1. Article › Research › Peer-reviewed
  2. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Butler-Rees, A. & Robinson, N., Nov 2020, In: Emotion, Space and Society. 37, 7 p., 100743.

    Research output: Contribution to journalArticlepeer-review

  4. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, (E-pub ahead of print) In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In: ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In: Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In: Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In: Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In: Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P., 2009, In: Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In: Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticlepeer-review

  12. E-pub ahead of print

    Evacuated to Death: The Lexicon, Concept, and Practice of Mobility in the Nazi Deportation and Killing Machine

    Adey, P., 29 Aug 2019, (E-pub ahead of print) In: Annals of the Association of American Geographers. 110, 3, p. 808-826 19 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

    Sgandurra, D. & Lupu, E., 8 Feb 2016, In: ACM Computing Surveys. 48, 3, p. 1-38 38 p., 46.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 23 Mar 2017, In: IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Explicit product ensembles for separable quantum states

    Schack, R. & Caves, C. M., 2000, In: J. Mod. Opt.. 47, p. 387-399 13 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Exponentiation Using Division Chains

    Walter, C. D., 1998, In: IEEE Transactions on Computers. 47, 7, p. 757-765 9 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Fast Fourier Transforms using the Complex Logarithmic Number System

    Arnold, M. G., Bailey, T. A., Cowles, J. R. & Walter, C. D., 2003, In: VLSI Signal Processing. 33, 3, p. 325-335 11 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Fast Modular Multiplication using 2-Power Radix

    Walter, C. D., 1991, In: International J. of Computer Mathematics. 3, p. 21-28 8 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Fast Rational Interpolation, Reed--Solomon Decoding and the Linear Complexity Profiles of Sequences

    Blackburn, S. R., 1997, In: IEEE Transactions on Information Theory. 43, 2, p. 537-548 12 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In: Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Flaws in an e-mail protocol of Sun, Hsieh and Hwang

    Dent, A. W., 2005, In: IEEE Communications Letters. 9, 8, p. 718-719 2 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2014, In: SAIEE Africa Research Journal. 105, 2, p. 21 28 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Forensic smartphone analysis using adhesives: Transplantation of Package on Package components

    Heckmann, T., Markantonakis, K., Naccache, D. & Souvignet, T., Sep 2018, In: digital investigation. 26, p. 29-39 11 p.

    Research output: Contribution to journalArticlepeer-review

  24. E-pub ahead of print

    Fragmented digital connectivity and security at sea

    Jensen, R. B., 12 Nov 2020, (E-pub ahead of print) In: Marine Policy. 7 p., 104289.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Frameproof Codes

    Blackburn, S. R., 2003, In: SIAM Journal on Discrete Mathematics. 16, p. 499-510 12 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Frontier: resilient edge processing for the internet of things

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., Jun 2018, In: VLDB Endowment. 11, 10, p. 1178-1191 14 p.

    Research output: Contribution to journalArticlepeer-review