1. 2018
  2. Published

    What Should You Pay to Protect Your Data? The Economics of Cyber Security

    Ertan, A., 9 Mar 2018, Cyber World , March 2018 edition, p. 50-55 6 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  3. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    RUSH, M. & Ibrahim, S., 1 Mar 2018, In: Sociological Research Online. 23, 1, p. 177-196 20 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D., 1 Mar 2018, In: Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In: Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In: Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  10. Published

    Technical Perspective: On heartbleed: A Hard Beginnyng Makth a Good Endyng

    Paterson, K., 21 Feb 2018, In: Communications of the ACM. 61, 3, p. 108-108 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  11. E-pub ahead of print

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N., 26 Jan 2018, (E-pub ahead of print) p. 142-159. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  12. Published

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S., 18 Jan 2018, Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Iterative recovery of controllability via maximum matching

    Zhang, S. & Wolthusen, S., 15 Jan 2018, p. 328-333. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  14. Published

    Making defeating CAPTCHAs harder for bots

    Al-Fannah, N. M., 11 Jan 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  15. Published

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S., Jan 2018, In: Cryptography and Communications. 10, 1, p. 41-58 18 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P., 2018, In: GeoHumanities. 4, 2, p. 417-437 21 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Review on Attacks and Their Countermeasures in Power System State Estimation

    Gul, A. & Wolthusen, S. D., 2018, Smart Micro-Grid Systems Security and Privacy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T., 2018, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  22. Unpublished

    An Analysis of TLS 1.3 and its use in Composite Protocols

    Hoyland, J., 2018, (Unpublished) 273 p.

    Research output: ThesisDoctoral Thesis

  23. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H., 2018, In: International Journal of Sensor Networks. 26, 1, p. 54-68 15 p.

    Research output: Contribution to journalArticlepeer-review

  24. Unpublished

    Analysis of Lightweight and Efficient Symmetric-Key Primitives

    Ankele, R., 2018, (Unpublished) 257 p.

    Research output: ThesisDoctoral Thesis

  25. Unpublished
  26. Published

    Attacks against GSMA’s M2M Remote Provisioning

    Quaglia, E., Smyth, B. & Meyer, M., 2018, Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution