1. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In: Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In: IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Attacker-centric thinking in security: perspectives from financial services practitioners

    Moeckel, C., Aug 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  6. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  7. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In: Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Attacking the IPsec Standards in Encryption-only Configurations

    Degabriele, J. P. & Paterson, K. G., 2007, IEEE Symposium on Privacy and Security. IEEE Computer Society Press, p. 335-349 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Attacks against GSMA’s M2M Remote Provisioning

    Quaglia, E., Smyth, B. & Meyer, M., 2018, Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, p. 194-202 9 p. (WiSec '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Aug 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 113-128 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In: Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis

    Balfe, S. & Paterson, K. G., 2008, Financial Cryptography. Tsudik, G. (ed.). Springer, p. 171-175 5 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Unpublished

    Authenticated Encryption in Theory and in Practice

    Degabriele, J., 2014, (Unpublished) 182 p.

    Research output: ThesisDoctoral Thesis

  18. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In: IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2 Jul 2015, 2015 International Conference on Biometrics (ICB). IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Unpublished

    Authentication by Gesture Recognition: a Dynamic Biometric Application

    Ducray, B., 2017, (Unpublished) 146 p.

    Research output: ThesisDoctoral Thesis

  22. Unpublished

    Authentication Issues in Near Field Communication and RFID

    Saeed, Q., 2014, (Unpublished) 137 p.

    Research output: ThesisDoctoral Thesis

  23. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In: IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In: Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In: Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B., 2018, Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Springer, p. 322-343 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In: Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticlepeer-review

  29. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  30. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In: International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  36. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In: Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticlepeer-review

  37. Unpublished

    Automating interpretations of trustworthiness

    Sel, M., 2021, (Unpublished) Royal Holloway, University of London. 507 p.

    Research output: ThesisDoctoral Thesis

  38. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In: Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticlepeer-review

  40. E-pub ahead of print

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, (E-pub ahead of print) Proceedings of TrustBUS 2021: September 2021. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., Apr 2014, 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  43. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., Aug 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In: IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In: Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1...4 5 6 7 8 9 10 11 ...43 Next