1. Published

    Smart Cards, Tokens, Security and Applications

    Mayes, K. & Markantonakis, K., 2010, Springer.

    Research output: Book/ReportBook

  2. Published

    Smart Cards for Security and Assurance

    Markantonakis, K., Piper, F. & Mayes, K., 2007, Managing Information Assurance in Financial Services. Information Science Publishing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Smart cards and the associated infrastructure problem

    Paterson, K. G., Piper, F. & Robshaw, M., 2002, In: Information Security Technical Report. 7, 3, p. 20-29 10 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Smart Cards

    Tunstall, M., Markantonakis, K., Sauveron, D. & Mayes, K., 2009, Handbook of Technology Management. Bidgoli, H. (ed.). John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 1 Jan 2011, Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  8. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Mobile Robots: The Evolutionary Approach. Nadia, N., Leandro dos Santos, C. & Luiza de Macedo, M. (eds.). Vol. 50. p. 205 237 p. (Studies in Computational Intelligence; vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Piper, F. & Tunstall, M., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Smart card Platform-Fingerprinting: Smart Card Technology International

    Mayes, K., Markantonakis, K. & Chen, C., Oct 2006, Smart Card Technology International: The Global Journal of Advanced Card Technology. Locke, M. (ed.). Smart Card Technology International, p. 78 82 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Smart card based authentication - any future?

    Markantonakis, K., Mayes, K. & Fred, P., 2005, In: Computers and Security. 24, 3, p. 188-191 4 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Small Scale Variants of the AES

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Fast Software Encryption, 12th International Workshop, FSE 2005. Springer, Vol. 3557. p. 145-162 18 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    Slide reduction, revisited—filling the gaps in svp approximation

    Aggarwal, D., Li, J., Nguyen, P. Q. & Stephens-Davidowitz, N., 10 Aug 2020, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 274-295 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  18. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R., 2002, Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384. p. 71-88 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In: Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In: IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In: IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, (E-pub ahead of print) Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Simulation on a quantum computer

    Schack, R., 2006, In: Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance

    Borgen, H., Bours, P. & Wolthusen, S. D., 2 Jun 2009, Third International Conference on Advances in Biometrics (ICB 2009). Springer-Verlag, p. 857-867

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In: Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, (E-pub ahead of print) Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In: Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticlepeer-review

  36. E-pub ahead of print

    Signposts: Cyprus, the UK and the Future of the SBAs

    Dodds, K-J., Jensen, R. & Constantinou, C., 7 Nov 2015, (E-pub ahead of print) In: RUSI Journal. 160, 5, p. 36-45 10 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Signcryption schemes based on the RSA problem

    Dent, A. W. & Malone-Lee, J., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 99-120

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In: Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  40. Published

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 1 Apr 2020, In: Environment and Planning D: Society and Space. 38, 2, p. 364-382 19 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  42. Published

    Shifts on a finite qubit string: A class of quantum baker's maps

    Schack, R. & Caves, C. M., 2000, In: Applicable Algebra in Engineering, Communication and Computing (AAECC). 10, p. 305-310 6 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In: Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  48. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  49. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaperpeer-review

Previous 1...4 5 6 7 8 9 10 11 ...43 Next