1. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In: Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In: Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B., 2018, Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Springer, p. 322-343 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In: Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticlepeer-review

  6. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  7. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In: International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  13. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In: Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticlepeer-review

  14. Unpublished

    Automating interpretations of trustworthiness

    Sel, M., 2021, (Unpublished) Royal Holloway, University of London. 507 p.

    Research output: ThesisDoctoral Thesis

  15. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In: Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., Apr 2014, 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  20. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., Aug 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In: IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticlepeer-review