1. Other contribution › Research
  2. Published

    Formal Specification and Verification of Software

    Walter, C. D. & Eldridge, S. E., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 331-338 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  3. Published

    Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework)

    Markantonakis, K., 1999, Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 ed. Elsevier, Vol. 4. p. 69 77 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  4. Published

    Leakage from Montgomery Multiplication

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 431-449 19 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  5. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2011, Encyclopedia of Cryptography and Security (2nd Ed.). Tilborg, H. C. A. V. & Jajodia, S. (eds.). Springer, p. 795-798 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  6. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  7. Published

    Montgomery Arithmetic

    Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  8. Published

    Partitional Clustering of Malware Using K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2014, Cyberpatterns, Unifying Design Patterns with Security and Attack Patterns. p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  9. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M., May 2017, (Unpublished) Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  10. Published

    Randomised Exponentiation Algorithms

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 451-473 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  11. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  12. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  13. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  15. Paper › Research › Not peer-reviewed
  16. Published

    An Overview of the Formal Verification on the Digital Marketplace Cryptographic Protocols

    Goo, S. K., Irvine, J. & Tomlinson, A., 1 Jun 2006.

    Research output: Contribution to conferencePaper

  17. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  18. Published

    Conditional Access in Mobile Systems: Securing the Application

    Gallery, E. & Tomlinson, A., 1 Feb 2005, p. 190-197. 8 p.

    Research output: Contribution to conferencePaper

  19. Published
  20. Published

    Designing and Verifying Secure Protocols of the Digital Marketplace

    Goo, S. K., Irvine, J. M., Tomlinson, A. & Schwiderski-Grosche, S., 2005.

    Research output: Contribution to conferencePaper

  21. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A. (ed.), D., S. (ed.), S., C. (ed.), D., G. (ed.) & Markantonakis, K. (ed.), 2008.

    Research output: Contribution to conferencePaper

  22. Published

    Instant Knowledge: a Secure Mobile Context-Aware Distributed Recommender System

    Helmhout, M., Saunders, C., Tomlinson, A., MacDonald, J. A., Irvine, J. M. & McDiarmid, A., 1 Jun 2009.

    Research output: Contribution to conferencePaper

  23. Published

    Is security a lost cause?

    Mitchell, C. J., May 2010. 8 p.

    Research output: Contribution to conferencePaper

  24. Published

    Misuse cases for an Instant Knowledge system

    Yau, P-W. & Tomlinson, A., 2010.

    Research output: Contribution to conferencePaper

  25. Published

    Mutual Authentication of B3G devices within Personal Distributed Environments

    Billington, K. L. & Tomlinson, A., 1 Oct 2004, p. 452-456. 5 p.

    Research output: Contribution to conferencePaper

  26. Published

    Preserving Privacy in Assistive Technologies

    Goo, S. K., Irvine, J. M., Andonovic, I. & Tomlinson, A., 1 Jun 2009, p. 110 - 115.

    Research output: Contribution to conferencePaper

  27. Published

    Protection of Downloadable Software on SDR Devices

    Gallery, E. & Tomlinson, A., 1 Nov 2005.

    Research output: Contribution to conferencePaper

  28. Published

    Regional Blackouts: Protection of Broadcast Content on 3G Networks

    Dent, A. W. & Tomlinson, A., 1 Oct 2004, p. 442-446. 5 p.

    Research output: Contribution to conferencePaper

  29. Published

    Securing Grid Workflows with Trusted Computing

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 1 Jun 2008, p. 510-519. 10 p.

    Research output: Contribution to conferencePaper

  30. Published

    Security Challenges in the Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K. & Irvine, J. M., 1 Sep 2004, p. 3267 - 3270.

    Research output: Contribution to conferencePaper

  31. Published

    Security of Open Satellite TV Receivers

    Markantonakis, K., Tunstall, M. & Mayes, K., Sep 2006.

    Research output: Contribution to conferencePaper

  32. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  33. In preparation
  34. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  35. Published

    Theoretical Analysis of Security Attacks from a Swarm-like Perspective

    George, C., Goo, S. K. & Tomlinson, A., 2011.

    Research output: Contribution to conferencePaper

  36. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  37. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  38. Published
  39. Paper › Research › Peer-reviewed
  40. E-pub ahead of print
  41. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, p. 189-205. 17 p.

    Research output: Contribution to conferencePaper

  42. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaper

  43. Published
  44. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, p. 429-447. 19 p.

    Research output: Contribution to conferencePaper

  45. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaper

  46. Published
  47. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S., 22 Apr 2018, p. 46-51. 6 p.

    Research output: Contribution to conferencePaper

  48. Published
  49. E-pub ahead of print
  50. Published

    A Virtual Teams Model for Supporting Maritime Technology Management

    Berner, G., Hopcraft, R., Scanlan, J., Lutzhoft, M. & Earthy, J., 26 Sep 2018, p. 81-86. 6 p.

    Research output: Contribution to conferencePaper

  51. Published

    An ethics framework for research into heterogeneous systems

    Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. & Williams, R., 14 Jun 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  52. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  53. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, p. 496-511. 16 p.

    Research output: Contribution to conferencePaper