1. 2001
  2. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In : Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticle

  3. Published

    Comments on ``Dynamic Participation in a Secure Conference Scheme for Mobile Communications''.

    Ng, S-L., 2001, In : IEEE Transaction on Vehicular Technology. 50, 1, p. 334-335

    Research output: Contribution to journalComment/debate

  4. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In : EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  5. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In : Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticle

  6. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In : Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticle

  9. Published

    Invariants of Finite Groups and Involutive Division

    Cid, C. & Plesken, W., 2001, Computer Algebra in Scientific Computing CASC 2001. Springer, p. 123-135 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?

    Markantonakis, K., 2001, Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge. Kluwer, B.V., p. 77-92 16 p. (IFIP/Sec '01).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Key recovery attacks on MACs based on properties of cryptographic APIs

    Brincat, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 63-72 10 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Key recovery scheme interoperability - a protocol for mechanism negotiation

    Rantos, K. & Mitchell, C. J., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    New CBC-MAC forgery attacks

    Brincat, K. & Mitchell, C. J., 2001, Information Security and Privacy, ACISP 2001, Sydney, Australia, July 2001. Varadharajan, V. & Mu, Y. (eds.). Springer-Verlag, p. 3-14 12 p. (Lecture Notes in Computer Science; no. 2119).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    On k-arcs Covering a Line in Finite Projective Planes.

    Ng, S-L. & Wild, P., 2001, In : Ars Combinatoria. 58, p. 289-300

    Research output: Contribution to journalArticle

  15. Published

    On mobile agent based transactions in moderately hostile environments

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Advances in Network and Distributed Systems Security, Proceedings of IFIP TC11 WG11.4 First Annual Working Conference on Network Security, KU Leuven, Belgium, November 2001. De Decker, B., Piessens, F., Smits, J. & Van Herreweghen, E. (eds.). Kluwer Academic Publishers, p. 173-186 14 p. (IFIP Conference Proceedings; no. 206).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On the composition of matroids and ideal secret sharing schemes.

    Ng, S-L. & Walker, M., 2001, In : Designs, Codes and Cryptography. 24, p. 49-67

    Research output: Contribution to journalArticle

  17. Unpublished

    On the theory of point-weight designs

    Dent, A. W., 2001, (Unpublished)

    Research output: ThesisDoctoral Thesis

  18. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In : Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticle

  19. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In : Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticle

  22. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In : IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticle

  23. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The completion of a poset in a lattice of antichains

    Crampton, J. & Loizou, G., 2001, In : International Mathematical Journal. 1, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  25. Published

    Thwarting timing attacks using ATM networks

    Price, G., 2001, Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In : IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticle

  29. 2002
  30. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In : Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticle

  34. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In : IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticle

  35. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  36. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In : Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticle

  38. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticle

  39. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In : Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticle

  41. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In : Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticle

  42. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In : Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticle

  45. Published

    Existence of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2002, Codes, Graphs, and Systems: A Celebration of the Life and Career of G. David Forney. Blahut, R. E. & Koetter, R. (eds.). Kluwer Academic Publishers, p. 187-197 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In : Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticle

  48. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...3 4 5 6 7 8 9 10 ...41 Next