1. 2016
  2. Unpublished

    On the Verification of Computation and Data Retrievability

    Janson, C., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    Platform Verification and Secure Program Execution in Embedded Devices

    Msgna, M., 2016, (Unpublished) 184 p.

    Research output: ThesisDoctoral Thesis

  4. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R., 2016, (Accepted/In press) Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaper

  6. 2015
  7. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia de Vega, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, Vol. 9562. p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Network-aware stream query processing in mobile ad-hoc networks

    O'Keeffe, D., Salonidis, T. & Pietzuch, P. R., 17 Dec 2015, 34th IEEE Military Communications Conference, MILCOM 2015, Tampa, FL, USA, October 26-28, 2015. p. 1335-1340 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Bow ties are cool: an evening at the IISS with Toomas Hendrik Ilves

    Robinson, N. & Haggman, A., 3 Dec 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  15. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In : Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticle

  18. Published

    Security in Swarm Robotics

    Laing, T., Martin, K., Ng, S. & Tomlinson, A., Dec 2015, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. Tan, Y. (ed.). IGI Global, p. 42-66 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  21. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  24. E-pub ahead of print

    Signposts: Cyprus, the UK and the Future of the SBAs

    Dodds, K-J., Jensen, R. & Constantinou, C., 7 Nov 2015, In : RUSI Journal. 160, 5, p. 36-45 10 p.

    Research output: Contribution to journalArticle

  25. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  29. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  32. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In : Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticle

  33. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In : Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issue

  34. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C., Oct 2015, In : Journal of Cryptology. 28, p. 769–795 27 p.

    Research output: Contribution to journalArticle

  35. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R., 13 Sep 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A Binary Model of Broken Home: Parental Death-Divorce Hypothesis of Male Juvenile Delinquency in Nigeria and Ghana

    Ibrahim, S., 3 Sep 2015, Contemporary Perspectives in Family Research. Blair, S. L. & Maxwell, S. R. (eds.). New York: Emerald Publishing, Vol. 9. p. 311-340 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  39. Published

    Risk analysis of Android applications: A user-centric solution

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Sep 2015, In : Future Generation Computer Systems.

    Research output: Contribution to journalArticle

  40. Published

    Cyber risks to governance, Part I: Silk Road: resisting and reshaping governance

    Haggman, A., 20 Aug 2015, Strife Blog.

    Research output: Other contribution

  41. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaper

  42. Published

    Detection of repackaged mobile applications through a collaborative approach

    Aldini, A., Martinelli, F., Saracino, A. & Sgandurra, D., 10 Aug 2015, In : Concurrency Computation. 27, 11, p. 2818-2838 21 p.

    Research output: Contribution to journalArticle

  43. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  44. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Aug 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 113-128 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2 Jul 2015, 2015 International Conference on Biometrics (ICB). IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  51. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  52. Published

    Cyber Weapons as a Game Changer: A Critical Reflection

    Haggman, A., 9 Jun 2015, E-International Relations.

    Research output: Other contribution

Previous 1...9 10 11 12 13 14 15 16 ...42 Next