1. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Zero/positive capacities of two-dimensional runlength constrained arrays

    Etzion, T. & Paterson, K. G., 2005, In : IEEE Transactions on Information Theory. 51, 9, p. 3186-3199 14 p.

    Research output: Contribution to journalArticle

  4. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 9 Nov 2009.

    Research output: Working paper

  7. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In : Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  9. Published
  10. Published
  11. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  12. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In : Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticle

  13. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  14. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Why so serious? Introducing a fun take on cyber war

    Haggman, A., 5 May 2018, New Statesman, 2018, 4-10 May, p. 16-18 3 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  16. Published

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K., 11 Jun 2018, In : Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticle

  17. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  18. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Who needs trust for 5G?

    Mitchell, C. J., 2 May 2020, arXiv.

    Research output: Working paper

  20. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D., 2008, In : ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticle

  21. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., Dec 2012, Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    What Should You Pay to Protect Your Data? The Economics of Cyber Security

    Ertan, A., 9 Mar 2018, Cyber World , March 2018 edition, p. 50-55 6 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  24. Published

    What is trusted computing?

    Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    What Can Identity-Based Cryptography Offer to Web Services?

    Crampton, J., Lim, H. W. & Paterson, K. G., 2007, Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA.. ACM Press, p. 26-36 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 3 4 5 6 7 8 ...83 Next