1. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  4. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  5. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  10. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    An ethics framework for research into heterogeneous systems

    Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. & Williams, R., 14 Jun 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  18. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, (E-pub ahead of print) p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D., 5 Oct 2017, Custard, Culverts and Cake: Academics on Life in The Archers. Courage, C. & Headlam, N. (eds.). Emerald Publishing, p. 249-267

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H., 2018, In: International Journal of Sensor Networks. 26, 1, p. 54-68 15 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Sgandurra, D. & Wang, R., 1 May 2018, (E-pub ahead of print) In: International Journal of Grid and Utility Computing. 9, 2, p. 170-178 9 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...7 8 9 10 11 12 13 14 ...86 Next