1. Article › Research › Peer-reviewed
  2. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In: International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In: Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In: Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In: Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticlepeer-review

  6. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In: International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In: Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In: IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In: Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In: Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In: IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In: IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In: Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In: Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In: Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In: International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In: Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In: Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In: IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In: Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticlepeer-review