1. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In: Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  3. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In: HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...214 Next