1. 2021
  2. Published

    Report and Trace Ring Signatures

    Fraser, A. & Quaglia, E., 9 Dec 2021, 20th International Conference On Cryptology And Network Security: CANS 2021. Springer, [Cham], Vol. 13099. p. 179-199 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. 2022
  4. Forthcoming

    Estonia: a curious and cautious approach to artificial intelligence and national security

    Robinson, N., Hardy, A. & Ertan, A., 2022, (Accepted/In press) Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Unpublished
  6. Published

    Malware in Motion

    Choudhury, R., Luo, Z. & Nguyen, K., 2022, p. 595-602.

    Research output: Contribution to conferencePaperpeer-review

  7. Forthcoming

    Breaking Bridgefy, again: Adopting libsignal is not enough

    Albrecht, M., Eikenberg, R. & Paterson, K., 20 Jan 2022, (Accepted/In press) USENIX Security'22.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Securing emergent behaviour in swarm robotics

    Chen, L. & Ng, S-L., Feb 2022, In: Journal of Information Security and Applications. 64, 103047.

    Research output: Contribution to journalArticlepeer-review

  9. Forthcoming

    Watch over your TV: A Security and Privacy Analysis of the Android TV ecosystem

    Tileria Palacios, M. & Blasco Alis, J., 1 Feb 2022, (Accepted/In press).

    Research output: Contribution to conferencePaperpeer-review

  10. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published
  12. Published

    New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

    Thomas-Brans, F., Heckmann, T., Markantonakis, K. & Sauveron, D., 11 Mar 2022, In: IEEE Access. 10, p. 33742 - 33757

    Research output: Contribution to journalArticlepeer-review

  13. E-pub ahead of print

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., Jul 2022, In: IEEE Transactions on Information Theory. 68, 7, p. 4782-4789 8 p.

    Research output: Contribution to journalArticlepeer-review

  14. Forthcoming

    TIDE: A novel approach to constructing timed-release encryption

    Loe, A. F., Medley, L., O'Connell, C. & Quaglia, E. A., 15 Apr 2022, (Accepted/In press) ACISP 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A qualitative exploration of the role of employment in desistance and subsequent identity change - ex-prisoners’ lived experiences

    Rhoden, N., Senker, S. & Glorney, E., 19 Apr 2022, In: The Journal of Forensic Practice. 24, 2, p. 168-183

    Research output: Contribution to journalArticlepeer-review

  16. E-pub ahead of print

    Valued Authorization Policy Existence Problem: Theory and Experiments

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., 21 Apr 2022, (E-pub ahead of print) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Privacy-preserving Web single sign-on: Formal security analysis and design

    Schmitz, G., 26 Apr 2022, In: it - Information Technology. 64, 1-2

    Research output: Contribution to journalArticlepeer-review

  18. E-pub ahead of print

    Drawing Out the Everyday Hyper-[In]Securities of Digital Identity

    Heath, C. P. R. & Coles-Kemp, L., 29 Apr 2022, (E-pub ahead of print) Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems.. ACM, p. 1-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Cyber security and the Leviathan

    Da Silva, J., May 2022, In: Computers and Security. 116, 102674.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Hack the Heap: Heap Layout Manipulation made Easy

    Gennissen, J. & O'Keeffe, D., 26 May 2022, Hack the Heap: Heap Layout Manipulation made Easy. 16th Workshop on Offensive Technologies (WOOT) 2022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    PeriScope: Comprehensive Vulnerability Analysis of Mobile App-defined Bluetooth Peripherals

    Zhao, Q., Zuo, C., Blasco Alis, J. & Lin, Z., 30 May 2022, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  22. Published

    Generalized Noise Role Mining

    Crampton, J., Eiben, E., Gutin, G., Karapetyan, D. & Majumdar, D., Jun 2022, p. 91-102.

    Research output: Contribution to conferencePaperpeer-review

  23. E-pub ahead of print

    Detecting CAN Attacks on J1939 and NMEA 2000 Networks

    Rogers, M., Weigand, P., Happa, J. & Rasmussen, K., 14 Jun 2022, (E-pub ahead of print) In: IEEE Transactions on Dependable and Secure Computing.

    Research output: Contribution to journalArticlepeer-review

Previous 1...83 84 85 86 87 Next