1. Published

    Actor-Network Procedures

    Pavlovic, D. & Meadows, C., 2012, Distributed Computing and Internet Technology: 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012: Proceedings. Ramanujam, R. & Ramaswamy, S. (eds.). Springer-Verlag, p. 7-26 (Lecture Notes in Computer Science; vol. 7154).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Adaptive online/offline RFID scheme for supply chain management systems

    Bilal, Z. & Martin, K. M., 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) . IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Addressing privacy issues in location-based collaborative and distributed environments

    Saracino, A., Sgandurra, D. & Spagnuelo, D., 2014, 2014 International Conference on Collaboration Technologies and Systems, CTS 2014. IEEE Computer Society, p. 166-172 7 p. 6867560

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    Addressing Security and Privacy Issues in Low-Cost RFID Systems

    Bilal, Z., 2015, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  8. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Adjacency Matrices

    Walter, C. D., 1986, In: SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In: ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticlepeer-review

  12. Unpublished

    Advancements in Proxy Re-Encryption: Defining Security for wider Applications

    Lee, E., 2020, (Unpublished) 221 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

    Wolthusen, S. D. (ed.), Lopez, J. (ed.) & Setola, R. (ed.), 2 Mar 2012, Heidelberg, Germany: Springer-Verlag. 357 p.

    Research output: Book/ReportAnthology

  14. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    AES Security Report: ECRYPT Report D.STVL.2

    Cid, C. & Gilbert, H., 30 Jan 2006, ECRYPT. 73 p.

    Research output: Book/ReportOther report

  16. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Forthcoming

    Air

    Adey, P., 2013, (Accepted/In press) London: Reaktion Books.

    Research output: Book/ReportBook

  19. Published

    Air/Atmospheres of the Megacity

    Adey, P., Dec 2013, In: Theory, Culture and Society. 30, 7-8, p. 291-308 18 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Air’s affinities: Geopolitics, chemical affect and the force of the elemental

    Adey, P., 1 Mar 2015, In: Dialogues in Human Geography. 5, 1, p. 54-75 22 p.

    Research output: Contribution to journalArticlepeer-review

  21. Forthcoming

    Airports

    Adey, P., 2013, (Accepted/In press) Globalization in Practice. Thrift, N., Tickell, A. & Woolgar, S. (eds.). Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M., 2006, Springer.

    Research output: Book/ReportBook

  23. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Algebraic Cryptanalysis of Symmetric Primitives: ECRYPT report D.STVL.7

    Cid, C., 18 Jul 2008, ECRYPT. 42 p.

    Research output: Book/ReportOther report

Previous 1...5 6 7 8 9 10 11 12 ...85 Next