1. 2005
  2. Published

    Conditional Access in Mobile Systems: Securing the Application

    Gallery, E. & Tomlinson, A., 1 Feb 2005, p. 190-197. 8 p.

    Research output: Contribution to conferencePaper

  3. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  4. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In: Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  15. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G., 2005, PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Cryptography from Pairings

    Paterson, K. G., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge University Press, p. 215-251 37 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Deniable authenticated key establishment for Internet protocols

    Boyd, C., Mao, W. & Paterson, K. G., 2005, Security Protocols, 11th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer, p. 255-271 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Designing and Verifying Secure Protocols of the Digital Marketplace

    Goo, S. K., Irvine, J. M., Tomlinson, A. & Schwiderski-Grosche, S., 2005.

    Research output: Contribution to conferencePaper

  25. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P., 2005, In: Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Dynamic access policies for unconditionally secure secret sharing schemes

    Martin, K. M., 2005, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan. IEEE Computer Society Press, p. 61-66

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In: Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Fine Grained Resource Reservation and Management in Grid Economics

    Chard, K., Komisarczuk, P., Bubendorfer, K. & Desai, A., 2005, Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005. p. 31-38 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Flaws in an e-mail protocol of Sun, Hsieh and Hwang

    Dent, A. W., 2005, In: IEEE Communications Letters. 9, 8, p. 718-719 2 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Group communication: Design challenges in the development of key management frameworks in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2005, Proceedings of Security & Management (SAM '05), Las Vegas. p. 385-391 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Hybrid signcryption schemes with insider security

    Dent, A. W., 2005, Information Security and Privacy: 10th Australasian Conference -- ACISP 2005. Boyd, C. & Nieto, J. M. G. (eds.). Springer-Verlag, p. 253-266 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Hybrid signcryption schemes with outsider security

    Dent, A. W., 2005, Information Security: 8th International Conference -- ISC 2005. Zhou, J., Lopez, J., Deng, R. H. & Bao, F. (eds.). Springer-Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K. G., 2005, Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005). Stockinger, H., Buyya, R. & Perrott, R. (eds.). IEEE Computer Society Press, p. 395-404 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Installing fake root keys in a PC

    Alsaid, A. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, Vol. 3545. p. 227-239 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In: Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  44. Published

    Modular security proofs for key agreement protocols

    Kudla, C. J. & Paterson, K. G., 2005, Proc. Asiacrypt 2005. Roy, B. (ed.). Springer, p. 549-565 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    Montgomery Arithmetic

    Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  46. Published

    Non-interactive designated verifier proofs and undeniable signatures

    Kudla, C. J. & Paterson, K. G., 2005, Proc. IMA Conference on Cryptography and Coding. Smart, N. P. (ed.). Springer, p. 136-154 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Padding oracle attacks on CBC-mode encryption with random and secret IVs

    Yau, A. K. L., Paterson, K. G. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer, p. 299-319 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution