1. 2022
  2. Published

    Cyber security and the Leviathan

    Da Silva, J., May 2022, In: Computers and Security. 116, 102674.

    Research output: Contribution to journalArticlepeer-review

  3. E-pub ahead of print

    Valued Authorization Policy Existence Problem: Theory and Experiments

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., 21 Apr 2022, (E-pub ahead of print) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  4. Forthcoming

    TIDE: A novel approach to constructing timed-release encryption

    Loe, A. F., Medley, L., O'Connell, C. & Quaglia, E. A., 15 Apr 2022, (Accepted/In press) ACISP 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Generalized Noise Role Mining

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Apr 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  6. Published

    New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

    Thomas-Brans, F., Heckmann, T., Markantonakis, K. & Sauveron, D., 11 Mar 2022, In: IEEE Access. 10, p. 33742 - 33757

    Research output: Contribution to journalArticlepeer-review

  7. Forthcoming

    A qualitative exploration of the role of employment in desistance and subsequent identity change; ex-prisoners’ lived experiences

    Rhoden, N., Senker, S. & Glorney, E., 8 Mar 2022, (Accepted/In press) In: The Journal of Forensic Practice.

    Research output: Contribution to journalArticlepeer-review

  8. Forthcoming

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., 1 Mar 2022, (Accepted/In press) In: IEEE Transactions on Information Theory. to appear

    Research output: Contribution to journalArticlepeer-review

  9. Published
  10. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Privacy-preserving Web single sign-on: Formal security analysis and design

    Schmitz, G., 19 Feb 2022, In: it - Information Technology.

    Research output: Contribution to journalArticlepeer-review

  12. Forthcoming

    PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

    Zhao, Q., Zuo, C., Blasco Alis, J. & Lin, Z., 7 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  13. Forthcoming

    Watch over your TV: A Security and Privacy Analysis of the Android TV ecosystem

    Tileria Palacios, M. & Blasco Alis, J., 1 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  14. Published

    Securing emergent behaviour in swarm robotics

    Chen, L. & Ng, S-L., Feb 2022, In: Journal of Information Security and Applications. 64, 103047.

    Research output: Contribution to journalArticlepeer-review

  15. Forthcoming

    Breaking Bridgefy, again: Adopting libsignal is not enough

    Albrecht, M., Eikenberg, R. & Paterson, K., 20 Jan 2022, (Accepted/In press) USENIX Security'22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Estonia: a curious and cautious approach to artificial intelligence and national security

    Robinson, N., Hardy, A. & Ertan, A., 2022, (Accepted/In press) Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Malware in Motion

    Choudhury, R., Luo, Z. & Nguyen, K., 2022, p. 595-602.

    Research output: Contribution to conferencePaperpeer-review

  18. 2021
  19. Published

    Report and Trace Ring Signatures

    Fraser, A. & Quaglia, E., 9 Dec 2021, 20th International Conference On Cryptology And Network Security: CANS 2021. Springer, [Cham], Vol. 13099. p. 179-199 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 6 Dec 2021, Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM), p. 861-876 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 1 Dec 2021, (E-pub ahead of print) p. 160-184. 25 p.

    Research output: Contribution to conferencePaperpeer-review

  22. Forthcoming

    Drawing Out the Everyday Hyper-[In]Securities of Digital Identity

    Heath, C. P. R. & Coles-Kemp, L., 16 Nov 2021, (Accepted/In press) Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection

    Andresini, G., Pendlebury, F., Pierazzi, F., Loglisci, C., Appice, A. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 111-122 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Investigating Labelless Drift Adaptation for Malware Detection

    Kan, Z., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 123-134 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    Hashimoto, K., Katsumata, S., Postlethwaite, E., Prest, T. & Westerbaan, B., 13 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1441-1462 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Bridging the discipline gap: towards improving heritage and computer graphics research collaboration

    Happa, J., Bennett, T., Gogioso, S., Voiculescu, I., Howell, D., Crawford, S., Ulmschneider, K. & Ramsey, C., 6 Nov 2021.

    Research output: Contribution to conferencePaperpeer-review

  28. Forthcoming

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 6 Nov 2021, (Accepted/In press) IEEE Symposium on Security and Privacy (IEEE S&P).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    The Philosophy of Bitcoin and The Question of Money

    Butler, S., 5 Nov 2021, (E-pub ahead of print) In: Theory, Culture and Society.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 4 Nov 2021, In: Journal of Computer Security. p. 1-57 57 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 29 Oct 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  32. Published

    Pragmatic authenticated key agreement for IEEE Std 802.15.6

    Khan, H., Dowling, B. & Martin, K. M., 27 Oct 2021, In: International Journal of Information Security.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 22 Oct 2021, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Zhao, L., Kumar, N., Hsu, R. C. & Zou, Z. (eds.). Los Alamitos: IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Collaborative Verifiable Delay Functions

    Medley, L. & Quaglia, E., 18 Oct 2021, (E-pub ahead of print) Inscrypt 2021: 17th International Conference on Information Security and Cryptology . p. 507-530 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 15 Oct 2021, In: Digital Threats: Research and Practice. p. 1-26 26 p., 29.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    What Influences People’s View of Cyber Security Culture in Higher Education Institutions? An Empirical Study

    Mersinas, K., Durojaiye, T. & Watling, D., 3 Oct 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems CYBER 2021. p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Detecting video-game injectors exchanged in game cheating communities

    Karkallis, P., Blasco Alis, J., Suarez de Tangil Rotaeche, G. & Pastrana, S., Oct 2021, 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Unpublished

    Eligibility Veriability in Untrustworthy Voting Environments

    Augoye, V., 26 Sep 2021, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  39. E-pub ahead of print

    Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Shepherd, C., Markantonakis, K., Van Heijningen, N., Aboulkassimi, D., Gaine, C., Heckmann, T. & Naccache, D., 17 Sep 2021, (E-pub ahead of print) In: Computers and Security. 102471.

    Research output: Contribution to journalArticlepeer-review

  40. Forthcoming

    Towards Improving Code Stylometry Analysis in Underground Forums

    Tereszkowski-Kaminski, M., Pastrana, S., Blasco Alis, J. & Suarez-Tangil, G., 16 Sep 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022). p. 126-147 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 1 Sep 2021, In: Media, War & Conflict. 14, 3, p. 263-267 5 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    DY: A modular symbolic verification framework for executable cryptographic protocol code

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., Sep 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers Inc., p. 523-542 20 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, EuroS&P 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer, p. 252-272 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 19 Aug 2021, In: ACM Transactions on Privacy and Security. 24, 3, p. 1-22 22 p., 21.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. E-pub ahead of print

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Albrecht, M., Bai, S., Li, J. & Rowell, J., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 732-759 28 p. (https://eprint.iacr.org/2020/1260.pdf)(Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 519-548 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., Aug 2021, Proceedings of the 30th USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 30 Jul 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  51. E-pub ahead of print

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 21 Jul 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  52. Published

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 21 Jul 2021, Selected Areas in Cryptography (SAC) 2020. Springer, [Cham], Vol. 12804. p. 670-697 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Forthcoming

    Dos and Don'ts of Machine Learning in Computer Security

    Arp, D., Quiring, E., Pendlebury, F., Warnecke, A., Pierazzi, F., Wressnegger, C., Cavallaro, L. & Rieck, K., 16 Jul 2021, (Accepted/In press) 31st USENIX Security Symposium (USENIX Sec). 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Forthcoming

    Four Attacks and a Proof for Telegram

    Albrecht, M., Marekova, L., Paterson, K. & Stepanovs, I., 3 Jul 2021, (Accepted/In press) IEEE S&P 2022. Vol. 1. p. 223-242 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., Jul 2021, ISSAC 2021. ACM, p. 289-296 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. E-pub ahead of print

    Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums

    Butler, S., 22 Jun 2021, (E-pub ahead of print) Socio-Technical Aspects in Security and Trust: 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers. Springer, p. 135-153 19 p. (Lecture Notes in Computer Science; vol. 12812).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  58. E-pub ahead of print

    On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

    Albrecht, M. & Heninger, N., 16 Jun 2021, (E-pub ahead of print) EUROCRYPT 2021. Springer, (Lecture Notes in Computer Science; vol. 12696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. E-pub ahead of print

    One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols

    Kutas, P., Merz, S-P., Petit, C. & Weitkämper, C., 16 Jun 2021, (E-pub ahead of print) p. 242-271. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  60. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

  61. E-pub ahead of print

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 11 May 2021, (E-pub ahead of print) CT-RSA 2021. Springer, p. 375-398 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    On the Success Probability of Solving Unique SVP via BKZ

    Postlethwaite, E. & Virdia, F., 1 May 2021, Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key CryptographyVirtual Event, May 10–13, 2021 Proceedings, Part I. Springer, p. 68-98 31 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  63. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 May 2021, (E-pub ahead of print) PKC 2021. Springer, p. 261-289 29 p. (Lecture Notes in Computer Science; vol. 12711).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., May 2021, IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE, Vol. 1. p. 221-227 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Forthcoming

    "Computer Says No": Exploring social justice in digital services

    Crivellaro, C., Coles-Kemp, L. & Wood, K., 26 Apr 2021, (Accepted/In press) Hope Under Neoliberal Austerity: Responses from Civil Society and Civic Universities. Steer, M., Davoudi, S., Shucksmith, M. & Todd, L. (eds.). Policy Press, p. 89-104 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  66. Forthcoming

    A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

    Vagal, V., Markantonakis, K. & Shepherd, C., 14 Apr 2021, (Accepted/In press) 40th IEEE Digital Avionics Systems Conference (DASC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Oblique: Accelerating Page Loads Using Symbolic Execution

    Ko, R., Mickens, J., Loring, B. & Netravali, R., Apr 2021, NSDI 2021. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 15, 3, p. 223-230 8 p.

    Research output: Contribution to journalArticlepeer-review

  70. Unpublished

    Practical Dynamic Symbolic Execution for JavaScript

    Loring, B., 16 Mar 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  71. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, (E-pub ahead of print) In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  72. Submitted

    Improving Convergence and Practicality of Slide-type Reductions

    Li, J. & Walter, M., 9 Mar 2021, (Submitted) In: Submitted.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  74. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  75. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, (E-pub ahead of print) In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  76. E-pub ahead of print

    Malware vs Anti-Malware Battle - Gotta Evade 'em All!

    Chaffey, E. J. & Sgandurra, D., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  77. E-pub ahead of print

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  78. Published

    Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

    Da Silva, J., Feb 2021, In: Methodological Innovations.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time

    Kalbantner, J., Markantonakis, K., Hurley-Smith, D., Akram, R. N. & Semal, B., 25 Jan 2021, In: Energies. 14, 3, p. 1-25 25 p., 606.

    Research output: Contribution to journalArticlepeer-review

  80. Published
  81. Unpublished

    Automating interpretations of trustworthiness

    Sel, M., 2021, (Unpublished) Royal Holloway, University of London. 507 p.

    Research output: ThesisDoctoral Thesis

  82. Published

    Estonia: From the Bronze Night to Cybersecurity Pioneers

    Hardy, A. & Robinson, N., 2021, The Routledge Companion to Global Cyber Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Unpublished
  84. Unpublished

    Machine Learning for Security in Hostile Environments

    Pendlebury, F., 2021, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  85. Published
  86. Unpublished

    Post-Quantum Cryptography: Cryptanalysis and Implementation

    Virdia, F., 2021, (Unpublished) 256 p.

    Research output: ThesisDoctoral Thesis

  87. Unpublished

    Security and Privacy in Bluetooth Low Energy

    Sivakumaran, P., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  88. Unpublished

    Topics in Lattice Sieving

    Postlethwaite, E., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  89. 2020
  90. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, (E-pub ahead of print) p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  92. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Inclusive security: Digital security meets web science

    Coles-Kemp, L., 23 Dec 2020, In: Foundations and Trends in Web Science. 7, 2, p. 88-241 154 p.

    Research output: Contribution to journalReview articlepeer-review

  94. Published

    Improved privacy-preserving training using fixed-Hessian minimisation

    Ogilvie, T., Player, R. & Rowell, J., 15 Dec 2020, Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography: WAHC 2020. p. 6-18 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Mutual Authentication in Electronic Voting Schemes

    Augoye, V. & Tomlinson, A., 14 Dec 2020, p. 1-2. 2 p.

    Research output: Contribution to conferencePaperpeer-review

  96. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, (E-pub ahead of print) Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. E-pub ahead of print

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 5 Dec 2020, (E-pub ahead of print) ASIACRYPT 2020. Springer, p. 583-613 31 p. (Lecture Notes in Computer Science; vol. 12492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  100. E-pub ahead of print

    Integerwise Functional Bootstrapping on TFHE

    Okada, H., Kiyomoto, S. & Cid, C., 25 Nov 2020, (E-pub ahead of print) Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, (E-pub ahead of print) Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, (E-pub ahead of print) Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. E-pub ahead of print

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 17 Nov 2020, (E-pub ahead of print) In: Journal of Mathematical Cryptology. 15, 1, p. 45-59 15 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...22 Next