1. 2020
  2. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  4. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  5. 2019
  6. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, In : Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticle

  10. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 11 Nov 2019, Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, p. 35-44 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    1st Workshop on Cyber-Security Arms Race (CYSARM 2019)

    Giannetsos, T. & Sgandurra, D., 6 Nov 2019, p. 2711-2712. 2 p.

    Research output: Contribution to conferenceOther

  15. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 Nov 2019, In : IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  17. Published

    Functional repair codes: a view from projective geometry

    Ng, S. & Paterson, M., Nov 2019, In : Designs, Codes and Cryptography. 87, 11, p. 2701-2722 22 p.

    Research output: Contribution to journalArticle

  18. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In : Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticle

  19. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, In : IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticle

  20. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In : Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticle

  23. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticle

  24. Published

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 16 Sep 2019, 2019 IEEE Symposium on Security and Privacy (SP). IEEE Press, p. 1067-1083 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    Evacuated to Death: The Lexicon, Concept, and Practice of Mobility in the Nazi Deportation and Killing Machine

    Adey, P., 29 Aug 2019, In : Annals of the Association of American Geographers. 110, 3, p. 808-826 19 p.

    Research output: Contribution to journalArticle

  27. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  28. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaper

  32. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  33. Published

    State Estimation under Undetectable Single and Double Line Failures: Anonymised for review

    Gul, A. & Wolthusen, S. D., 8 Aug 2019, 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT). IEEE, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Time Accuracy De-Synchronisation Attacks Against IEC 60870-5-104 and IEC 61850 Protocols

    Wright, J. & Wolthusen, S. D., 8 Aug 2019, p. 1-5. 5 p.

    Research output: Contribution to conferencePaper

  35. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  36. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, p. 3-31. 29 p.

    Research output: Contribution to conferencePaper

  37. Published
  38. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In : IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticle

  40. Published
  41. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  43. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings. Springer, p. 429-447 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published
  45. Published
  46. Published

    Cyber Security for Small Businesses: A Review Of the Advice

    Agha, D., Rowell, J. & Choudhury, R., 13 Jun 2019.

    Research output: Contribution to conferencePoster

  47. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  50. E-pub ahead of print

    E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  51. Published

    Commoning mobility: Towards a new politics of mobility transitions

    Nikolaeva, A., Adey, P., Cresswell, T., Jeonjae Lee, J., Novoa, A. & Temenos, C., Jun 2019, In : Transactions of the Institute of British Geographers. 44, 2, p. 346-360 15 p.

    Research output: Contribution to journalArticle

  52. Published

    Hearing attacks in network data: An effectiveness study

    Axon, L., Happa, J., Goldsmith, M. & Creese, S., Jun 2019, In : Computers and Security. 83, p. 367-388 22 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...42 Next