1. 2017
  2. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Mobility (Second edition)

    Adey, P., 2017, 2nd ed. Routledge. 386 p.

    Research output: Book/ReportBook

  4. Unpublished
  5. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    New Directions in Secure African Branchless Banking

    Heath, C. & Quaglia, E., 2017, Strategic Narratives of Technology and Africa.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Submitted

    Nigerian Society and Culture

    Ibrahim, S., 2017, (Submitted) In: The Journal of Intercultural Studies. special issue

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability

    Al-Fannah, N. M. & Li, W., 2017, p. 105-120. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  9. Published

    Notes on GGH13 Without the Presence of Ideals

    Davidson, A., Albrecht, M. & Larraia de Vega, E., 2017, p. 135-158. 24 p.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B., 2017, p. 519-534. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  12. Unpublished

    On Using the System Management Mode for Security Purposes

    Rodrigues De Souza, W. A., 2017, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Parameterized Complexity of the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gutin, Z. & Wahlstrom, M., 2017, Combinatorial Optimization and Graph Algorithms. Fukunaga, T. & Kawarabayashi, K. (eds.). Springer-Verlag, p. 101-120 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  15. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., 2017, In: IACR Cryptology ePrint Archive. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  17. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  21. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  22. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis

  24. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I., 2017, In: Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A., Jan 2017, In: Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  33. Published

    Mobilities

    Adey, P. & Squire, R., 1 Jan 2017, Routledge Handbook of International Political Sociology. Guillaume, X. & Bilgin, P. (eds.). Routledge, Chapter 20

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R., 9 Jan 2017, e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. Macau, China: IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Tweet-Deck Diplomacy

    Robinson, N., 12 Jan 2017, RHUL Geopolitics & Security.

    Research output: Other contribution

  36. Published

    Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 26 Jan 2017, Proceedings of the 14th International Conference of Smart City (SmartCity 2016). IEEE Press, p. 1380-1387 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Distributed Conformal Anomaly Detection

    Nouretdinov, I., 2 Feb 2017, (E-pub ahead of print) Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L., 6 Feb 2017, In: ACM Computing Surveys. 49, 4, p. 1-41 41 p., 76.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, (E-pub ahead of print) 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Unpublished
  45. Published

    Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, NDSS Symposium 2017. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R., 16 Mar 2017, In: Journal of Computer Security. 25, 1, p. 83-115 33 p.

    Research output: Contribution to journalArticlepeer-review

  47. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, (E-pub ahead of print) 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 23 Mar 2017, In: IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In: International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticlepeer-review