1. 2020
  2. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Robinson, N. & Butler-Rees, A., 27 Oct 2020, In : Emotion, Space and Society.

    Research output: Contribution to journalArticle

  3. Forthcoming

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 25 Oct 2020, (Accepted/In press) Proceedings of International Conference on Security & Privacy 2020 (ICSP 2020): Jamshedpur, India. Springer-Verlag, (LNEE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print
  6. Published

    Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

    Gómez-Cabrera, A., Escamilla-Ambrosio, P. J., Rodríguez-Mota, A. & Happa, J., 12 Oct 2020, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  7. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020.

    Research output: Contribution to conferencePaper

  8. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., Oct 2020, p. 471-480. 10 p.

    Research output: Contribution to conferencePaper

  10. Forthcoming

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 30 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  11. Published

    An insecure noninteractive group key establishment scheme

    Mitchell, C. J., 19 Sep 2020, arXiv.

    Research output: Working paper

  12. Forthcoming

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 18 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  13. E-pub ahead of print

    Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Sep 2020, p. 3-16. 14 p.

    Research output: Contribution to conferencePaper

  14. E-pub ahead of print

    Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

    Costache, A., Laine, K. & Player, R., 13 Sep 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Springer, p. 546-565 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. E-pub ahead of print

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor

    Mayes, K., 10 Sep 2020, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  17. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Forthcoming

    Fair and Sound Secret Sharing from Homomorphic Time-Lock Puzzles

    Knapp, J. & Quaglia, E., 31 Aug 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  19. Forthcoming

    Malware vs Anti-Malware Battle - Gotta Evade 'em All!

    Chaffey, E. J. & Sgandurra, D., 29 Aug 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  20. Forthcoming

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, 18 Aug 2020, (Accepted/In press) Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Forthcoming

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 16 Aug 2020, (Accepted/In press) ASIACRYPT 2020. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k)

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 10 Aug 2020, CRYPTO 2020. Springer, p. 186-212 27 p. (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Slide reduction, revisited—filling the gaps in svp approximation

    Aggarwal, D., Li, J., Nguyen, P. Q. & Stephens-Davidowitz, N., 10 Aug 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 274-295 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Modelling Adversarial Flow in Software-Defined Industrial Control Networks Using a Queueing Network Model

    Nweke, L. O. & Wolthusen, S. D., 7 Aug 2020, 2020 IEEE Conference on Communications and Network Security, CNS 2020. Institute of Electrical and Electronics Engineers Inc., 6 p. 9162191. (2020 IEEE Conference on Communications and Network Security, CNS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 3 Aug 2020, (Accepted/In press) Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future

    Khan, H. & Martin, K. M., Aug 2020, In : Journal of Information Security and Applications. 53, p. 1-17 17 p., 102537.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...83 Next