1. 2017
  2. Published

    A Smart Micro-Grid Architecture for Resource Constrained Environments

    Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 2017, Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 2017, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Springer, p. 239-251 13 p. (Lecture Notes in Computer Science; vol. 10242).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    Authentication by Gesture Recognition: a Dynamic Biometric Application

    Ducray, B., 2017, (Unpublished) 146 p.

    Research output: ThesisDoctoral Thesis

  8. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Characterising a CPU fault attack model via run-time data analysis

    Kelly, M., Mayes, K. & Walker, J. F., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    Cold Boot Attacks on NTRU

    Paterson, K. G. & Villanueva-Polanco, R., 2017, Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Springer-Verlag, Vol. 10698 LNCS. p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Comparison of dynamic biometrie security characteristics against other biometrics

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  12. Published

    Encyclopedia of Cyber Warfare

    Springer, P. J. (ed.) & Repel, D., 2017, Encyclopedia of Cyber Warfare. 1 ed. ABC-Clio, p. 51-52 2 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  13. Unpublished

    Enhancing the Security of Centralised and Distributed Payments

    Jayasinghe, D., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  14. Published

    GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements

    Rodriguez-Mota, A., Escamilla-Ambrosio, P. J., Happa, J. & Aguirre-Anaya, E., 2017, AFI 360 Conference Track on Future Internet and Internet of Things Applications. p. 63-74 12 p. (Lecture Notes of the Institute for Computer Sciences; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Gesture recognition implemented on a personal limited device

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  16. Published

    Glamdring: Automatic Application Partitioning for Intel SGX

    Lind, J., Priebe, C., Muthukumaran, D., O'Keeffe, D., Aublin, P-L., Kelbert, F., Reiher, T., Goltzsche, D., Eyers, D. M., Kapitza, R., Fetzer, C. & Pietzuch, P. R., 2017, Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC ’17). USENIX, p. 285-298 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished

    Improving security and privacy in current mobile systems

    Khan, M., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  18. Unpublished

    Improving the Security of Real World Identity Management Systems

    Li, W., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  19. Published

    Inductive Conformal Martingales for Change-Point Detection

    Volkhonskiy, D., Burnaev, E., Nouretdinov, I., Gammerman, A. & Vovk, V., 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). p. 1-22 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Large Modulus Ring-LWE > Module-LWE

    Albrecht, M. & Deo, A., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 267-296 30 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 2017, Information Security and Cryptology: 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers. Springer, Vol. 10143. p. 484-504 21 p. (Lecture Notes in Computer Science ; vol. 10143).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Mobility (Second edition)

    Adey, P., 2017, 2nd ed. Routledge. 386 p.

    Research output: Book/ReportBook

  23. Unpublished
  24. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    New Directions in Secure African Branchless Banking

    Heath, C. & Quaglia, E., 2017, Strategic Narratives of Technology and Africa.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Submitted

    Nigerian Society and Culture

    Ibrahim, S., 2017, (Submitted) In: The Journal of Intercultural Studies. special issue

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability

    Al-Fannah, N. M. & Li, W., 2017, p. 105-120. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  28. Published

    Notes on GGH13 Without the Presence of Ideals

    Davidson, A., Albrecht, M. & Larraia de Vega, E., 2017, p. 135-158. 24 p.

    Research output: Contribution to conferencePaperpeer-review

  29. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B., 2017, p. 519-534. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  31. Unpublished

    On Using the System Management Mode for Security Purposes

    Rodrigues De Souza, W. A., 2017, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  32. Published

    Parameterized Complexity of the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gutin, Z. & Wahlstrom, M., 2017, Combinatorial Optimization and Graph Algorithms. Fukunaga, T. & Kawarabayashi, K. (eds.). Springer-Verlag, p. 101-120 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  34. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., 2017, In: IACR Cryptology ePrint Archive. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  36. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  40. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  41. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis

  43. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I., 2017, In: Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticlepeer-review

  51. 2016
  52. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 31 Dec 2016, In: International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p.

    Research output: Contribution to journalArticlepeer-review

  53. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, (E-pub ahead of print) Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In: Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P., 14 Dec 2016, In: IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  57. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Connectivity, Communications and Technology

    Haggman, A., 7 Dec 2016, International Relations. McGlinchey, S. (ed.). E-International Relations, p. 135-143 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  60. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  61. Published

    Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals

    Ibrahim, S., Dec 2016, In: International Journal of Law, Crime and Justice. 47, p. 44-57 14 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In: Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Causes of socioeconomic cybercrime in Nigeria

    Ibrahim, S., 18 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE Xplore, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  64. Published

    How to stay in.eu: A post-Brexit gift from Estonia and an evening inside its Embassy

    Hardy, A., Robinson, N. & Haggman, A., 18 Nov 2016, RHUL Geopolitics & Security.

    Research output: Other contribution

  65. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, (E-pub ahead of print) Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In: International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    On the Security of 2-Key Triple DES

    Mitchell, C. J., Nov 2016, In: IEEE Transactions on Information Theory. 62, 11, p. 6260-6267 8 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Efficient, XOR-Based, Ideal (t,n)− threshold Schemes

    Chen, L., Laing, T. & Martin, K., 28 Oct 2016, (E-pub ahead of print) Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052. p. 467-483 17 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K., Oct 2016, In: Designs, Codes and Cryptography. 81, 1, p. 11-34 24 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M., Oct 2016, In: ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p., 8.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Password Generators: Old Ideas and New

    AL Maqbali, F. & Mitchell, C., 17 Sep 2016, Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  78. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  80. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In: ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., Aug 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In: Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticlepeer-review

  87. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, (E-pub ahead of print) Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Challenges in standardising cryptography

    Mitchell, C. J., 1 Jul 2016, In: International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In: Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In: Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  93. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  94. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, (E-pub ahead of print) Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Challenges of security and trust of mobile devices as digital avionics component

    Akram, R. & Markantonakis, K., 9 Jun 2016, Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J., 3 Jun 2016, 4 p.

    Research output: Working paper

  100. Published

    Securing Autonomous Networks through Virtual Closure

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Jun 2016, In: International Journal of Intelligent Computing Research (IJICR). 7, 2, p. 694-705 12 p.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    The Navigation Metaphor in Security Economics

    Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W. & Verbij, R., 25 May 2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

Previous 12 3 4 5 6 7 8 9 ...22 Next