1. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. E-pub ahead of print

    A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K., 1 Jan 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A scenario method to automatically assess ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. IEEE Computer Society, p. 544-551 8 p. 6787327

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In : IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticle

  8. Published

    A representation of a family of secret sharing matroids.

    Ng, S-L., 2003, In : Designs, Codes and Cryptography. 30, p. 5-19 15 p.

    Research output: Contribution to journalArticle

  9. Published

    A Re-painted Amazon

    Earl, G., Beale, G., Happa, J., Williams, M., Turley, G., Martinez, K. & Chalmers, A., 2009, In : Proceedings of EVA: Electronic Information and the Visual Arts.

    Research output: Contribution to journalArticle

  10. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In : Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticle

  11. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In : Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticle

  14. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H., 2006, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticle

  15. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A privacy-aware reputation-based announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. M. & Ng, S-L., 2013, Wireless Vehicular Communications (WiVeC), 2013 IEEE 5th International Symposium on. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaper

  19. Published

    A Pragmatic System-Failure Assessment and Response Model

    Happa, J., Fairclough, G., Nurse, JRC., Agrafiotis, I., Goldsmith, M. & S, C., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Vol. 1. p. 503-508 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A pragmatic alternative to undetectable signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Apr 2002, In : Operating Systems Review. 36, 2, p. 6-11 6 p.

    Research output: Contribution to journalArticle

  21. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K., Mar 2013, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticle

  22. Published

    A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, Proceedings of the IEEE International Conference on Computer Systems and Applications. Washington, DC, USA: IEEE Computer Society Press, p. 851-858 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection

    Xu, Z. & Martin, K. M., 2013, The 15th IEEE International Conference on High Performance Computing and Communications. IEEE, p. 1593-1598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A Pilot Study Investigating The Process of Risk Assessment and Re-Accreditation in UK Public Sector Systems

    Davies, M., Happa, J. & I, A., 2015, York Doctoral Symposium on Computer Science and Electronics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Forthcoming

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, 30 Mar 2020, (Accepted/In press) Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  35. E-pub ahead of print
  36. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In : Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticle

  37. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In : Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticle

  38. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In : Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticle

  39. Published

    A note on an upper bound of traceability codes

    Owen, S. & Ng, S-L., 2 Apr 2015, In : Australasian Journal of Combinatorics. 62, 1, p. 140-146 7 p.

    Research output: Contribution to journalArticle

  40. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In : European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticle

  42. Published

    A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, CRYPTO 2017: Advances in Cryptology – CRYPTO 2017. Springer, p. 682-710 29 p. (Lecture Notes in Computer Science; vol. 10403).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. E-pub ahead of print

    A new description of orthogonal bases

    Coecke, B., Vicary, J. & Pavlovic, D., 9 Nov 2012, In : Mathematical Structures in Computer Science.

    Research output: Contribution to journalArticle

  44. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, p. 429-447. 19 p.

    Research output: Contribution to conferencePaper

  45. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, In : E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on. 0, p. 20 1 p.

    Research output: Contribution to journalArticle

  47. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016. Springer-Verlag, p. 173-184 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    A Multi-criteria-Based Evaluation of Android Applications

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 2012, Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Mitchell, C. J. & Tomlinson, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 67-82 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    A model to facilitate discussions about cyber attacks

    Happa, J. & Fairclough, G., 2017, Ethics and policies for cyber operations. Springer, p. 169-185 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published
  51. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticle

  54. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In : BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticle

  55. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J., 13 Mar 2018, p. 152-154. 3 p.

    Research output: Contribution to conferencePoster

  56. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In : The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticle

  58. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In : Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticle

  62. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    A generic group key management framework for group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2006, Proceedings of the 6th International Network Conference (INC2006).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In : Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticle

  65. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In : IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticle

  66. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  67. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In : Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticle

  68. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In : Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticle

  69. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In : HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticle

  71. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  74. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticle

  75. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  77. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In : Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticle

  78. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In : International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticle

  79. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In : Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticle

  80. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    Askoxylakis, I. G., Markantonakis, K., Tryfonas, T., May, J. & Traganitis, A., 2009, Mobile Lightweight Wireless Systems. Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S., Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. S., Stan, M., Xiaohua, J., Zomaya, A. & Coulson, G. (eds.). Springer Berlin / Heidelberg, Vol. 13. p. 103-113 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  83. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    A device management framework for secure ubiquitous service delivery

    Leung, A. & Mitchell, C. J., 2008, Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008. Los Alamitos, CA: IEEE Computer Society Press, p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In : Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticle

  90. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In : Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticle

  91. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaper

  92. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P., 2018, In : GeoHumanities. 4, 2, p. 417-437 21 p.

    Research output: Contribution to journalArticle

  94. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, p. 189-205. 17 p.

    Research output: Contribution to conferencePaper

  95. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In : Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticle

  97. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticle

  98. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter