1. 2021
  2. Forthcoming

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., 11 May 2021, (Accepted/In press) ISSAC 2021.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    On the Success Probability of Solving Unique SVP via BKZ

    Postlethwaite, E. & Virdia, F., 1 May 2021, Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key CryptographyVirtual Event, May 10–13, 2021 Proceedings, Part I. Springer, p. 68-98 31 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  4. Forthcoming

    "Computer Says No": Exploring social justice in digital services

    Crivellaro, C., Coles-Kemp, L. & Wood, K., 26 Apr 2021, (Accepted/In press) Hope Under Neoliberal Austerity: Responses from Civil Society and Civic Universities. Steer, M., Davoudi, S., Shucksmith, M. & Todd, L. (eds.). Policy Press, p. 89-104 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Oblique: Accelerating Page Loads Using Symbolic Execution

    Ko, R., Mickens, J., Loring, B. & Netravali, R., Apr 2021, NSDI 2021. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 17 p.

    Research output: Contribution to journalArticlepeer-review

  8. E-pub ahead of print

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Higgins, M., Mayes, K. & Teng, F., 10 Mar 2021, In: IET Cyber-Physical Systems: Theory & Applications. 6, 1, p. 12-26 15 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  11. Forthcoming

    LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

    Shepherd, C., Markantonakis, K. & Jaloyan, G-A., 26 Feb 2021, (Accepted/In press) IEEE Workshop on the Internet of Safe Things: IEEE Security and Privacy Workshops (in conjunction with IEEE Security & Privacy '21). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...210 Next