1. 2006
  2. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Distributed Certificate Authority in cluster-based ad hoc networks

    Martin, K. M. & Chaddoud, G., 2006, Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking. p. 278-283

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Diversified Process Replicæ for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006.

    Research output: Working paper

  5. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In: secure Magazine. 1, 9

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N., 2006, ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H., 2006, Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Fundamental problems in provable security and cryptography

    Dent, A. W., 2006, In: Phil Trans R Soc A. 364, 1849, p. 3215-3230 16 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Hidden pairings and trapdoor DDH groups

    Dent, A. W. & Galbraith, S. D., 2006, Algorithmic Number Theory: 7th International Symposium (ANTS VII). Hess, F., Pauli, S. & Pohst, M. (eds.). Springer-Verlag, p. 436-451 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In: Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Ideal secret sharing schemes with multipartite access structures.

    Ng, S-L., 2006, In: IEE Proceedings on Communications. 153, 2, p. 165-168 4 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G. & Smart, N. P., 2006, Automata, Languages and Programming (2) -- ICALP 2006. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I. (eds.). Springer-Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Information Security

    Crampton, J., Paterson, K. G., Piper, F. & Robshaw, M. J. B., 2006, Handbook of Security. Gill, M. (ed.). Palgrave Macmillan, p. 358-379 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Lost in translation: theory and practice in cryptography

    Paterson, K. G. & Yau, A. K. L., 2006, In: IEEE Security and Privacy Magazine. 4, 3, p. 69-72 4 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Mobile security and trusted computing

    Mitchell, C. J., 2006, In: Information Technology. 48, p. 321-326

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P., 2006, Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    On the potential of high density smart cards

    Mayes, K. E. & Markantonakis, K., 2006, In: Information Security Technical Report. 11, 3, p. 147 - 153

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Optimal updating of ideal threshold schemes

    Martin, K. M., Barwick, S. G., Jackson, W-A. & O'Keefe, C. M., 2006, In: Australasian Journal of Combinatorics. 36, p. 123-132 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Orbit-homogeneity in permutation groups

    Cameron, P. J. & Dent, A. W., 2006, In: Bulletin of the London Mathematical Society. 38, 4, p. 587-596 10 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In: Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Recent developments in cryptographic hash functions: Security implications and future directions

    Cid, C., 2006, In: Information Security Technical Report. 11, 2, p. 100 - 107 8 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Reconstructing noisy polynomial evaluation in residue rings

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2006, In: J. Algorithms. 61, p. 47-59 13 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Security Evaluation and Certification Process

    Sauveron, D., Dusart, P., Trotin, A., Markantonakis, K. & Mayes, K., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In: Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Simulation on a quantum computer

    Schack, R., 2006, In: Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Piper, F. & Tunstall, M., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  36. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  37. Published

    The Cramer-Shoup encryption scheme is plaintext aware in the standard model

    Dent, A. W., 2006, Advances in Cryptology -- Eurocrypt 2006. Vaudenay, S. (ed.). Springer-Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticlepeer-review

  39. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J., 2006, In: ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    The secondary and approximate authorization model and its application to Bell-LaPadula policies

    Crampton, J., Leung, W. & Beznosov, K., 2006, Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Two Dimensional Runlength Constrained Arrays with Equal Horizontal and Vertical Constraints

    Blackburn, S. R., 2006, In: IEEE Transactions on Information Theory. 52, p. 3305-3309 5 p.

    Research output: Contribution to journalArticlepeer-review

  43. 2005
  44. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    A user-centric m-payment solution

    Zhang, Q., Mayes, K. & Markantonakis, K., 1 Nov 2005, Mobile Technology, Applications and Systems, 2005 2nd International Conference on. p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Protection of Downloadable Software on SDR Devices

    Gallery, E. & Tomlinson, A., 1 Nov 2005.

    Research output: Contribution to conferencePaper

  47. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In: Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In: IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticlepeer-review

  49. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  50. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  51. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  52. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper