1. 2020
  2. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  5. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 1 Apr 2020, In: Environment and Planning D: Society and Space. 38, 2, p. 364-382 19 p.

    Research output: Contribution to journalArticlepeer-review

  7. E-pub ahead of print

    Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange

    Dowling, B., Hansen, T. B. & Paterson, K. G., 10 Apr 2020, Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Proceedings. Ding, J. & Tillich, J-P. (eds.). Springer, p. 483-502 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12100 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On the unbearable lightness of FIPS 140-2 randomness tests

    Hurley-Smith, D., Patsakis, C. & Hernandez-Castro, J., 17 Apr 2020, In: IEEE Transactions on Information Forensics and Security . p. 1-13 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    2FA: Police Digital Security Centre

    Agha, D., May 2020

    Research output: Other contribution

  11. Published
  12. E-pub ahead of print

    (One) Failure Is Not an Option: Bootstrapping the Search for Failures in Lattice-Based Encryption Schemes

    D'Anvers, J-P., Rossi, M. & Virdia, F., 1 May 2020, Advances in Cryptology – EUROCRYPT 2020. Springer, p. 3-33 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Who needs trust for 5G?

    Mitchell, C. J., 2 May 2020, arXiv.

    Research output: Working paper

  15. E-pub ahead of print

    Digital welfare: designing for more nuanced forms of access

    Coles-Kemp, L., Ashenden, D., Morris, A. & Yuille, J., 7 May 2020, In: Policy Design and Practice. p. 1-12 12 p.

    Research output: Contribution to journalBook/Film/Article reviewpeer-review

  16. Published
  17. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Legislation-Driven Development of a Gift Aid system using Event-B

    Williams, D. M., Darwish, S., Schneider, S. & Michael, D. R., 25 May 2020, In: Formal Aspects of Computing. 32, 2, p. 251-273 23 p.

    Research output: Contribution to journalArticlepeer-review

  19. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In: ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In: Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Weitkämper, C., 5 Jul 2020, p. 195-213. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  25. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In: Computer Weekly.

    Research output: Contribution to journalArticle

  26. Published

    Key assignment schemes with authenticated encryption, revisited

    Pijnenburg, J. & Poettering, B., 24 Jul 2020, In: IACR Transactions on Symmetric Cryptology. 2020, 2, p. 40-67 28 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    (De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking

    Moeckel, C., 28 Jul 2020, In: Journal of Universal Computer Science. 26, 7, p. 783-804 22 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Intriguing Properties of Adversarial ML Attacks in the Problem Space

    Pierazzi, F., Pendlebury, F., Cortellazzi, J. & Cavallaro, L., 30 Jul 2020, IEEE Symposium on Security and Privacy (IEEE S&P). IEEE, p. 1332-1349 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future

    Khan, H. & Martin, K. M., Aug 2020, In: Journal of Information Security and Applications. 53, p. 1-17 17 p., 102537.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Attacker-centric thinking in security: perspectives from financial services practitioners

    Moeckel, C., Aug 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  31. Published

    Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

    Markiewicz, R. & Sgandurra, D., Aug 2020, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  32. Published

    Pancake: Frequency Smoothing for Encrypted Data Stores

    Grubbs, P., Khandelwal, A., Lacharite, M-S., Brown, L., Li, L., Agarwal, R. & Ristenpart, T., Aug 2020, 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, p. 2451-2468 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k)

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 10 Aug 2020, CRYPTO 2020. Springer, p. 186-212 27 p. (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. E-pub ahead of print

    Slide reduction, revisited—filling the gaps in svp approximation

    Aggarwal, D., Li, J., Nguyen, P. Q. & Stephens-Davidowitz, N., 10 Aug 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 274-295 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Forthcoming

    Malware vs Anti-Malware Battle - Gotta Evade 'em All!

    Chaffey, E. J. & Sgandurra, D., 29 Aug 2020, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  37. Forthcoming

    Oblique: Accelerating Page Loads Using Symbolic Execution

    Loring, B., Ko, R., Mickens, J. & Netravali, R., 1 Sep 2020, (Accepted/In press) NSDI 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor

    Mayes, K., 10 Sep 2020, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  40. Published

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. E-pub ahead of print

    Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

    Costache, A., Laine, K. & Player, R., 13 Sep 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Springer, p. 546-565 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. E-pub ahead of print

    Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Sep 2020, p. 3-16. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  43. Forthcoming

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 18 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  44. Published
  45. Forthcoming

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 30 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  46. Published

    2nd Workshop on Cyber-Security Arms Race (CYSARM 2020)

    Giannetsos, T. & Sgandurra, D., Oct 2020, p. 2147-2148. 2 p.

    Research output: Contribution to conferenceAbstractpeer-review

  47. Published

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, Oct 2020, Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020. p. 195-210 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., Oct 2020, p. 471-480. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  50. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020, SAC 2020 proceedings. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

    Gómez-Cabrera, A., Escamilla-Ambrosio, P. J., Rodríguez-Mota, A. & Happa, J., 12 Oct 2020, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  52. E-pub ahead of print

    A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Oct 2020, p. 360-377. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  53. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Forthcoming

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 25 Oct 2020, (Accepted/In press) Proceedings of International Conference on Security & Privacy 2020 (ICSP 2020): Jamshedpur, India. Springer-Verlag, (LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review

  56. E-pub ahead of print

    Secure Shared Processing on a Cluster of Trust-Anchors

    Mayes, K., 31 Oct 2020, p. 968-984. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  57. Published

    Efficiency Improvements for Encrypt-to-Self

    Pijnenburg, J. & Poettering, B., Nov 2020, CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race. Association for Computing Machinery, Inc, p. 13-23 11 p. (CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Butler-Rees, A. & Robinson, N., Nov 2020, In: Emotion, Space and Society. 37, 7 p., 100743.

    Research output: Contribution to journalArticlepeer-review

  59. E-pub ahead of print

    Fragmented digital connectivity and security at sea

    Jensen, R. B., 12 Nov 2020, In: Marine Policy. 7 p., 104289.

    Research output: Contribution to journalArticlepeer-review

  60. E-pub ahead of print

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 17 Nov 2020, In: Journal of Mathematical Cryptology. 15, 1, p. 45-59 15 p.

    Research output: Contribution to journalArticlepeer-review

  61. E-pub ahead of print

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 20 Nov 2020, Provable and Practical Security: 14th International Conference, ProvSec 2020, Singapore, November 29 – December 1, 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer, p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. E-pub ahead of print

    The Vacuity of the Open Source Security Testing Methodology Manual

    Albrecht, M. & Jensen, R. B., 24 Nov 2020, Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings. van der Merwe, T., Mitchell, C. & Mehrnezhad, M. (eds.). Springer, p. 114-147 34 p. (Lecture Notes in Computer Science; vol. 12529).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. E-pub ahead of print

    Integerwise Functional Bootstrapping on TFHE

    Okada, H., Kiyomoto, S. & Cid, C., 25 Nov 2020, Information Security - 23rd International Conference, ISC 2020, Proceedings. Susilo, W., Deng, R. H., Guo, F., Li, Y. & Intan, R. (eds.). Springer Science and Business Media Deutschland GmbH, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12472 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  65. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. E-pub ahead of print

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 5 Dec 2020, ASIACRYPT 2020. Springer, p. 583-613 31 p. (Lecture Notes in Computer Science; vol. 12492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Quantum cryptanalysis on contracting feistel structures and observation on related-key settings

    Cid, C., Hosoyamada, A., Liu, Y. & Sim, S. M., 8 Dec 2020, Progress in Cryptology – INDOCRYPT 2020 - 21st International Conference on Cryptology in India 2020, Proceedings. Bhargavan, K., Oswald, E. & Prabhakaran, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 373-394 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12578 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Improved privacy-preserving training using fixed-Hessian minimisation

    Ogilvie, T., Player, R. & Rowell, J., 15 Dec 2020, Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography: WAHC 2020. p. 6-18 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Inclusive security: Digital security meets web science

    Coles-Kemp, L., 23 Dec 2020, In: Foundations and Trends in Web Science. 7, 2, p. 88-241 154 p.

    Research output: Contribution to journalReview articlepeer-review

  70. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  72. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. 2021
  74. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  76. Submitted

    Lattice Reduction with Approximate Enumeration Oracles: Practical Algorithms and Concrete Performance

    Albrecht, M., Bai, S., Li, J. & Rowell, J., 9 Jan 2021, (Submitted) In: https://eprint.iacr.org/2020/1260.pdf.

    Research output: Contribution to journalArticlepeer-review

  77. E-pub ahead of print

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., 9 Jan 2021, In: The previous version is at https://eprint.iacr.org/2016/847.pdf.

    Research output: Contribution to journalArticlepeer-review

  78. Published
  79. Published

    P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time

    Kalbantner, J., Markantonakis, K., Hurley-Smith, D., Akram, R. N. & Semal, B., 25 Jan 2021, In: Energies. 14, 3, p. 1-25 25 p., 606.

    Research output: Contribution to journalArticlepeer-review

  80. Forthcoming

    On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem

    Albrecht, M. & Heninger, N., 1 Feb 2021, (Accepted/In press) EUROCRYPT 2021. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Forthcoming

    Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 5 Feb 2021, (Accepted/In press) PKC 2021. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

    Da Silva, J., 9 Feb 2021, In: Methodological Innovations.

    Research output: Contribution to journalArticlepeer-review

  83. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  84. Forthcoming

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 13 Feb 2021, (Accepted/In press) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Mesh Messaging in Large-scale Protests: Breaking Bridgefy

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., 18 Feb 2021, CT-RSA 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Forthcoming

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., 26 Feb 2021, (Accepted/In press) IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  88. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  89. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 17 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...17 18 19 20 21 Next