1. Conference contribution › Research
  2. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    SSL/TLS session-aware user authentication using a GAA bootstrapped key

    Chen, C., Mitchell, C. J. & Tang, S., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication, 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings. Ardagna, C. & Zhou, J. (eds.). Springer-Verlag, Vol. 6633. p. 54-68 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Stability of Power Network State Estimation Under Attack

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference Asia (ISGT Asia 2014). IEEE Press, p. 441 446 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, NDSS Symposium 2017. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    State Estimation under Undetectable Single and Double Line Failures: Anonymised for review

    Gul, A. & Wolthusen, S. D., 8 Aug 2019, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 12 Jul 2007, In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, (E-pub ahead of print) Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A., 2014, UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

    Rezaei Khouzani, M., Pham, V. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 59-78 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution