1. 2003
  2. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In: Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In: Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Apr 2003, In: Information Security Technical Report. 8, 4, p. 5

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In: Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    A representation of a family of secret sharing matroids.

    Ng, S-L., 2003, In: Designs, Codes and Cryptography. 30, p. 5-19 15 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A secure electronic Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2003, Proceedings of eTransformation, 16th Bled eCommerce Conference, Bled, Slovenia, June 2003. p. 662-674

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In: South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In: ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In: Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticlepeer-review

  16. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In: Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Belief and Trust in Fault Tolerance

    Price, G., 2003, Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Dimitrakos, T. & Martinelli, F. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Certificateless public key cryptography

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. Asiacrypt 2003. Laih, C. S. (ed.). p. 452-473 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Client v. Server side Protocols, Interfaces and Storage

    Price, G., 2003, Security Protocols, 11th International Workshop, Cambridge, UK. 2-4 April, 2003. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Combinatorial schemes for protecting digital content

    Blackburn, S. R., 2003, Surveys in Combinatorics 2003. Wensley, C. D. (ed.). Cambridge: Cambridge University Press, p. 43-78 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In: IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published
  25. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Fast Fourier Transforms using the Complex Logarithmic Number System

    Arnold, M. G., Bailey, T. A., Cowles, J. R. & Walter, C. D., 2003, In: VLSI Signal Processing. 33, 3, p. 325-335 11 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Frameproof Codes

    Blackburn, S. R., 2003, In: SIAM Journal on Discrete Mathematics. 16, p. 499-510 12 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Golay Complementary Sequences

    Parker, M. G., Tellambura, C. & Paterson, K. G., 2003, Wiley Encyclopedia of Telecommunications. Proakis, J. G. (ed.). Wiley-Interscience

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In: Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Information dynamics in cavity QED

    Soklakov, A. N. & Schack, R., 2003, In: Physical Review A. 67, p. 033804 1 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Longer Keys May Facilitate Side Channel Attacks

    Walter, C. D., 2003, Selected Areas in Cryptography. Matsui, M. & Zuccherato, R. J. (eds.). Springer, Vol. 3006. p. 42-57 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Measuring 3-D Secure and 3D SET against e-commerce end-user requirements

    Jarupunphol, P. & Mitchell, C. J., 2003, Proceedings of the 8th Collaborative electronic commerce technology and research conference (CollECTeR (Europe) 2003), National University of Ireland, Galway, June 2003. p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    More Detail for a Combined Timing and Power Attack against Implementations of RSA

    Schindler, W. & Walter, C. D., 2003, 9th IMA Int. Conf. on Cryptography and Coding. Paterson, K. G. (ed.). Springer, Vol. 2898. p. 245-263 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    PKI revisited - current issues and future trends

    Price, G. (ed.), Piper, F. (ed.) & Paterson, K. G. (ed.), 2003, Unkown Publisher. (Information Security Technical Report)

    Research output: Book/ReportBook

  41. Published

    Posets and protocols - picking the right three-party protocol.

    Ng, S-L., 2003, In: IEEE Journal on Selected Areas in Communications. 21, 1, p. 55-61 6 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Predicting the inversive generator

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2003, Cryptography and Coding. Proc. 9th IMA Intern. Conf on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer, p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Products of subsets in an abelian group

    Blackburn, S. R. & Spencer, A. J., 2003, In: Journal of Combinatorial Theory, Series A. 103, p. 53-68 16 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In: Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Quantum theory from four of Hardy's axioms

    Schack, R., 2003, In: Foundations of Physics. 33, p. 1461-1468 8 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Security

    Martin, K. M., 2003, E-Commerce Handbook. Thomson-Gee

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Security Constraints on the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2003, In: IACR Cryptology ePrint Archive. 2003, p. 13 1 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Specifying and enforcing constraints in role-based access control

    Crampton, J., 2003, Proceedings of 8th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B., 2003, Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published
  62. Published

    Threshold MACs

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R., Wang, H. & Wild, P. R., 2003, Information Security and Cryptology - ICISC 2002. Springer, Vol. 2587. p. 237-252 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. Published

    Tripartite authenticated key agreement protocols from pairings

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. IMA Conference on Cryptography and Coding. Paterson, K. G. (ed.). Springer, p. 332-359 28 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. 2002
  67. Published

    On the value of threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Oct 2002, In: Operating Systems Review. 36, 4, p. 30-35 6 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    A pragmatic alternative to undetectable signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Apr 2002, In: Operating Systems Review. 36, 2, p. 6-11 6 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2002, In: Information Security Technical Report. 7, 2, p. 1

    Research output: Contribution to journalArticlepeer-review

  70. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In: IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticlepeer-review

  75. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  76. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In: Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In: Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Existence of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2002, Codes, Graphs, and Systems: A Celebration of the Life and Career of G. David Forney. Blahut, R. E. & Koetter, R. (eds.). Kluwer Academic Publishers, p. 187-197 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In: Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Management system requirements for wireless systems beyond 3G

    Lazaro, O., Irvine, J., Girma, D., Dunlop, J., Liotta, A., Borselius, N. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 240-244 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Measuring SSL and SET against e-commerce consumer requirements

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - International Network Conference 2002 (INC 2002), University of Plymouth, UK, July 2002. p. 323-330 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 53-66 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Quantum probabilities as Bayesian probabilities

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 65, p. 022305 1 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    RSA-based undeniable signatures for general moduli

    Galbraith, S., Mao, W. & Paterson, K. G., 2002, Topics in Cryptology - CT-RSA 2002. Preneel, B. (ed.). Springer, p. 200-217 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  99. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter