1. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  5. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Usability and Security in EU E-Banking Systems - Towards an Integrated Evaluation Framework

    Moeckel, C., 30 Aug 2011. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  9. Published

    Updating the parameters of a threshold scheme by minimal broadcast

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: IEEE Transactions on Information Theory. 51, 2, p. 620-633 14 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In: Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In: International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  15. Published

    Unknown quantum states: The quantum de Finetti representation

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Journal of Mathematical Physics. 43, p. 4537-4559 23 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Universal Mobile Telecommunications System (UMTS); LTE; Performance evaluation of the Tuak algorithm set

    Mayes, K., Jan 2016, ETSI TR 135 935: Technical Report.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In: Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Understanding the Value and Potential of Threat Modeling for Application Security Design - An E-Banking Case Study

    Moeckel, C. & Abdallah, A. E., 2011, In: Journal of Information Assurance and Security. 6, 5, p. 346-356 11 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., Jun 2017, In: IEEE Transactions on Information Forensics and Security . 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...86 Next