1. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S., 1998, In: Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, (E-pub ahead of print) EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In: Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, Palgrave Macmillan.

    Research output: Book/ReportAnthology

  6. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticlepeer-review

  7. Published

    The High-Fidelity Computer Reconstruction of Byzantine Art in Cyprus

    Happa, J., Zányi, E., Hulusi, V., Chrysanthou, Y. & Chalmers, A., 2008, In: Proceedings of IV International Cyprological Congress.

    Research output: Contribution to journalArticlepeer-review

  8. Published
  9. Published

    The Impact of Pandemic-Driven Remote Working on Employee Wellbeing, the Psychological Contract and Cyber Security Remote Working and (In)Security

    Crossland, G. & Ertan, A., Jun 2021, Research Institute for Sociotechnical Cyber Security. 41 p.

    Research output: Book/ReportCommissioned report

  10. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published
  13. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J., 2006, In: ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    The length of a typical Huffman codeword

    Schack, R., 1994, In: IEEE Transactions on Information Theory. IT-40, p. 1246-1247 2 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    The linear complexity of the self-shrinking generator

    Blackburn, S. R., 1999, In: IEEE Transactions on Information Theory. 45, 6, p. 2073-2077 5 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In: Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issuepeer-review

  20. Published

    The microbiome and its publics: A participatory approach for engaging publics with the microbiome and its implications for health and hygiene: EMBO reports

    Hodgetts, T., Grenyer, R., Greenhough, B., McLeod, C., Dwyer, A. & Lorimer, J., 2018, In: EMBO Reports. 19, 6

    Research output: Contribution to journalArticlepeer-review

  21. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C., 2010, In: Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticlepeer-review

  22. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  23. Published

    The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos

    Chaumette, S., Markantonakis, K., Mayes, K. & Sauveron, D., Sep 2006.

    Research output: Contribution to conferencePaperpeer-review

  24. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  25. Published

    The monitorability of service-level agreements for application-service provision

    Skene, J., Skene, A., Crampton, J. & Emmerich, W., 2007, Proceedings of the 6th International Workshop on Software and Performance. Cortellessa, V., Uchitel, S. & Yankelevich, D. (eds.). ACM Press, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution