1. 2018
  2. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  5. Published

    Estimate All the {LWE, NTRU} Schemes!

    Albrecht, M. R., Curtis, B. R., Deo, A., Davidson, A., Player, R., Postlethwaite, E. W., Virdia, F. & Wunderer, T., 2018, 17 p. Springer.

    Research output: Other contribution

  6. Published

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  7. Published

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaper

  8. Published

    Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli

    Auerbach, B. & Poettering, B., 2018, p. 403-430. 28 p.

    Research output: Contribution to conferencePaper

  9. Published

    Holding on to dissensus: Participatory interactions in security design

    Heath, C., Hall, P. & Coles-Kemp, L., 2018, In : Strategic Design Research Journal. 11, 2, p. 65-78 14 p.

    Research output: Contribution to journalSpecial issue

  10. Published

    Hybrid Encryption in a Multi-user Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B., 2018, p. 159-189. 31 p.

    Research output: Contribution to conferencePaper

  11. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaper

  13. Published

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B., 2018, p. 190-218. 29 p.

    Research output: Contribution to conferencePaper

  14. Published

    Language Redux

    Thornton, P., 2018, In : A Peer Review Journal About. 7, 1, p. 1-8 8 p.

    Research output: Contribution to journalArticle

  15. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished
  18. Unpublished

    ON THE SECURITY AND PERFORMANCE OF MOBILE DEVICES IN TRANSPORT TICKETING

    Umar, A., 2018, (Unpublished) 161 p.

    Research output: ThesisDoctoral Thesis

  19. Unpublished

    Parameter selection in lattice-based cryptography

    Player, R., 2018, (Unpublished)

    Research output: ThesisDoctoral Thesis

  20. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 2018, In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

  21. Published

    Run-Time Monitoring of Data-Handling Violations

    Happa, J., Moffat, N., Goldsmith, M. & Creese, S., 2018, Computer Security. Springer, p. 213-232 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  23. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaper

  24. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In : Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  25. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  26. Published
  27. Published

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S., Jan 2018, In : Cryptography and Communications. 10, 1, p. 41-58 18 p.

    Research output: Contribution to journalArticle

  28. Published

    Making defeating CAPTCHAs harder for bots

    Al-Fannah, N. M., 11 Jan 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  29. Published

    Iterative recovery of controllability via maximum matching

    Zhang, S. & Wolthusen, S., 15 Jan 2018, p. 328-333. 6 p.

    Research output: Contribution to conferencePaper

  30. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. E-pub ahead of print

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N., 26 Jan 2018, p. 142-159. 18 p.

    Research output: Contribution to conferencePaper

  32. Published

    Technical Perspective: On heartbleed: A Hard Beginnyng Makth a Good Endyng

    Paterson, K., 21 Feb 2018, In : Communications of the ACM. 61, 3, p. 108-108 1 p.

    Research output: Contribution to journalComment/debate

  33. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In : Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  34. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    RUSH, M. & Ibrahim, S., 1 Mar 2018, In : Sociological Research Online. 23, 1, p. 177-196 20 p.

    Research output: Contribution to journalArticle

  35. Published

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D., 1 Mar 2018, In : Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticle

  36. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In : Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticle

  37. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    What Should You Pay to Protect Your Data? The Economics of Cyber Security

    Ertan, A., 9 Mar 2018, Cyber World , March 2018 edition, p. 50-55 6 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  41. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J., 13 Mar 2018, p. 152-154. 3 p.

    Research output: Contribution to conferencePoster

  42. Published
  43. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  44. Published

    Gaming...seriously?

    Haggman, A., 28 Mar 2018, TEISS.

    Research output: Other contribution

  45. Published

    Analysing and exploiting the Mantin biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T., Apr 2018, In : Designs, Codes and Cryptography. 86, 4, p. 743–770 28 p.

    Research output: Contribution to journalArticle

  46. Published

    Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., Apr 2018, In : IEEE Transactions on Information Forensics and Security . 13, 4, p. 1031-1041 11 p.

    Research output: Contribution to journalArticle

  47. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., Apr 2018, CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Driverless Cars - Have we Learned Lessons From the Past?

    Butler, S., 17 Apr 2018, Information Security Magazine.

    Research output: Other contribution

  49. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S., 22 Apr 2018, p. 46-51. 6 p.

    Research output: Contribution to conferencePaper

  50. Published

    LibSEAL: revealing service integrity violations using trusted execution

    Aublin, P-L., Kelbert, F., O'Keeffe, D., Muthukumaran, D., Priebe, C., Lind, J., Krahn, R., Fetzer, C., Eyers, D. M. & Pietzuch, P. R., 23 Apr 2018, Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, Portugal, April 23-26, 2018. p. 1-15 15 p. 24

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In : Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticle