1. Published
  2. Published
  3. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    RUSH, M. & Ibrahim, S., 1 Mar 2018, In : Sociological Research Online. 23, 1, p. 177-196 20 p.

    Research output: Contribution to journalArticle

  4. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution

  5. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published
  7. Published

    A Binary Model of Broken Home: Parental Death-Divorce Hypothesis of Male Juvenile Delinquency in Nigeria and Ghana

    Ibrahim, S., 3 Sep 2015, Contemporary Perspectives in Family Research. Blair, S. L. & Maxwell, S. R. (eds.). New York: Emerald Publishing, Vol. 9. p. 311-340 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  8. Published

    A Bit-fixing PRF with O(1) Collusion-Resistance from LWE

    Davidson, A. & Nishimaki, R., 21 Sep 2018, In : IACR Cryptology ePrint Archive. 2018, 890, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  9. Published

    A board game for teaching internet engineering

    Komisarczuk, P. & Welch, I., 2006, Proceedings of the 8th Australasian Conference on Computing Education-Volume 52. p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks

    Askoxylakis, I. G., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society Press, p. 193-202 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In : NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  12. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In : Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticle

  15. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2019, (Submitted).

    Research output: Working paper

  16. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In : Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticle

  18. E-pub ahead of print
  19. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In : Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticle

  20. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  21. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  22. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D., 2012, ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 386-403 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A collaborative framework for generating probabilistic contracts

    Martinelli, F., Saracino, A., Sgandurra, D. & Aldini, A., 1 May 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS). p. 139-142 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  26. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., 2014, Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticle

  28. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticle

  33. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In : Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticle

  34. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Forthcoming

    A critique of game-based definitions of receipt-freeness for voting

    Fraser, A., Quaglia, E. & Smyth, B., 2019, (Accepted/In press).

    Research output: Contribution to conferencePaper

  36. Published

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P., 2018, In : GeoHumanities. 4, 2, p. 417-437 21 p.

    Research output: Contribution to journalArticle

  37. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaper

  39. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In : Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticle

  40. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In : Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticle

  41. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    A device management framework for secure ubiquitous service delivery

    Leung, A. & Mitchell, C. J., 2008, Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008. Los Alamitos, CA: IEEE Computer Society Press, p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. In preparation

    A Digital Government for All Seasons? Exploring the Values Embedded in Data-Driven Policy-Making and Government

    Robinson, N., Margetts, H. & Zalepuga, A., 1 Jan 2018, (In preparation).

    Research output: Working paper

  45. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    Askoxylakis, I. G., Markantonakis, K., Tryfonas, T., May, J. & Traganitis, A., 2009, Mobile Lightweight Wireless Systems. Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S., Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. S., Stan, M., Xiaohua, J., Zomaya, A. & Coulson, G. (eds.). Springer Berlin / Heidelberg, Vol. 13. p. 103-113 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  49. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In : Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticle

  52. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In : International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticle

  53. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In : Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticle

  54. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  55. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticle

  57. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  58. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In : HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticle

  61. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In : Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticle

  62. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In : Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticle

  63. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In : IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticle

  65. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In : Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticle

  66. Published

    A generic group key management framework for group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2006, Proceedings of the 6th International Network Conference (INC2006).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  67. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In : Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticle

  69. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In : The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticle

  73. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J., 13 Mar 2018, p. 152-154. 3 p.

    Research output: Contribution to conferencePoster

  75. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In : BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticle

  76. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticle

  77. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published
  80. Published

    A Multi-criteria-Based Evaluation of Android Applications

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 2012, Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Mitchell, C. J. & Tomlinson, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 67-82 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016. Springer-Verlag, p. 173-184 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, In : E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on. 0, p. 20 1 p.

    Research output: Contribution to journalArticle

  83. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, p. 429-447. 19 p.

    Research output: Contribution to conferencePaper

  85. E-pub ahead of print

    A new description of orthogonal bases

    Coecke, B., Vicary, J. & Pavlovic, D., 9 Nov 2012, In : Mathematical Structures in Computer Science.

    Research output: Contribution to journalArticle

  86. Published

    A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, CRYPTO 2017: Advances in Cryptology – CRYPTO 2017. Springer, p. 682-710 29 p. (Lecture Notes in Computer Science; vol. 10403).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In : European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticle

  88. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    A note on an upper bound of traceability codes

    Owen, S. & Ng, S-L., 2 Apr 2015, In : Australasian Journal of Combinatorics. 62, 1, p. 140-146 7 p.

    Research output: Contribution to journalArticle

  90. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In : Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticle

  91. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In : Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticle

  92. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In : Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticle

  93. E-pub ahead of print
  94. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  95. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...19 Next