1. 2022
  2. Published

    Cyber security and the Leviathan

    Da Silva, J., May 2022, In: Computers and Security. 116, 102674.

    Research output: Contribution to journalArticlepeer-review

  3. E-pub ahead of print

    Valued Authorization Policy Existence Problem: Theory and Experiments

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., 21 Apr 2022, (E-pub ahead of print) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  4. Forthcoming

    TIDE: A novel approach to constructing timed-release encryption

    Loe, A. F., Medley, L., O'Connell, C. & Quaglia, E. A., 15 Apr 2022, (Accepted/In press) ACISP 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Generalized Noise Role Mining

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Apr 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  6. Published

    New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

    Thomas-Brans, F., Heckmann, T., Markantonakis, K. & Sauveron, D., 11 Mar 2022, In: IEEE Access. 10, p. 33742 - 33757

    Research output: Contribution to journalArticlepeer-review

  7. Forthcoming

    A qualitative exploration of the role of employment in desistance and subsequent identity change; ex-prisoners’ lived experiences

    Rhoden, N., Senker, S. & Glorney, E., 8 Mar 2022, (Accepted/In press) In: The Journal of Forensic Practice.

    Research output: Contribution to journalArticlepeer-review

  8. Forthcoming

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., 1 Mar 2022, (Accepted/In press) In: IEEE Transactions on Information Theory. to appear

    Research output: Contribution to journalArticlepeer-review

  9. Published
  10. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Privacy-preserving Web single sign-on: Formal security analysis and design

    Schmitz, G., 19 Feb 2022, In: it - Information Technology.

    Research output: Contribution to journalArticlepeer-review

  12. Forthcoming

    PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

    Zhao, Q., Zuo, C., Blasco Alis, J. & Lin, Z., 7 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  13. Forthcoming

    Watch over your TV: A Security and Privacy Analysis of the Android TV ecosystem

    Tileria Palacios, M. & Blasco Alis, J., 1 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  14. Published

    Securing emergent behaviour in swarm robotics

    Chen, L. & Ng, S-L., Feb 2022, In: Journal of Information Security and Applications. 64, 103047.

    Research output: Contribution to journalArticlepeer-review

  15. Forthcoming

    Breaking Bridgefy, again: Adopting libsignal is not enough

    Albrecht, M., Eikenberg, R. & Paterson, K., 20 Jan 2022, (Accepted/In press) USENIX Security'22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Forthcoming

    Estonia: a curious and cautious approach to artificial intelligence and national security

    Robinson, N., Hardy, A. & Ertan, A., 2022, (Accepted/In press) Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Malware in Motion

    Choudhury, R., Luo, Z. & Nguyen, K., 2022, p. 595-602.

    Research output: Contribution to conferencePaperpeer-review

  18. 2021
  19. Published

    Report and Trace Ring Signatures

    Fraser, A. & Quaglia, E., 9 Dec 2021, 20th International Conference On Cryptology And Network Security: CANS 2021. Springer, [Cham], Vol. 13099. p. 179-199 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    argXtract: Deriving IoT Security Configurations via Automated Static Analysis of Stripped ARM Cortex-M Binaries

    Sivakumaran, P. & Blasco, J., 6 Dec 2021, Proceedings of the 37th Annual Computer Security Applications Conference: ACSAC 2021. Association for Computing Machinery (ACM), p. 861-876 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 1 Dec 2021, (E-pub ahead of print) p. 160-184. 25 p.

    Research output: Contribution to conferencePaperpeer-review

  22. Forthcoming

    Drawing Out the Everyday Hyper-[In]Securities of Digital Identity

    Heath, C. P. R. & Coles-Kemp, L., 16 Nov 2021, (Accepted/In press) Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection

    Andresini, G., Pendlebury, F., Pierazzi, F., Loglisci, C., Appice, A. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 111-122 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Investigating Labelless Drift Adaptation for Malware Detection

    Kan, Z., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 15 Nov 2021, AISec '21: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security. ACM, p. 123-134 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    Hashimoto, K., Katsumata, S., Postlethwaite, E., Prest, T. & Westerbaan, B., 13 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1441-1462 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Bridging the discipline gap: towards improving heritage and computer graphics research collaboration

    Happa, J., Bennett, T., Gogioso, S., Voiculescu, I., Howell, D., Crawford, S., Ulmschneider, K. & Ramsey, C., 6 Nov 2021.

    Research output: Contribution to conferencePaperpeer-review

  28. Forthcoming

    Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

    Barbero, F., Pendlebury, F., Pierazzi, F. & Cavallaro, L., 6 Nov 2021, (Accepted/In press) IEEE Symposium on Security and Privacy (IEEE S&P).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    The Philosophy of Bitcoin and The Question of Money

    Butler, S., 5 Nov 2021, (E-pub ahead of print) In: Theory, Culture and Society.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 4 Nov 2021, In: Journal of Computer Security. p. 1-57 57 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 29 Oct 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  32. Published

    Pragmatic authenticated key agreement for IEEE Std 802.15.6

    Khan, H., Dowling, B. & Martin, K. M., 27 Oct 2021, In: International Journal of Information Security.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 22 Oct 2021, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Zhao, L., Kumar, N., Hsu, R. C. & Zou, Z. (eds.). Los Alamitos: IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Collaborative Verifiable Delay Functions

    Medley, L. & Quaglia, E., 18 Oct 2021, (E-pub ahead of print) Inscrypt 2021: 17th International Conference on Information Security and Cryptology . p. 507-530 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 15 Oct 2021, In: Digital Threats: Research and Practice. p. 1-26 26 p., 29.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    What Influences People’s View of Cyber Security Culture in Higher Education Institutions? An Empirical Study

    Mersinas, K., Durojaiye, T. & Watling, D., 3 Oct 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems CYBER 2021. p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Detecting video-game injectors exchanged in game cheating communities

    Karkallis, P., Blasco Alis, J., Suarez de Tangil Rotaeche, G. & Pastrana, S., Oct 2021, 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4–8, 2021, Proceedings, Part I. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Unpublished

    Eligibility Veriability in Untrustworthy Voting Environments

    Augoye, V., 26 Sep 2021, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  39. E-pub ahead of print

    Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Shepherd, C., Markantonakis, K., Van Heijningen, N., Aboulkassimi, D., Gaine, C., Heckmann, T. & Naccache, D., 17 Sep 2021, (E-pub ahead of print) In: Computers and Security. 102471.

    Research output: Contribution to journalArticlepeer-review

  40. Forthcoming

    Towards Improving Code Stylometry Analysis in Underground Forums

    Tereszkowski-Kaminski, M., Pastrana, S., Blasco Alis, J. & Suarez-Tangil, G., 16 Sep 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022). p. 126-147 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 1 Sep 2021, In: Media, War & Conflict. 14, 3, p. 263-267 5 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    DY: A modular symbolic verification framework for executable cryptographic protocol code

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., Sep 2021, Proceedings - 2021 IEEE European Symposium on Security and Privacy, Euro S and P 2021. Institute of Electrical and Electronics Engineers Inc., p. 523-542 20 p. (Proceedings - 2021 IEEE European Symposium on Security and Privacy, EuroS&P 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer, p. 252-272 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 19 Aug 2021, In: ACM Transactions on Privacy and Security. 24, 3, p. 1-22 22 p., 21.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Ransomclave: Ransomware Key Management using SGX

    Bhudia, A., O'Keeffe, D., Sgandurra, D. & Hurley-Smith, D., 17 Aug 2021, 10th International Workshop on Cyber Crime (IWCC 2021): In proceedings of the International Conference on Availability, Reliability and Security (ARES 2021). p. 1-10 10 p. 58

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. E-pub ahead of print

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Albrecht, M., Bai, S., Li, J. & Rowell, J., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 732-759 28 p. (https://eprint.iacr.org/2020/1260.pdf)(Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    Subtractive Sets over Cyclotomic Rings: Limits of Schnorr-like Arguments over Lattices

    Albrecht, M. & Lai, R., 11 Aug 2021, (E-pub ahead of print) CRYPTO 2021. Springer, p. 519-548 30 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., Aug 2021, Proceedings of the 30th USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 30 Jul 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  51. E-pub ahead of print

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 21 Jul 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  52. Published

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 21 Jul 2021, Selected Areas in Cryptography (SAC) 2020. Springer, [Cham], Vol. 12804. p. 670-697 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...44 Next