1. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L., 6 Feb 2017, In: ACM Computing Surveys. 49, 4, p. 1-41 41 p., 76.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  3. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  4. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  5. Published

    The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem

    Blackburn, S. R., 2010, In: Journal of Mathematical Cryptology. 4, 2, p. 193-198 6 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  8. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  9. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  10. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  11. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  12. Published

    The Cramer-Shoup encryption scheme is plaintext aware in the standard model

    Dent, A. W., 2006, Advances in Cryptology -- Eurocrypt 2006. Vaudenay, S. (ed.). Springer-Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In: Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C., 2004, Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 155-169 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    The completion of a poset in a lattice of antichains

    Crampton, J. & Loizou, G., 2001, In: International Mathematical Journal. 1, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In: SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    The combinatorics of generalised cumulative arrays.

    Martin, K. M. & Ng, S-L., 2007, In: Journal of Mathematical Cryptology. 1, 1, p. 13-32 20 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    The combinatorics of cryptographic key establishment

    Martin, K. M., 2007, Surveys in Combinatorics. Cambridge University Press, Vol. 346. p. 223-273 51 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    The class number of pure fields of prime degree (addendum)

    Parry, C. J. & Walter, C. D., 1977, In: Mathematika. 24, p. 122 1 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    The class number of pure fields of prime degree

    Parry, C. J. & Walter, C. D., 1976, In: Mathematika. 23, p. 220-226 7 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, D. K. (eds.). Springer, p. 369-381 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R., 16 Mar 2017, In: Journal of Computer Security. 25, 1, p. 83-115 33 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...7 8 9 10 11 12 13 14 ...90 Next