1. Other report › Research
  2. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  3. Published
  4. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  5. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  6. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  7. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  8. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  9. Patent › Research
  10. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  11. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  12. Article › Research › Not peer-reviewed
  13. Published

    A Bit-fixing PRF with O(1) Collusion-Resistance from LWE

    Davidson, A. & Nishimaki, R., 21 Sep 2018, In: IACR Cryptology ePrint Archive. 2018, 890, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  14. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  15. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  16. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P., 14 Dec 2016, In: IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  17. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T., 1 Jun 2018, In: Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  18. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In: Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  19. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In: IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  20. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In: Computer Weekly.

    Research output: Contribution to journalArticle

  21. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  22. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  23. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S., 6 Aug 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  24. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In: Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  25. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In: Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  26. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A., Jan 2017, In: Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  27. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  28. Published

    Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., 2017, In: IACR Cryptology ePrint Archive. p. 1-19 19 p.

    Research output: Contribution to journalArticle

Previous 1...6 7 8 9 10 11 12 13 ...86 Next