1. Article › Research › Not peer-reviewed
  2. Published

    The NHS cyber-attack: A look at the complex environmental conditions of WannaCry

    Dwyer, A. C., 2018, In: RAD Magazine. 44, p. 25-26 2 p.

    Research output: Contribution to journalArticle

  3. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In: Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  4. Patent › Research
  5. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  6. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  7. Other report › Research
  8. Published

    AES Security Report: ECRYPT Report D.STVL.2

    Cid, C. & Gilbert, H., 30 Jan 2006, ECRYPT. 73 p.

    Research output: Book/ReportOther report

  9. Published

    Algebraic Cryptanalysis of Symmetric Primitives: ECRYPT report D.STVL.7

    Cid, C., 18 Jul 2008, ECRYPT. 42 p.

    Research output: Book/ReportOther report

  10. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  11. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  12. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  13. Published

    Crafting a democratic and responsible cyber power?

    Dwyer, A., Aug 2022, Offensive Cyber Working Group. 18 p.

    Research output: Book/ReportOther report