1. Article › Research › Peer-reviewed
  2. Published

    Web-Services Architecture for Pervasive Computing Environment

    Malik, N. A. & Tomlinson, A., 1 Sep 2009, In: Pakistan Journal of Science. 61, 3, p. 153 - 157

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K., 2010, In: Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    What Can a Critical Cybersecurity Do?

    Dwyer, A., Stevens, C., Muller, L., Dunn Cavelty, M., Coles-Kemp, L. & Thornton, P., Sep 2022, In: International Political Sociology. 16, 3

    Research output: Contribution to journalArticlepeer-review

  6. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D., 2008, In: ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K., 11 Jun 2018, In: Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In: Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In: Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Zero/positive capacities of two-dimensional runlength constrained arrays

    Etzion, T. & Paterson, K. G., 2005, In: IEEE Transactions on Information Theory. 51, 9, p. 3186-3199 14 p.

    Research output: Contribution to journalArticlepeer-review