1. 2019
  2. E-pub ahead of print

    Lossy Trapdoor Permutations with Improved Lossiness

    Auerbach, B., Kiltz, E., Poettering, B. & Schoenen, S., 3 Feb 2019, (E-pub ahead of print) p. 230-250. 21 p.

    Research output: Contribution to conferencePaperpeer-review

  3. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, (E-pub ahead of print) In: International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticlepeer-review

  4. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, (E-pub ahead of print) Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Documenting Greenland: Popular Geopolitics on Film

    Dodds, K-J. & Jensen, R. B., 4 Jan 2019, Arctic Cinemas and the Documentary Ethos. Kaganovsky, L., MacKenzie, S. & Westerstahl Stenport, A. (eds.). Bloomington: University of Indiana Press, 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. In preparation

    Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution

    Bhattacharya, S., Garcia-Morchon, O., Player, R. & Tolhuizen, L., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  8. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  9. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  10. Unpublished

    Computing Functions Securely: Theory, Implementation and Cryptanalysis

    Davidson, A., 2019, (Unpublished) 383 p.

    Research output: ThesisDoctoral Thesis

  11. Unpublished
  12. Unpublished

    Generic Access Control of Cloud Storage Using Attribute-Based Cryptography

    Xu, Z., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  13. Published

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Language in the Age of Algorithmic Reproduction: A Critique of Linguistic Capitalism

    Thornton, P., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  15. Published

    Linear Depth Integer-Wise Homomorphic Division

    Okada, H., Cid, C., Hidano, S. & Kiyomoto, S., 2019, Information Security Theory and Practice. WISTP 2018. Springer, p. 91-106 16 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Unpublished

    Machine Learning Techniques for Evolving Threats

    Jordaney, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  17. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In: Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticlepeer-review

  18. Unpublished

    On Enhancing the Security of Time Constrained Mobile Contactless Transactions

    Gurulian, I., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  19. Published
  20. Unpublished

    Provable Security in the Real World: New Attacks and Analyses

    Woodage, J., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  21. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  22. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In: Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Strengthening Password-Based Authentication

    Al Maqbali, F., 2019, 207 p.

    Research output: ThesisDoctoral Thesis

  24. Unpublished
  25. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  26. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

Previous 1...6 7 8 9 10 11 12 13 ...86 Next