journal of Information Security and Applications.

    Research output: Contribution to journalArticle

  9. E-pub ahead of print

    Fragmented digital connectivity and security at sea

    Jensen, R. B., 12 Nov 2020, In : Marine Policy. 7 p., 104289.

    Research output: Contribution to journalArticle

  10. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Butler-Rees, A. & Robinson, N., Nov 2020, In : Emotion, Space and Society. 37, 7 p., 100743.

    Research output: Contribution to journalArticle

  11. E-pub ahead of print

    Secure Shared Processing on a Cluster of Trust-Anchors

    Mayes, K., 31 Oct 2020, p. 968-984. 17 p.

    Research output: Contribution to conferencePaper

Previous 1 2 3 4 5 6 7 8 ...207 Next