1. 2019
  2. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Unpublished

    Machine Learning Techniques for Evolving Threats

    Jordaney, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  4. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In: Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticlepeer-review

  5. Unpublished

    On Enhancing the Security of Time Constrained Mobile Contactless Transactions

    Gurulian, I., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  6. Published
  7. Unpublished

    Provable Security in the Real World: New Attacks and Analyses

    Woodage, J., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  8. Submitted

    Quantum speedups for lattice sieves are tenuous at best

    Gheorghiu, V., Postlethwaite, E. & Schanck, J., 2019, (Submitted)

    Research output: Other contribution

  9. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  10. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In: Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Strengthening Password-Based Authentication

    Al Maqbali, F., 2019, 207 p.

    Research output: ThesisDoctoral Thesis

  12. Unpublished
  13. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  14. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  15. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. 2018
  17. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, p. 226-229. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  18. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks

    Semal, B., Markantonakis, K. & Akram, R. N., 10 Dec 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  25. E-pub ahead of print

    The Authorization Policy Existence Problem

    Berge, P., Crampton, J., Gutin, G. & Watrigant, R., 28 Nov 2018, In: IEEE Transactions on Dependable and Secure Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticlepeer-review

  26. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...5 6 7 8 9 10 11 12 ...84 Next