1. 2018
  2. Published

    Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Al-Fannah, N. M., Li, W. & Mitchell, C. J., 2018, Information Security : 21st International Conference, ISC 2018, Guildford, UK, September 9–12, 2018, Proceedings. Chen, L., Manulis, M. & Schneider, S. (eds.). Springer, p. 481-501 21 p. (Lecture Notes in Computer Science; vol. 11060).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  3. Published

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 2018, Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Unpublished

    Challenging Environments: Using Mobile Devices for Security

    Cobourne, S., 2018, (Unpublished) 230 p.

    Research output: ThesisDoctoral Thesis

  5. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C., 2018, (Unpublished) 141 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  7. Forthcoming

    Cryptographic controls: the heart of cyber security

    Martin, K., 2018, (Accepted/In press) Handbook of Security Science. Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  11. Published

    Estimate All the {LWE, NTRU} Schemes!

    Albrecht, M. R., Curtis, B. R., Deo, A., Davidson, A., Player, R., Postlethwaite, E. W., Virdia, F. & Wunderer, T., 2018, 17 p. Springer.

    Research output: Other contribution

  12. Published

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  13. Published

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaper

  14. Published

    Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli

    Auerbach, B. & Poettering, B., 2018, p. 403-430. 28 p.

    Research output: Contribution to conferencePaper

  15. Published

    Holding on to dissensus: Participatory interactions in security design

    Heath, C., Hall, P. & Coles-Kemp, L., 2018, In : Strategic Design Research Journal. 11, 2, p. 65-78 14 p.

    Research output: Contribution to journalSpecial issue

  16. Published

    Hybrid Encryption in a Multi-user Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B., 2018, p. 159-189. 31 p.

    Research output: Contribution to conferencePaper

  17. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 2018, ASE '18: 2018 USENIX Workshop on Advances in Security Education. USENIX, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B., 2018, p. 190-218. 29 p.

    Research output: Contribution to conferencePaper

  20. Published

    Language Redux

    Thornton, P., 2018, In : A Peer Review Journal About. 7, 1, p. 1-8 8 p.

    Research output: Contribution to journalArticle

  21. Published

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 381-399 19 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished
  24. Unpublished

    ON THE SECURITY AND PERFORMANCE OF MOBILE DEVICES IN TRANSPORT TICKETING

    Umar, A., 2018, (Unpublished) 161 p.

    Research output: ThesisDoctoral Thesis

  25. Unpublished

    Parameter selection in lattice-based cryptography

    Player, R., 2018, (Unpublished)

    Research output: ThesisDoctoral Thesis

  26. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 2018, In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

  27. Published

    Run-Time Monitoring of Data-Handling Violations

    Happa, J., Moffat, N., Goldsmith, M. & Creese, S., 2018, Computer Security. Springer, p. 213-232 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  29. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaper

  30. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In : Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  31. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  32. Published
  33. 2017
  34. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study

    Ibrahim, S., Rush, M., Edwards, E. T. & Monks, C. P., 31 Dec 2017, In : Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 16 p.

    Research output: Contribution to journalArticle

  35. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published
  38. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    One leak will sink a ship: WebRTC IP address leaks

    Al-Fannah, N. M., 7 Dec 2017, p. 1-5. 5 p.

    Research output: Contribution to conferencePaper

  40. E-pub ahead of print

    Distributed denial of government: the Estonian Data Embassy Initiative

    Robinson, N. & Martin, K., 1 Dec 2017, In : Network Security. 2017, 9, p. 13-16 4 p.

    Research output: Contribution to journalSpecial issue

  41. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In : International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticle

  42. Published

    Geographies of (con)text: language and structure in a digital age

    Thornton, P., 28 Nov 2017, In : Computational Culture: A Journal of Software Studies. Autumn 2017, Issue 6, p. 1-11 11 p.

    Research output: Contribution to journalSpecial issue

  43. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In : Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticle

  45. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  46. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution

  47. Published

    Overpromised or Underdelivered?: Evaluating the Performance of Australia's National Cyber Security Strategy

    Haggman, A., 9 Nov 2017, Asia Pacific Security Magazine, November/December 2017, p. 10 11 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  48. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

  49. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...3 4 5 6 7 8 9 10 ...42 Next