1. 2018
  2. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  3. Published
  4. 2017
  5. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study

    Ibrahim, S., Rush, M., Edwards, E. T. & Monks, C. P., 31 Dec 2017, In: Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 16 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published
  9. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    One leak will sink a ship: WebRTC IP address leaks

    Al-Fannah, N. M., 7 Dec 2017, p. 1-5. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  11. E-pub ahead of print

    Distributed denial of government: the Estonian Data Embassy Initiative

    Robinson, N. & Martin, K., 1 Dec 2017, (E-pub ahead of print) In: Network Security. 2017, 9, p. 13-16 4 p.

    Research output: Contribution to journalSpecial issue

  12. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In: International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Geographies of (con)text: language and structure in a digital age

    Thornton, P., 28 Nov 2017, In: Computational Culture: A Journal of Software Studies. Autumn 2017, Issue 6, p. 1-11 11 p.

    Research output: Contribution to journalSpecial issuepeer-review

  14. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, (E-pub ahead of print) Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In: Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticlepeer-review

  16. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  17. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution

  18. Published

    Overpromised or Underdelivered?: Evaluating the Performance of Australia's National Cyber Security Strategy

    Haggman, A., 9 Nov 2017, Asia Pacific Security Magazine, November/December 2017, p. 10 11 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  19. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaperpeer-review

  20. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The TypTop System: Personalized Typo-Tolerant Password Checking

    Chatterjee, R., Woodage, J., Pnueli, Y., Chowdhury, A. & Ristenpart, T., 30 Oct 2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 329-346 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  26. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D., 5 Oct 2017, Custard, Culverts and Cake: Academics on Life in The Archers. Courage, C. & Headlam, N. (eds.). Emerald Publishing, p. 249-267

    Research output: Chapter in Book/Report/Conference proceedingChapter