1. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  2. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, Proceedings of the 8th International Workshop on Critical Information Infrastructures Security. Springer-Verlag, p. 120-132

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  5. Published

    Subjective probability and quantum certainty

    Caves, C. M., Fuchs, C. A. & Schack, R., 2007, In: Studies in History and Philosophy of Modern Physics. 38, 2, p. 255-274 20 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticlepeer-review

  8. E-pub ahead of print

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 519-548 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, (E-pub ahead of print) Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    Subverting Deniability

    Armour, M. & Quaglia, E., 11 Nov 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  11. Published

    Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

    Rupp, A., Leander, G., Bangerter, E., Dent, A. W. & Sadeghi, A-R., 2008, Advances in Cryptology -- Asiacrypt 2008. Pieprzyk, J. (ed.). Springer-Verlag, p. 489-505 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., 1 Oct 2017, In: IEEE Transactions on Mobile Computing. 16, 10, p. 2927-2940 14 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published
  15. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., Apr 2009, p. 307- 312.

    Research output: Contribution to conferencePaperpeer-review

  16. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In: Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In: Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In: Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  21. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In: Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    TACTICS: Validation of the security framework developed for tactical SOA

    Gkioulos, V., Risthein, E. & Wolthusen, S., Aug 2017, In: Journal of Information Security and Applications. 35, p. 96-105 10 p.

    Research output: Contribution to journalArticlepeer-review

  25. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution