1. 2008
  2. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2008, ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Flexible and Secure Communications in an Identity-Based, Coalition Environment.

    Boklan, K. D., Klagsbrun, Z., Paterson, K. G. & Srinivasan., S., 2008, IEEE Milcom, 2008..

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2008, SCN. Ostrovsky, R., Prisco, R. D. & Visconti, I. (eds.). Springer, Vol. 5229. p. 340-357 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A. (ed.), D., S. (ed.), S., C. (ed.), D., G. (ed.) & Markantonakis, K. (ed.), 2008.

    Research output: Contribution to conferencePaper

  12. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K., 2008.

    Research output: Contribution to conferenceOther

  13. Published

    Introduction to the TPM

    Tomlinson, A., 2008, Smart Cards, Tokens, Security and Applications. Springer, p. 155-172 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Key refreshing in wireless sensor networks

    Blackburn, S. R., Martin, K. M., Paterson, M. B. & Stinson, D. R., 2008, Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008: Proceedings . Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 156-170 15 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Leakage from Montgomery Multiplication

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 431-449 19 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  16. Published

    LISABETH: Automated Content-based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2008, International Workshop on Software Engineering for Secure Systems (SESS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Longer Randomly Blinded RSA Keys may be Weaker than Shorter Ones

    Walter, C. D., 2008, WISA 2007. Kim, S., Yung, M. & Lee, H-W. (eds.). Springer, Vol. 4867. p. 303-316 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Managing Critical Infrastructures through Virtual Network Communities

    Baiardi, F., Sala, G. & Sgandurra, D., 2008, Critical Information Infrastructures Security: Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers. Lopez, J. & Hämmerli, B. M. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published
  20. Published

    Network as a computer: ranking paths to find flows

    Pavlovic, D., 2008, Proceedings of CSR 2008. Razborov, A. & Slissenko, A. (eds.). Springer-Verlag, Vol. 5010. p. 384-397 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On a possible privacy flaw in Direct Anonymous Attestation (DAA)

    Leung, A., Chen, L. & Mitchell, C. J., 2008, Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, TRUST 2008, Villach, Austria, March 11-12, 2008, Proceedings. Lipp, P., Sadeghi, A-R. & K-M. K. (eds.). Berlin: Springer-Verlag, p. 179-190 12 p. (Lecture Notes in Computer Science; vol. 4968).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    On multi-channel MAC protocols in cognitive radio networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 300-305 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    On quantum statistics in data analysis

    Pavlovic, D., 2008, Quantum Interaction 2008. Bruza, P. (ed.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    On the (In)security of Two Buyer-Seller Watermarking Protocols

    Martin, K. M. & Poh, G. S., 2008, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29. INSTICC Press, p. 253-260 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    On the average energy of circulant graphs

    Blackburn, S. R. & Shparlinski, I. E., 2008, In : Linear Algebra and Its Applications. 428, p. 1956-1963 8 p.

    Research output: Contribution to journalArticle

  28. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Pairing 2008

    Galbraith, S. D. (ed.) & Paterson, K. G. (ed.), 2008, Springer. (Lecture Notes in Computer Science)

    Research output: Book/ReportBook

  30. Published

    Pairings for Cryptographers

    Galbraith, S. D., Paterson, K. G. & Smart, N. P., 2008, In : Discrete Applied Mathematics. 156, p. 3113-3121.

    Research output: Contribution to journalArticle

  31. Published

    Point-weight designs with design conditions on t points

    Dent, A. W., 2008, In : Discrete Mathematics. 308, 11, p. 2080-2093 14 p.

    Research output: Contribution to journalArticle

  32. Published

    Prolific codes with the identifiable parent property

    Blackburn, S. R., Etzion, T. & Ng, S-L., 2008, In : SIAM Journal on Discrete Mathematics. 22, 4, p. 1393-1410 18 p.

    Research output: Contribution to journalArticle

  33. Published

    Proxy Signatures Secure Against Proxy Key Exposure

    Schdult, J. C. N., Matsuura, K. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer, Vol. 4939. p. 344-359 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Randomised Exponentiation Algorithms

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 451-473 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  35. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Relations Among Notions of Plaintext Awareness

    Birkett, J. & Dent, A. W., 2008, Public Key Cryptography -- PKC 2008. Cramer, R. (ed.). Springer-Verlag, p. 47-64 18 p. (Lecture Notes in Computer Science; vol. 4939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Secure Sharing of an ICT Infrastructure through Vinci

    Baiardi, F. & Sgandurra, D., 2008, Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Hausheer, D. & Schönwälder, J. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 65-78 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Securing Grid Workflows with Trusted Computing (Extended Abstract)

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 2008, p. 700. 1 p.

    Research output: Contribution to conferenceAbstract

  43. Published

    Security and Anonymity of Identity-based Encryption with Multiple Trusted Authorities

    Paterson, K. G. & Srinivasan, S., 2008, Pairing 2008. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 354-375 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  45. Published

    Security For Video Broadcasting

    Tomlinson, A., 2008, Smart Cards, Tokens, Security and Applications. Springer, p. 139-154 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

    Rupp, A., Leander, G., Bangerter, E., Dent, A. W. & Sadeghi, A-R., 2008, Advances in Cryptology -- Asiacrypt 2008. Pieprzyk, J. (ed.). Springer-Verlag, p. 489-505 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    The Benefits and Drawbacks of Using Electronic Identities

    Price, G., 2008, In : Information Security Technical Report. 13, 2

    Research output: Contribution to journalArticle

  48. Published

    The High-Fidelity Computer Reconstruction of Byzantine Art in Cyprus

    Happa, J., Zányi, E., Hulusi, V., Chrysanthou, Y. & Chalmers, A., 2008, In : Proceedings of IV International Cyprological Congress.

    Research output: Contribution to journalArticle

  49. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D., 2008, In : ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticle

  53. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. 2007
  55. Published
  56. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Noisy Carrier Modulation for HF RFID: First International EURASIP Workshop on RFID Technology

    Hancke, G. P., 1 Sep 2007, First International EURASIP Workshop on RFID Technology. Austria, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Security and Integrity of a Distributed File Storage in a Virtual Environment

    Sala, G., Sgandurra, D. & Baiardi, F., 1 Sep 2007, Fourth International IEEE Security in Storage Workshop. p. 58-69 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Building Trustworthy Intrusion Detection through VM Introspection

    Baiardi, F. & Sgandurra, D., 1 Aug 2007, Third International Symposium on Information Assurance and Security. p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 12 Jul 2007, In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In : Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticle

  62. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  63. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  64. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  65. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  66. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In : Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticle

  69. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    A WEB-BASED BOARD GAME FOR TEACHING ASPECTS OF INTERNET ENGINEERING

    Komisarczuk, P. & Welch, I., 2007, In : Advanced Technology for Learning. 4, 4, p. 194-199 6 p.

    Research output: Contribution to journalArticle

  71. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Attacking the IPsec Standards in Encryption-only Configurations

    Degabriele, J. P. & Paterson, K. G., 2007, IEEE Symposium on Privacy and Security. IEEE Computer Society Press, p. 335-349 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Capture--A behavioral analysis tool for applications and documents

    Seifert, C., Steenson, R., Welch, I., Komisarczuk, P. & Endicott-Popovsky, B., 2007, In : digital investigation. 4, p. 23-30 8 p.

    Research output: Contribution to journalArticle

  81. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In : Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticle

  82. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Editorial

    Tomlinson, A., 2007, In : Information Security Technical Report. 12, 3, p. 111-112 2 p.

    Research output: Contribution to journalEditorial

  87. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

    Birkett, J., Dent, A. W., Neven, G. & Schuldt, J. C. N., 2007, Information Security and Privacy: 12th Australasian Conference -- ACISP 2007. Pieprzyk, J., Ghodosi, H. & Dawson, E. (eds.). Springer-Verlag, p. 274-292 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    Efficient KEMs with Partial Message Recovery

    Bjørstad, T. E., Dent, A. W. & Smart, N. P., 2007, Cryptography and Coding -- 11th IMA International Conference. Galbraith, S. D. (ed.). Springer-Verlag, p. 233-256 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  91. Published

    Enumeration of Finite Groups

    Blackburn, S. R., Neumann, P. M. & Venkataraman, G., 2007, Cambridge: Cambridge University Press.

    Research output: Book/ReportBook

  92. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Grid Enabled Internet Instruments

    Komisarczuk, P., Seifert, C. & Pemberton, D., 2007, Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. p. 1906-1911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Honeyc-the low-interaction client honeypot

    Seifert, C., Welch, I. & Komisarczuk, P., 2007, In : Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand.

    Research output: Contribution to journalArticle

  95. Published

    Host mobility protocol for secure group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2007, Proceedings of 2007 International Conference on Future Generation Communication and Networking (FGCN 2007). IEEE Computer Society Press, p. 100-107

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Identity-based traitor tracing

    Abdalla, M., Dent, A. W., Malone-Lee, J., Neven, G., Phan, D. H. & Smart, N. P., 2007, Public Key Cryptography -- PKC 2007. Okamoto, T. & Wang, X. (eds.). Springer-Verlag, p. 458-476 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Inter-domain role mapping and least privilege

    Chen, L. & Crampton, J., 2007, Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 157-162 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Internet background radiation arrival density and network telescope sampling strategies

    Pemberton, D., Komisarczuk, P. & Welch, I., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 246-252 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Key Refreshing in Identity-based Cryptography and its Applications in MANETs

    Balfe, S., Boklan, K., Klagsbrun, Z. & Paterson, K. G., 2007, IEEE Milcom 2007.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  100. Published

    LISABETH: Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2007.

    Research output: Working paper

  101. Published

    Malicious attacks on ad hoc network routing protocols

    Yau, P-W., Hu, S. & Mitchell, C. J., 2007, In : International Journal of Computer Research. 15, 1, p. 73-100 38 p.

    Research output: Contribution to journalArticle

  102. Published

    Modulating a noisy carrier signal for eavesdropping-resistant HF RFID

    Hancke, G. P., 2007, In : Elektrotechnik und Informationstechnik. 124, 11, p. 404-408 5 p.

    Research output: Contribution to journalArticle