1. 2020
  2. E-pub ahead of print

    A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Oct 2020, p. 360-377. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  3. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Forthcoming

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 25 Oct 2020, (Accepted/In press) Proceedings of International Conference on Security & Privacy 2020 (ICSP 2020): Jamshedpur, India. Springer-Verlag, (LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review

  6. E-pub ahead of print

    Secure Shared Processing on a Cluster of Trust-Anchors

    Mayes, K., 31 Oct 2020, p. 968-984. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Published

    Efficiency Improvements for Encrypt-to-Self

    Pijnenburg, J. & Poettering, B., Nov 2020, CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race. Association for Computing Machinery, Inc, p. 13-23 11 p. (CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Butler-Rees, A. & Robinson, N., Nov 2020, In: Emotion, Space and Society. 37, 7 p., 100743.

    Research output: Contribution to journalArticlepeer-review

  9. E-pub ahead of print

    Fragmented digital connectivity and security at sea

    Jensen, R. B., 12 Nov 2020, In: Marine Policy. 7 p., 104289.

    Research output: Contribution to journalArticlepeer-review

  10. E-pub ahead of print

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 17 Nov 2020, In: Journal of Mathematical Cryptology. 15, 1, p. 45-59 15 p.

    Research output: Contribution to journalArticlepeer-review

  11. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    Integerwise Functional Bootstrapping on TFHE

    Okada, H., Kiyomoto, S. & Cid, C., 25 Nov 2020, Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  15. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 3 Dec 2020, (Accepted/In press) In: IET Information Security . 17 p.

    Research output: Contribution to journalArticlepeer-review

  17. E-pub ahead of print

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 5 Dec 2020, ASIACRYPT 2020. Springer, p. 583-613 31 p. (Lecture Notes in Computer Science; vol. 12492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Improved privacy-preserving training using fixed-Hessian minimisation

    Ogilvie, T., Player, R. & Rowell, J., 15 Dec 2020, Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography: WAHC 2020. p. 6-18 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Forthcoming

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Mayes, K., Higgins, M. & Teng, F., 23 Dec 2020, (Accepted/In press) In: IET Cyber-Physical Systems: Theory & Applications. 11 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Inclusive security: Digital security meets web science

    Coles-Kemp, L., 23 Dec 2020, In: Foundations and Trends in Web Science. 7, 2, p. 88-241 154 p.

    Research output: Contribution to journalReview articlepeer-review

  22. E-pub ahead of print

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  24. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. 2021
  26. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  28. Submitted

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Albrecht, M., Bai, S., Li, J. & Rowell, J., 9 Jan 2021, (Submitted) In: https://eprint.iacr.org/2020/1260.pdf.

    Research output: Contribution to journalArticlepeer-review

  29. E-pub ahead of print

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., 9 Jan 2021, In: The previous version is at https://eprint.iacr.org/2016/847.pdf.

    Research output: Contribution to journalArticlepeer-review

  30. Published
  31. Published

    P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time

    Kalbantner, J., Markantonakis, K., Hurley-Smith, D., Akram, R. N. & Semal, B., 25 Jan 2021, In: Energies. 14, 3, p. 1-25 25 p., 606.

    Research output: Contribution to journalArticlepeer-review

  32. E-pub ahead of print

    Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

    Da Silva, J., 9 Feb 2021, In: Methodological Innovations.

    Research output: Contribution to journalArticlepeer-review

  33. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  34. Forthcoming

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 13 Feb 2021, (Accepted/In press) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  36. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  37. Forthcoming

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., 21 May 2021, (Accepted/In press) IEEE SafeThings (in conjunction with IEEE Security & Privacy '21). IEEE, (IEEE Security and Privacy Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...38 39 40 41 42 Next