1. 2023
  2. Forthcoming

    Digital security narratives in the time of COVID-19: a case for kindness

    Coles-Kemp, L. & Hall, P., 1 Jan 2023, (Accepted/In press) Perspectives on design research: Practices and theories in Design and Digital Communication.. Springer, [Cham]

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. 2022
  4. Forthcoming

    Subverting Deniability

    Armour, M. & Quaglia, E., 11 Nov 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  5. Forthcoming

    Improving the Efficiency of Report and Trace Ring Signatures

    Bultel, X., Fraser, A. & Quaglia, E., 24 Sep 2022, (Accepted/In press) 24th International Symposium on Stabilization, Safety, and Security of Distributed Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    SLR: From Saltzer & Schroeder to 2021...: 47 years of research on the development and validation of Security API recommendations

    Patnaik, N., Dwyer, A., Hallett, J. & Rashid, A., 15 Sep 2022, In: ACM Transactions on Software Engineering and Methodology.

    Research output: Contribution to journalArticlepeer-review

  7. Forthcoming

    Epoch Confidentiality in Updatable Encryption

    Knapp, J. & Quaglia, E., 10 Sep 2022, (Accepted/In press) 16th International Conference on Provable and Practical Security : ProvSec 2022. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Identifying Incentives for Extortion in Proof of Stake Consensus Protocols

    Bhudia, A., Cartwright, A., Cartwright, E., Hernandez-Castro, J. & Hurley-Smith, D., 1 Sep 2022, The 3rd International Conference on Deep Learning, Big Data and Blockchain (DBB 2022). Springer, Vol. 541.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    What Can a Critical Cybersecurity Do?

    Dwyer, A., Stevens, C., Muller, L., Dunn Cavelty, M., Coles-Kemp, L. & Thornton, P., Sep 2022, In: International Political Sociology. 16, 3

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Introduction: An Offensive Future?

    Dwyer, A. C. & Ertan, A., 16 Aug 2022, In: The Cyber Defense Review. 7, 3, p. 9-13 5 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Breaking Bridgefy, again: Adopting libsignal is not enough

    Albrecht, M., Eikenberg, R. & Paterson, K., 12 Aug 2022, USENIX Security'22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Crafting a democratic and responsible cyber power?

    Dwyer, A., Aug 2022, Offensive Cyber Working Group. 18 p.

    Research output: Book/ReportOther report

  13. Published
  14. Forthcoming

    Towards Analogue Geographies: Moving with and beyond enclosure

    Squire, R., Adey, P. & Jensen, R. B., 22 Jul 2022, (Accepted/In press) In: GeoHumanities.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., Jul 2022, In: IEEE Transactions on Information Theory. 68, 7, p. 4782-4789 8 p.

    Research output: Contribution to journalArticlepeer-review

  16. E-pub ahead of print

    Accessible and inclusive cyber security: a nuanced and complex challenge

    Renaud, K. & Coles-Kemp, L., 22 Jun 2022, (E-pub ahead of print) In: SN Computer Science. 3, p. 1-14 14 p., 346 (2022).

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Algorithm substitution attacks against receivers

    Armour, M. & Poettering, B., 21 Jun 2022, In: International Journal of Information Security.

    Research output: Contribution to journalArticlepeer-review

  18. E-pub ahead of print

    Detecting CAN Attacks on J1939 and NMEA 2000 Networks

    Rogers, M., Weigand, P., Happa, J. & Rasmussen, K., 14 Jun 2022, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Generalized Noise Role Mining

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Jun 2022, p. 91-102.

    Research output: Contribution to conferencePaperpeer-review

  20. E-pub ahead of print

    PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

    Zhao, Q., Zuo, C., Blasco Alis, J. & Lin, Z., 30 May 2022, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  21. Published

    Hack the Heap: Heap Layout Manipulation made Easy

    Gennissen, J. & O'Keeffe, D., 26 May 2022, Hack the Heap: Heap Layout Manipulation made Easy. 16th Workshop on Offensive Technologies (WOOT) 2022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    A strange sky: Security atmospheres and the technological management of geopolitical conflict in the case of Israel’s Iron Dome

    Slesinger, I., 19 May 2022, (E-pub ahead of print) In: Geographical Journal.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Cheat detection and security in video games

    Hassan, M., 5 May 2022

    Research output: ThesisDoctoral Thesis

  24. Published
  25. Published

    Cyber security and the Leviathan

    Da Silva, J., May 2022, In: Computers and Security. 116, 102674.

    Research output: Contribution to journalArticlepeer-review

  26. E-pub ahead of print

    Estonia: a curious and cautious approach to artificial intelligence and national security

    Robinson, N., Hardy, A. & Ertan, A., May 2022, (E-pub ahead of print) Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. E-pub ahead of print

    Drawing Out the Everyday Hyper-[In]Securities of Digital Identity

    Heath, C. P. R. & Coles-Kemp, L., 29 Apr 2022, (E-pub ahead of print) Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.. ACM, p. 1-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Privacy-preserving Web single sign-on: Formal security analysis and design

    Schmitz, G., 26 Apr 2022, In: it - Information Technology. 64, 1-2

    Research output: Contribution to journalArticlepeer-review

  29. E-pub ahead of print

    Valued Authorization Policy Existence Problem: Theory and Experiments

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Nov 2022, In: ACM Transactions on Privacy and Security. 25, 4, 28.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    A qualitative exploration of the role of employment in desistance and subsequent identity change - ex-prisoners’ lived experiences

    Rhoden, N., Senker, S. & Glorney, E., 19 Apr 2022, In: The Journal of Forensic Practice. 24, 2, p. 168-183

    Research output: Contribution to journalArticlepeer-review

  31. Forthcoming

    TIDE: A novel approach to constructing timed-release encryption

    Loe, A. F., Medley, L., O'Connell, C. & Quaglia, E. A., 15 Apr 2022, (Accepted/In press) ACISP 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. E-pub ahead of print
  33. Published

    New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

    Thomas-Brans, F., Heckmann, T., Markantonakis, K. & Sauveron, D., 11 Mar 2022, In: IEEE Access. 10, p. 33742 - 33757

    Research output: Contribution to journalArticlepeer-review

  34. Published
  35. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Forthcoming

    Watch over your TV: A Security and Privacy Analysis of the Android TV ecosystem

    Tileria Palacios, M. & Blasco Alis, J., 1 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  37. Published

    Securing emergent behaviour in swarm robotics

    Chen, L. & Ng, S-L., Feb 2022, In: Journal of Information Security and Applications. 64, 103047.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Changing Cybersecurity Behaviors in the Workplace: A Critique of the Evidence

    Ertan, A., 16 Jan 2022, Infosecurity Magazine.

    Research output: Other contribution

  39. Published
  40. Unpublished

    Advanced Privacy Notions for Electronic Voting and Digital Signatures

    Fraser, A., 2022, (Unpublished) 283 p.

    Research output: ThesisDoctoral Thesis

  41. Published

    Extortion of a Staking Pool in a Proof-of-Stake Consensus Mechanism

    Bhudia, A., Cartwright, A., Cartwright, E., Hernandez-Castro, J. & Hurley-Smith, D., 2022, IEEE International Conference on Omni-layer Intelligent Systems (COINS2022): Distributed Ledger Technologies and Blockchain. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Unpublished
  43. Published

    Four Attacks and a Proof for Telegram

    Albrecht, M., Marekova, L., Paterson, K. & Stepanovs, I., 2022, IEEE S&P 2022. Vol. 1. p. 223-242 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Malware in Motion

    Choudhury, R., Luo, Z. & Nguyen, K., 2022, p. 595-602.

    Research output: Contribution to conferencePaperpeer-review

  45. Unpublished

    Microarchitectural Covert Channels in Multitenant Computing Environments}

    Semal, B., 2022, (Unpublished)

    Research output: ThesisDoctoral Thesis

  46. Unpublished

    Software Analysis Through Binary Function Identification

    Patrick-Evans, J., 2022, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  47. Published

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 2022, IEEE Symposium on Security and Privacy (IEEE S&P). p. 1165-1183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Zoom Obscura: Counterfunctional Design for Video-Conferencing

    Elsden, C., Chatting, D., Duggan, M., Dwyer, A. C. & Thornton, P., 2022, p. 1-17.

    Research output: Contribution to conferencePaperpeer-review

  49. 2021
  50. Published

    Sensemaking, systemic competition, and the social compact

    Ashdown, N., 21 Dec 2021, Futures Student Essay Competition. UK Ministry of Defence, p. 38-46

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Report and Trace Ring Signatures

    Fraser, A. & Quaglia, E., 9 Dec 2021, 20th International Conference On Cryptology And Network Security: CANS 2021. Springer, [Cham], Vol. 13099. p. 179-199 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 6 Dec 2021, Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM), p. 861-876 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 1 Dec 2021, (E-pub ahead of print) p. 160-184. 25 p.

    Research output: Contribution to conferencePaperpeer-review

  54. Published
  55. Published

    NATO and Artificial Intelligence

    Ertan, A. & Christie, E. H., Dec 2021, Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. Published

    Principles of Effective Cybersecurity Wargames

    Callaghan, P. & Ertan, A., Dec 2021, Infosecurity Magazine.

    Research output: Other contribution

  57. Published

    INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection

    Andresini, G., Pendlebury, F., Pierazzi, F., Loglisci, C., Appice, A. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 111-122 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Investigating Labelless Drift Adaptation for Malware Detection

    Kan, Z., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 123-134 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    Hashimoto, K., Katsumata, S., Postlethwaite, E., Prest, T. & Westerbaan, B., 13 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1441-1462 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Bridging the discipline gap: towards improving heritage and computer graphics research collaboration

    Happa, J., Bennett, T., Gogioso, S., Voiculescu, I., Howell, D., Crawford, S., Ulmschneider, K. & Ramsey, C., 6 Nov 2021.

    Research output: Contribution to conferencePaperpeer-review

  62. E-pub ahead of print

    The Philosophy of Bitcoin and The Question of Money

    Butler, S., 5 Nov 2021, (E-pub ahead of print) In: Theory, Culture and Society.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 4 Nov 2021, In: Journal of Computer Security. p. 1-57 57 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 29 Oct 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  65. Published

    Pragmatic authenticated key agreement for IEEE Std 802.15.6

    Khan, H., Dowling, B. & Martin, K. M., 27 Oct 2021, In: International Journal of Information Security.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 22 Oct 2021, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Zhao, L., Kumar, N., Hsu, R. C. & Zou, Z. (eds.). Los Alamitos: IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Collaborative Verifiable Delay Functions

    Medley, L. & Quaglia, E., 18 Oct 2021, (E-pub ahead of print) Inscrypt 2021: 17th International Conference on Information Security and Cryptology . p. 507-530 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 15 Oct 2021, In: Digital Threats: Research and Practice. p. 1-26 26 p., 29.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    What Influences People’s View of Cyber Security Culture in Higher Education Institutions? An Empirical Study

    Mersinas, K., Durojaiye, T. & Watling, D., 3 Oct 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems CYBER 2021. p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Detecting video-game injectors exchanged in game cheating communities

    Karkallis, P., Blasco Alis, J., Suarez de Tangil Rotaeche, G. & Pastrana, S., Oct 2021, 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Unpublished

    Eligibility Veriability in Untrustworthy Voting Environments

    Augoye, V., 26 Sep 2021, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  72. E-pub ahead of print

    Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Shepherd, C., Markantonakis, K., Van Heijningen, N., Aboulkassimi, D., Gaine, C., Heckmann, T. & Naccache, D., 17 Sep 2021, (E-pub ahead of print) In: Computers and Security. 102471.

    Research output: Contribution to journalArticlepeer-review

  73. Forthcoming

    Towards Improving Code Stylometry Analysis in Underground Forums

    Tereszkowski-Kaminski, M., Pastrana, S., Blasco Alis, J. & Suarez-Tangil, G., 16 Sep 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022). p. 126-147 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 1 Sep 2021, In: Media, War & Conflict. 14, 3, p. 263-267 5 p.

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    DY: A modular symbolic verification framework for executable cryptographic protocol code

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., Sep 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers Inc., p. 523-542 20 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, EuroS&P 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer, p. 252-272 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Cyber Exercises: A Vision for NATO: A CyCon 2021 Workshop Summary Report

    Ertan, A., Kuprys, A., Lillemets, P. & Nordli, G-M., 19 Aug 2021, CyCon 2021. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE), 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 19 Aug 2021, In: ACM Transactions on Privacy and Security. 24, 3, p. 1-22 22 p., 21.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Dos and Don'ts of Machine Learning in Computer Security

    Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L. & Rieck, K., 12 Aug 2021, 31st USENIX Security Symposium (USENIX Sec). 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Albrecht, M., Bai, S., Li, J. & Rowell, J., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 732-759 28 p. (https://eprint.iacr.org/2020/1260.pdf)(Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 519-548 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    CS Alert – Offensive Cyber in 1914

    Ashdown, N., 5 Aug 2021

    Research output: Other contribution

  85. Published

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., Aug 2021, Proceedings of the 30th USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 30 Jul 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  87. E-pub ahead of print

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 21 Jul 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  88. Published

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 21 Jul 2021, Selected Areas in Cryptography (SAC) 2020. Springer, [Cham], Vol. 12804. p. 670-697 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., Jul 2021, ISSAC 2021. ACM, p. 289-296 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums

    Butler, S., 22 Jun 2021, (E-pub ahead of print) Socio-Technical Aspects in Security and Trust: 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers. Springer, p. 135-153 19 p. (Lecture Notes in Computer Science; vol. 12812).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  92. Published

    Establishing collective counter-terrorism defense: NATO’s scope and challenges

    Venema, A. & Ertan, A., 21 Jun 2021, In: Atlantisch Perspectief / Atlantic Perspective. 3

    Research output: Contribution to journalEditorial

  93. E-pub ahead of print

    On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

    Albrecht, M. & Heninger, N., 16 Jun 2021, (E-pub ahead of print) EUROCRYPT 2021. Springer, (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. E-pub ahead of print

    One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols

    Kutas, P., Merz, S-P., Petit, C. & Weitkämper, C., 16 Jun 2021, (E-pub ahead of print) p. 242-271. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  95. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

  96. Published

    The Impact of Pandemic-Driven Remote Working on Employee Wellbeing, the Psychological Contract and Cyber Security Remote Working and (In)Security

    Crossland, G. & Ertan, A., Jun 2021, Research Institute for Sociotechnical Cyber Security. 41 p.

    Research output: Book/ReportCommissioned report

  97. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    On the Success Probability of Solving Unique SVP via BKZ

    Postlethwaite, E. & Virdia, F., 1 May 2021, Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key CryptographyVirtual Event, May 10–13, 2021 Proceedings, Part I. Springer, p. 68-98 31 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  99. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 May 2021, (E-pub ahead of print) PKC 2021. Springer, p. 261-289 29 p. (Lecture Notes in Computer Science; vol. 12711).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., May 2021, IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE, Vol. 1. p. 221-227 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Forthcoming

    "Computer Says No": Exploring social justice in digital services

    Crivellaro, C., Coles-Kemp, L. & Wood, K., 26 Apr 2021, (Accepted/In press) Hope Under Neoliberal Austerity: Responses from Civil Society and Civic Universities. Steer, M., Davoudi, S., Shucksmith, M. & Todd, L. (eds.). Policy Press, p. 89-104 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. Forthcoming

    A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

    Vagal, V., Markantonakis, K. & Shepherd, C., 14 Apr 2021, (Accepted/In press) 40th IEEE Digital Avionics Systems Conference (DASC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...23 Next