1. 2009
  2. Published

    Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G., 1 May 2009, In: Information Security Technical Report. 14, 2, p. 87-95 9 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., Apr 2009, p. 307- 312.

    Research output: Contribution to conferencePaperpeer-review

  4. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K., 1 Jan 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    Askoxylakis, I. G., Markantonakis, K., Tryfonas, T., May, J. & Traganitis, A., 2009, Mobile Lightweight Wireless Systems. Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S., Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X., Stan, M., Xiaohua, J., Zomaya, A. & Coulson, G. (eds.). Springer Berlin / Heidelberg, Vol. 13. p. 103-113 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  12. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A Re-painted Amazon

    Earl, G., Beale, G., Happa, J., Williams, M., Turley, G., Martinez, K. & Chalmers, A., 2009, In: Proceedings of EVA: Electronic Information and the Visual Arts.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    A semantical approach to equilibria and rationality

    Pavlovic, D., 2009, Proceedings of CALCO 2009. Kurz, A. & Tarlecki, A. (eds.). Springer-Verlag, Vol. 5728. p. 317-334 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J., 2009, Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2009, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases

    Cid, C. & Weinmann, R-P., 2009, Gröbner Bases, Coding, and Cryptography. Springer, p. 307-327 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Building key-private, public-key encryption schemes

    Paterson, K. G. & Srinivasan, S., 2009, ACISP. Boyd, C. & Neito, J. (eds.). Springer, p. 276-292 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Classical and quantum structuralism

    Coecke, B., Paquette, É. O. & Pavlovic, D., 2009, Semantical Techniques in Quantum Computation. Gay, S. & Mackie, I. (eds.). Cambridge University Press, p. 29-69 41 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  23. Published

    Classification framework for fair content tracing protocols

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 8th International Workshop (IWDW 2009). Springer, Vol. 5703. p. 252-267 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Cloud Security is Not (Just) Virtualization Security: A Short Paper

    Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D. & Zamboni, D., 2009, Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, NY, USA: ACM, p. 97-102 6 p. (CCSW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 955-962 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In: Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In: Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In: Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S., 2009, In: International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaperpeer-review

  33. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P., 2009, In: Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Hierarchical, model-based risk management of critical infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, In: Reliability Engineering & System Safety. 94, 9, p. 1403 - 1415

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In: EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 2009, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.) & Wang, G. (ed.), 2009, Springer-Verlag. 504 p. (Lecture Notes in Computer Science; vol. 5927)

    Research output: Book/ReportAnthology

  39. Published

    Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

    Markowitch, A. (ed.), Bilas, A. (ed.), Hoepman, J-H. (ed.), Mitchell, C. J. (ed.) & Quisquater, J-J. (ed.), 2009, Springer-Verlag. 167 p. (Lecture Notes in Computer Science; vol. 5746)

    Research output: Book/ReportAnthology

  40. Published

    Measurement Study on Malicious Web Servers in the .nz Domain

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. p. 8-25 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Measurement Study on Malicious Web Servers in the. nz Domain: Final Report September 2009

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, InternetNZ. 1 p.

    Research output: Book/ReportCommissioned report

  42. Published

    Measuring Semantic Integrity for Remote Attestation

    Baiardi, F., Cilea, D., Sgandurra, D. & Ceccarelli, F., 2009, Trusted Computing: Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings.. Chen, L., Mitchell, C. J. & Martin, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 81-100 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Modeling and Managing Risk in Billing Infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers. Palmer, C. & Shenoi, S. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Published

    On the applicability of combinatorial designs to key predistribution for wireless sensor networks

    Martin, K. M., 2009, Coding and Cryptology (IWCC2009). Springer, Vol. 5557. p. 124-145 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups.

    Paterson, K. G. & Srinivasan, S., 2009, In: Designs, Codes and Cryptography. 52, p. 219-241 23 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    One-round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2009, In: International Journal of Applied Cryptography. 1, 3, p. 181-199 19 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Performance analysis of Reinforcement Learning for achieving context-awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 1046-1053 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution