1. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In: Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    An information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Classical Correspondence: Proceedings of the 4th Drexel Symposium on Quantum Nonintegrability. Feng, D. H. & Hu, B. L. (eds.). Cambridge, Massachusetts: International Press, p. 339-353

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2009, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    An Overview of the Formal Verification on the Digital Marketplace Cryptographic Protocols

    Goo, S. K., Irvine, J. & Tomlinson, A., 1 Jun 2006.

    Research output: Contribution to conferencePaper

  11. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In: Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticlepeer-review

  12. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  16. Published

    Analysing and exploiting the Mantin biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T., Apr 2018, In: Designs, Codes and Cryptography. 86, 4, p. 743–770 28 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, (E-pub ahead of print) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished

    Analysis and Classification of Android Malware

    Tam, K., 18 May 2016, (Unpublished) 197 p.

    Research output: ThesisDoctoral Thesis

  21. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  23. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In: Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In: Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In: IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...8 9 10 11 12 13 14 15 ...86 Next