1. Article › Research › Peer-reviewed
  2. Published

    Understanding the Value and Potential of Threat Modeling for Application Security Design - An E-Banking Case Study

    Moeckel, C. & Abdallah, A. E., 2011, In: Journal of Information Assurance and Security. 6, 5, p. 346-356 11 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In: Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Unknown quantum states: The quantum de Finetti representation

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Journal of Mathematical Physics. 43, p. 4537-4559 23 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In: International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In: Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Unsettling antibiosis: how might interdisciplinary researchers generate a feeling for the microbiome and to what effect?

    Greenhough, B., Dwyer, A., Grenyer, R., Hodgetts, T., McLeod, C. & Lorimer, J., 2018, In: Palgrave Communications. 4, 149

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Updating the parameters of a threshold scheme by minimal broadcast

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: IEEE Transactions on Information Theory. 51, 2, p. 620-633 14 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review