1. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  2. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  4. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaper

  5. Published

    The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem

    Blackburn, S. R., 2010, In : Journal of Mathematical Cryptology. 4, 2, p. 193-198 6 p.

    Research output: Contribution to journalArticle

  6. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaper

  7. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  8. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  9. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L., 6 Feb 2017, In : ACM Computing Surveys. 49, 4, p. 1-41 41 p., 76.

    Research output: Contribution to journalArticle

  10. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  11. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S., 1998, In : Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticle

  12. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In : Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticle

  15. Forthcoming

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, (Accepted/In press) Palgrave Macmillan.

    Research output: Book/ReportAnthology

  16. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In : Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticle

  17. Published

    The High-Fidelity Computer Reconstruction of Byzantine Art in Cyprus

    Happa, J., Zányi, E., Hulusi, V., Chrysanthou, Y. & Chalmers, A., 2008, In : Proceedings of IV International Cyprological Congress.

    Research output: Contribution to journalArticle

  18. Published
  19. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In : Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticle

  20. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published
  22. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J., 2006, In : ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticle

  23. Published

    The length of a typical Huffman codeword

    Schack, R., 1994, In : IEEE Transactions on Information Theory. IT-40, p. 1246-1247 2 p.

    Research output: Contribution to journalArticle

  24. Published

    The linear complexity of the self-shrinking generator

    Blackburn, S. R., 1999, In : IEEE Transactions on Information Theory. 45, 6, p. 2073-2077 5 p.

    Research output: Contribution to journalArticle

  25. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In : Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issue

  29. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C., 2010, In : Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticle

  30. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  31. Published

    The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos

    Chaumette, S., Markantonakis, K., Mayes, K. & Sauveron, D., Sep 2006.

    Research output: Contribution to conferencePaper

  32. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  33. Published

    The monitorability of service-level agreements for application-service provision

    Skene, J., Skene, A., Crampton, J. & Emmerich, W., 2007, Proceedings of the 6th International Workshop on Software and Performance. Cortellessa, V., Uchitel, S. & Yankelevich, D. (eds.). ACM Press, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    The Navigation Metaphor in Security Economics

    Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W. & Verbij, R., 25 May 2016, In : IEEE Security and Privacy Magazine. 14, 3, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  35. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    The physically observable security of signature schemes

    Dent, A. W. & Malone-Lee, J., 2005, Cryptography and Coding: 10th IMA International Conference. Smart, N. P. (ed.). Springer-Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    The Principal Principle and Probability in the Many-Worlds interpretation

    Schack, R., 2010, Many Worlds? Everett, Quantum Theory, and Reality. S., S., J., B., A., K. & D., W. (eds.). Oxford: Oxford University Press, p. 467-475

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In : Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticle

  40. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  41. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaper

  42. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    The RAKAPOSHI Stream Cipher

    Cid, C., Kiyomoto, S. & Kurihara, J., 2009, Information and Communications Security, 11th International Conference, ICICS 2009. Springer, Vol. 5927. p. 32-46 15 p. (Lecture Notes in Computer Sciences - LNCS; vol. 5927).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In : Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticle

  45. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In : Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticle

  47. Published
  48. Published

    The Sajdak Conjecture

    Blackburn, S. R., 1997, In : Math. Spectrum. 30, No. 1, p. 15-16 2 p.

    Research output: Contribution to journalArticle

  49. Published

    The secondary and approximate authorization model and its application to Bell-LaPadula policies

    Crampton, J., Leung, W. & Beznosov, K., 2006, Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    The Secure and Multiple Payment System based on the Mobile Phone Platform

    Zhang, Q., Brites Moita, J. N., Mayes, K. & Markantonakis, K., 2004, The Secure and Multiple Payment System based on the Mobile Phone Platform.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In : Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticle

  54. Published
  55. Published

    The status of national PKIs - A European overview

    Patsos, D., Ciechanowicz, C. & Piper, F., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 13-20 8 p.

    Research output: Contribution to journalArticle

  56. Published

    The TypTop System: Personalized Typo-Tolerant Password Checking

    Chatterjee, R., Woodage, J., Pnueli, Y., Chowdhury, A. & Ristenpart, T., 30 Oct 2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 329-346 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  57. Published

    The unreasonable ineffectiveness of security engineering: An overview

    Pavlovic, D., 2010, Proceedings of IEEE Conference on Software Engineering and Formal Methods, Pisa, Italy, 2010. Fiadeiro, J. L. & Gnesi, S. (eds.). IEEE, p. 12-18 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti

    Happa, J., Artusi, A., Dubla, P., Bashford-Rogers, T., Debattista, K., Hulusi, V. & Chalmers, A., 2009, In : Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Cultural Heritage.

    Research output: Contribution to journalArticle

  60. In preparation

    The Way We Evacuate: emergency, reproduction and the aesthetics of mobility

    Adey, P., 2020, (In preparation) Duke University Press.

    Research output: Book/ReportBook

  61. Published

    Theoretical Analysis of Security Attacks from a Swarm-like Perspective

    George, C., Goo, S. K. & Tomlinson, A., 2011.

    Research output: Contribution to conferencePaper

  62. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In : Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticle

  63. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

    Tomlinson, A. & Yap, J. Y., 14 Jul 2013, p. 39-45. 6 p.

    Research output: Contribution to conferencePaper

  65. Published

    Threat modeling approaches and tools for securing architectural designs of an e-banking application

    Moeckel, C. & Abdallah, A. E., 14 Oct 2010, p. 149-154. 6 p.

    Research output: Contribution to conferencePaper

  66. Published

    Threats to the Swarm: Security Considerations for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., 2009, In : International Journal on Advances in Security. 2, 2&3, p. 288 - 297

    Research output: Contribution to journalArticle

  67. Published

    Threshold Anonymous Announcement in VANETs.

    Chen, LI., Ng, S-L. & Wang, G., Mar 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 605-615

    Research output: Contribution to journalArticle

  68. Published

    Threshold MACs

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R., Wang, H. & Wild, P. R., 2003, Information Security and Cryptology - ICISC 2002. Springer, Vol. 2587. p. 237-252 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  69. Published

    Thwarting timing attacks using ATM networks

    Price, G., 2001, Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In : Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticle

  76. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  78. Published

    Torsion-free metabelian groups with commutator quotient C_p^n x C_p^m

    Cid, C., 2002, In : Journal of Algebra. 248, p. 15-36 22 p.

    Research output: Contribution to journalArticle

  79. Published

    Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

    de Amorim, R. C. & Komisarczuk, P., 2014, Case Studies in Secure Computing: Achievements and Trends. 1st ed. CRC Press, p. 295 1 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  81. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

    Legg, P. A., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis, I., Goldsmith, M. & Creese, S., 2013, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4, 4, p. 20-37 18 p.

    Research output: Contribution to journalArticle

  83. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  86. Forthcoming

    Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

    Gómez-Cabrera, A., Escamilla-Ambrosio, P. J., Rodríguez-Mota, A. & Happa, J., 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  87. Published

    Towards an Access-Control Framework for Countering Insider Threats

    Crampton, J. & Huth, M., 2010, Insider Threats in Cyber Security and Beyond. Bishop, M., Gollmann, D., Hunker, J. & Probst, C. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaper

  89. Published

    Towards Bidirectional Ratcheted Key Exchange

    Poettering, B. & Rösler, P., 2018, p. 3-32. 30 p.

    Research output: Contribution to conferencePaper

  90. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  95. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  96. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Traceability codes

    Blackburn, S., Etzion, T. & Ng, S-L., Nov 2010, In : Journal of Combinatorial Theory, Series A. 117, 8, p. 1049-1057

    Research output: Contribution to journalArticle

  98. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution