1. 2015
  2. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  6. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  9. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In: Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In: Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issuepeer-review

  11. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C., Oct 2015, In: Journal of Cryptology. 28, p. 769–795 27 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R., 13 Sep 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A Binary Model of Broken Home: Parental Death-Divorce Hypothesis of Male Juvenile Delinquency in Nigeria and Ghana

    Ibrahim, S., 3 Sep 2015, Contemporary Perspectives in Family Research. Blair, S. L. & Maxwell, S. R. (eds.). New York: Emerald Publishing, Vol. 9. p. 311-340 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  16. Published

    Risk analysis of Android applications: A user-centric solution

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Sep 2015, In: Future Generation Computer Systems.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Cyber risks to governance, Part I: Silk Road: resisting and reshaping governance

    Haggman, A., 20 Aug 2015, Strife Blog.

    Research output: Other contribution

  18. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    Detection of repackaged mobile applications through a collaborative approach

    Aldini, A., Martinelli, F., Saracino, A. & Sgandurra, D., 10 Aug 2015, In: Concurrency Computation. 27, 11, p. 2818-2838 21 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  21. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Aug 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 113-128 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2 Jul 2015, 2015 International Conference on Biometrics (ICB). IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  28. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  29. Published

    Cyber Weapons as a Game Changer: A Critical Reflection

    Haggman, A., 9 Jun 2015, E-International Relations.

    Research output: Other contribution

  30. Published

    Cyber Weapons Don't Go Boom

    Haggman, A., 9 Jun 2015, 1 p. Information Security Group.

    Research output: Other contribution

  31. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  34. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Ciphers for MPC and FHE

    Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T. & Zohner, M., 14 Apr 2015, Advances in Cryptology -- EUROCRYPT 2015. Oswald, E. & Fischlin, M. (eds.). Springer, p. 430-454 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 313-322 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A note on an upper bound of traceability codes

    Owen, S. & Ng, S-L., 2 Apr 2015, In: Australasian Journal of Combinatorics. 62, 1, p. 140-146 7 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  41. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Air’s affinities: Geopolitics, chemical affect and the force of the elemental

    Adey, P., 1 Mar 2015, In: Dialogues in Human Geography. 5, 1, p. 54-75 22 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Governing Emergencies: Beyond Exceptionality

    Adey, P., Anderson, B. & Graham, S., 1 Mar 2015, In: Theory, Culture and Society. 32, 2, p. 3-17 15 p.

    Research output: Contribution to journalEditorialpeer-review

  45. Published

    Multiple Attacks on Authentication Protocols for Low-Cost RFID Tags

    Bilal, Z., Martin, K. M. & Saeed, Q., 1 Mar 2015, In: Applied Mathematics and Information Sciences. 9, 2, p. 561-569 9 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Business risks of software vulnerabilities: Four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses

    Kramer, H. & Walter, C., Mar 2015, Computer Weekly, p. 1-11 11 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  47. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In: Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Impressions from a Talk on the Dark Web

    Davidson, A. & Haggman, A., 16 Feb 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  50. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Security and the politics of resilience: An aesthetic response

    Grove, K. & Adey, P., 1 Feb 2015, In: Politics. 35, 1, p. 78-84 7 p.

    Research output: Contribution to journalArticlepeer-review