1. Article › Research › Peer-reviewed
  2. Published

    Functional repair codes: a view from projective geometry

    Ng, S. & Paterson, M., Nov 2019, In: Designs, Codes and Cryptography. 87, 11, p. 2701-2722 22 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Fundamental problems in provable security and cryptography

    Dent, A. W., 2006, In: Phil Trans R Soc A. 364, 1849, p. 3215-3230 16 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study

    Ibrahim, S., Rush, M., Edwards, E. T. & Monks, C. P., 31 Dec 2017, In: Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 16 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Generalised Reed-Muller Codes and Power Control in OFDM

    Paterson, K. G., 2000, In: IEEE Transactions on Information Theory. 46, 1, p. 104-120 17 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In: Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Geometric Secret Sharing Schemes and their Duals

    Martin, K. M. & Jackson, W-A., 1994, In: Designs, Codes and Cryptography. 4, p. 83-95 13 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Geometrical contributions to secret sharing theory

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 2004, In: Journal of Geometry. 79, 1-2, p. 102-133 32 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Grammar-based transformations: Attack and Defence

    Repel, D. & Stengel, I., 25 Jun 2014, In: Information and Computer Security . 22, 2, p. 141-154

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K., Oct 2016, In: Designs, Codes and Cryptography. 81, 1, p. 11-34 24 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In: Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Groups of prime power order with derived subgroup of prime order

    Blackburn, S. R., 1999, In: Journal of Algebra. 219, p. 625-657 33 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    HB-MP+ Protocol: An Improvement on the HB-MP Protocol

    Leng, X., Mayes, K. & Markantonakis, K., 1 Apr 2008, In: IEEE International Conference on RFID -- IEEE RFID 2008. p. 118-124 7 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Hearing attacks in network data: An effectiveness study

    Axon, L., Happa, J., Goldsmith, M. & Creese, S., Jun 2019, In: Computers and Security. 83, p. 367-388 22 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Hierarchical, model-based risk management of critical infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, In: Reliability Engineering & System Safety. 94, 9, p. 1403 - 1415

    Research output: Contribution to journalArticlepeer-review

  17. Published

    High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology

    Happa, J., Artusi, A., Czanner, S. & Chalmers, A., 2010, In: Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Intelligent Cultural Heritage. p. 17-24 8 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In: Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Honeycomb arrays

    Blackburn, S. R., Panoui, A., Paterson, M. B. & Stinson, D. R., 2010, In: The Electronic Journal of Combinatorics. 17, R172, p. 1 1 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Honeyc-the low-interaction client honeypot

    Seifert, C., Welch, I. & Komisarczuk, P., 2007, In: Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K., Nov 2018, In: Wireless Networks. 24, 8, p. 3009–3027 19 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 15, 3, p. 223-230 8 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    How to build time-lock encryption

    Liu, J., Jager, T., Kakvi, S. & Warinschi, B., Nov 2018, In: Designs, Codes and Cryptography. 86, p. 2549-2586

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Hybrid cryptography

    Dent, A. W., 2004, In: Cryptology ePrint Archive: Report. 2004/210

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In: Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticlepeer-review