1. Article › Research › Peer-reviewed
  2. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S., 2009, In: International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Design of a secure distance-bounding channel for RFID

    Hancke, G., 2012, In: Journal of Network and Computer Applications. 34, 3, p. 877-887

    Research output: Contribution to journalArticlepeer-review

  4. E-pub ahead of print

    Detecting CAN Attacks on J1939 and NMEA 2000 Networks

    Rogers, M., Weigand, P., Happa, J. & Rasmussen, K., 14 Jun 2022, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In: Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Detection of repackaged mobile applications through a collaborative approach

    Aldini, A., Martinelli, F., Saracino, A. & Sgandurra, D., 10 Aug 2015, In: Concurrency Computation. 27, 11, p. 2818-2838 21 p.

    Research output: Contribution to journalArticlepeer-review

  7. E-pub ahead of print

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 17 Nov 2020, (E-pub ahead of print) In: Journal of Mathematical Cryptology. 15, 1, p. 45-59 15 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Disjoint difference families and their applications

    Ng, S-L. & Paterson, M. B., Jan 2016, In: Designs, Codes and Cryptography. 78, p. 103-127 25 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Distance Bounding: A Practical Security Solution for Industrial Real-Time Location Systems?

    Abu-Mahfouz, A. & Hancke, G., Feb 2013, In: IEEE Transactions on Industrial Informatics. 9, 1, p. 16 27 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In: IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P., 2005, In: Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Distributing trust amongst multiple authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, In: Journal of Computer Security. 3, 4, p. 255-267 13 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In: Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In: J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In: secure Magazine. 1, 9

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In: Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Efficient Attack Graph Analysis through Approximate Inference

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E., Jul 2017, In: ACM Transactions on Information and System Security. 20, 3, p. 1-30 30 p., 10.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In: Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In: IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Emergency Mobilities

    Adey, P., 25 Jan 2016, In: Mobilities. 11, 1, p. 32-48 17 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Butler-Rees, A. & Robinson, N., Nov 2020, In: Emotion, Space and Society. 37, 7 p., 100743.

    Research output: Contribution to journalArticlepeer-review

  26. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, (E-pub ahead of print) In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review