1. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticle

  2. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 19 May 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published
  5. Published

    A model to facilitate discussions about cyber attacks

    Happa, J. & Fairclough, G., 2017, Ethics and policies for cyber operations. Springer, p. 169-185 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    A Multi-criteria-Based Evaluation of Android Applications

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 2012, Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Mitchell, C. J. & Tomlinson, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 67-82 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016. Springer-Verlag, p. 173-184 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, In : E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on. 0, p. 20 1 p.

    Research output: Contribution to journalArticle

  9. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, p. 429-447. 19 p.

    Research output: Contribution to conferencePaper

Previous 1...5 6 7 8 9 10 11 12 ...205 Next