1. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In: Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In: IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In: IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Specifying and enforcing constraints in role-based access control

    Crampton, J., 2003, Proceedings of 8th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In: Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Squeezed light from a self-frequency doubling laser

    Sizmann, A., Schack, R. & Schenzle, A., 1990, In: Europhysics Letters. 13, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    SSL/TLS session-aware user authentication using a GAA bootstrapped key

    Chen, C., Mitchell, C. J. & Tang, S., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication, 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings. Ardagna, C. & Zhou, J. (eds.). Springer-Verlag, Vol. 6633. p. 54-68 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Stability of Power Network State Estimation Under Attack

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference Asia (ISGT Asia 2014). IEEE Press, p. 441 446 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, NDSS Symposium 2017. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    State Estimation under Undetectable Single and Double Line Failures: Anonymised for review

    Gul, A. & Wolthusen, S. D., 8 Aug 2019, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    State preparation based on Grover's algorithm in the presence of global information about the state

    Soklakov, A. N. & Schack, R., 2005, In: Optics and Spectroscopy. 99, p. 211-217 7 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 12 Jul 2007, In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. In preparation
  19. Published

    Statistical attacks on cookie masking for RC4

    Paterson, K., Sep 2018, In: Cryptography and Communications. 10, 5, p. 777-801 25 p.

    Research output: Contribution to journalArticlepeer-review

  20. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, (E-pub ahead of print) Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A., 2014, UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In: Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Storage efficient decoding for a class of binary de Bruijn sequences

    Paterson, K. G. & Robshaw, M. J. B., 1995, In: Discrete Mathematics. 138, p. 327-341 15 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

    Rezaei Khouzani, M., Pham, V. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 59-78 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Strengthening Password-Based Authentication

    Al Maqbali, F., 2019, 207 p.

    Research output: ThesisDoctoral Thesis

  26. Published
  27. E-pub ahead of print

    Strong Post-Compromise Secure Proxy Re-Encryption

    Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, (E-pub ahead of print) Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S. & Wolthusen, S. D., 6 Oct 2008, Computer Security - ESORICS 2008: Proc. 13th European Symposium on Research in Computer Security. Springer-Verlag, p. 49-65

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  30. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, Proceedings of the 8th International Workshop on Critical Information Infrastructures Security. Springer-Verlag, p. 120-132

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  33. Published

    Subjective probability and quantum certainty

    Caves, C. M., Fuchs, C. A. & Schack, R., 2007, In: Studies in History and Philosophy of Modern Physics. 38, 2, p. 255-274 20 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticlepeer-review

  36. E-pub ahead of print

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 519-548 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, (E-pub ahead of print) Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

    Rupp, A., Leander, G., Bangerter, E., Dent, A. W. & Sadeghi, A-R., 2008, Advances in Cryptology -- Asiacrypt 2008. Pieprzyk, J. (ed.). Springer-Verlag, p. 489-505 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., 1 Oct 2017, In: IEEE Transactions on Mobile Computing. 16, 10, p. 2927-2940 14 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., Apr 2009, p. 307- 312.

    Research output: Contribution to conferencePaperpeer-review

  42. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In: Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In: Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In: Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  47. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In: Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    TACTICS: Validation of the security framework developed for tactical SOA

    Gkioulos, V., Risthein, E. & Wolthusen, S., Aug 2017, In: Journal of Information Security and Applications. 35, p. 96-105 10 p.

    Research output: Contribution to journalArticlepeer-review