1. Paper › Research › Not peer-reviewed
  2. Published

    Mutual Authentication of B3G devices within Personal Distributed Environments

    Billington, K. L. & Tomlinson, A., 1 Oct 2004, p. 452-456. 5 p.

    Research output: Contribution to conferencePaper

  3. Published

    Preserving Privacy in Assistive Technologies

    Goo, S. K., Irvine, J. M., Andonovic, I. & Tomlinson, A., 1 Jun 2009, p. 110 - 115.

    Research output: Contribution to conferencePaper

  4. Published

    Protection of Downloadable Software on SDR Devices

    Gallery, E. & Tomlinson, A., 1 Nov 2005.

    Research output: Contribution to conferencePaper

  5. Published

    Regional Blackouts: Protection of Broadcast Content on 3G Networks

    Dent, A. W. & Tomlinson, A., 1 Oct 2004, p. 442-446. 5 p.

    Research output: Contribution to conferencePaper

  6. Published

    Securing Grid Workflows with Trusted Computing

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 1 Jun 2008, p. 510-519. 10 p.

    Research output: Contribution to conferencePaper

  7. Published

    Security Challenges in the Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K. & Irvine, J. M., 1 Sep 2004, p. 3267 - 3270.

    Research output: Contribution to conferencePaper

  8. Published

    Security of Open Satellite TV Receivers

    Markantonakis, K., Tunstall, M. & Mayes, K., Sep 2006.

    Research output: Contribution to conferencePaper

  9. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  10. In preparation
  11. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  12. Published

    Theoretical Analysis of Security Attacks from a Swarm-like Perspective

    George, C., Goo, S. K. & Tomlinson, A., 2011.

    Research output: Contribution to conferencePaper

  13. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  14. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  15. Published
  16. Paper › Research › Peer-reviewed
  17. E-pub ahead of print

    A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks

    Semal, B., Markantonakis, K. & Akram, R. N., 10 Dec 2018, (E-pub ahead of print) p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  18. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaperpeer-review

  19. Published
  20. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  21. Published
  22. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S., 22 Apr 2018, p. 46-51. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  23. Published
  24. E-pub ahead of print

    A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Oct 2020, (E-pub ahead of print) p. 360-377. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  25. Published

    A Virtual Teams Model for Supporting Maritime Technology Management

    Berner, G., Hopcraft, R., Scanlan, J., Lutzhoft, M. & Earthy, J., 26 Sep 2018, p. 81-86. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  26. Published

    An ethics framework for research into heterogeneous systems

    Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. & Williams, R., 14 Jun 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  27. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, (E-pub ahead of print) p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review