1. 2004
  2. Published

    The Secure and Multiple Payment System based on the Mobile Phone Platform

    Zhang, Q., Brites Moita, J. N., Mayes, K. & Markantonakis, K., 2004, The Secure and Multiple Payment System based on the Mobile Phone Platform.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  7. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  8. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In: Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Security Challenges in the Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K. & Irvine, J. M., 1 Sep 2004, p. 3267 - 3270.

    Research output: Contribution to conferencePaper

  10. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  11. Published

    Mutual Authentication of B3G devices within Personal Distributed Environments

    Billington, K. L. & Tomlinson, A., 1 Oct 2004, p. 452-456. 5 p.

    Research output: Contribution to conferencePaper

  12. Published

    Regional Blackouts: Protection of Broadcast Content on 3G Networks

    Dent, A. W. & Tomlinson, A., 1 Oct 2004, p. 442-446. 5 p.

    Research output: Contribution to conferencePaper

  13. 2005
  14. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  24. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G., 2005, PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review