1. Published

    Codes, Correlations and Power Control in OFDM

    Davis, J. A., Jedwab, J. & Paterson, K. G., 1999, Difference Sets, Sequences and their Correlation Properties. Pott, A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 113-132 20 p. (NATO Science Series C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Coding Techniques for Power Controlled OFDM

    Paterson, K. G., 1998, Proceedings of 9th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98). IEEE Computer Society Press, Vol. 2. p. 801-805 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 955-962 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Cold Boot Attacks on NTRU

    Paterson, K. G. & Villanueva-Polanco, R., 2017, Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Springer-Verlag, Vol. 10698 LNCS. p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Unpublished

    Cold Boot Attacks on Post-Quantum Schemes

    Villanueva Polanco, R., 8 Mar 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  7. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Deo, A. & Paterson, K., 14 Aug 2018, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

    Akram, R. N., Markantonakis, K. & Sauveron, D., 1 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Liu, Y. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    Collaborative Verifiable Delay Functions

    Medley, L. & Quaglia, E., 21 Jul 2021, (Accepted/In press) Inscrypt 2021: 17th International Conference on Information Security and Cryptology . (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Collective Information Security in Large-Scale Urban Protests: the Case of Hong Kong

    Albrecht, M., Blasco Alis, J., Jensen, R. B. & Marekova, L., Aug 2021, Proceedings of the 30th USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Unpublished

    Combinatorial Aspects of Key Predistribution for Resource-Constrained Networks

    Kendall, M., 2013, (Unpublished) 194 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Combinatorial schemes for protecting digital content

    Blackburn, S. R., 2003, Surveys in Combinatorics 2003. Wensley, C. D. (ed.). Cambridge: Cambridge University Press, p. 43-78 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Combinatorics and Threshold Cryptography

    Blackburn, S. R., 1999, Combinatorial Designs and their Applications. Holroyd, F. C., Quinn, K. A. S., Rowley, C. & Web, B. S. (eds.). London: CRC Press, p. 49-70 22 p. (Chapman and Hall/CRC Research Notes in Mathematics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T., 1 Jun 2018, In: Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  17. Published

    Coming of Age: A Longitudinal Study of TLS Deployment

    Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K. G., Vallina-Rodriguez, N. & Caballero, J., 31 Oct 2018, Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. p. 415-428 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Coming up for air: Comfort, conflict and the air of the megacity

    Adey, P., 2013, Urban Interstices: The Aesthetics and the Politics of the In-between. Ashgate Publishing Ltd, p. 103-118 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In: Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In: Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In: Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  25. Published

    Comment: Signature scheme based on discrete logarithm without using one-way hash-function.

    Yeun, C. Y., Mitchell, C. J. & Ng, S-L., 1998, In: Electronics Letters. 34, 24, p. 2329-2330 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  26. Published

    Comments on "On the Security of Three-Party Cryptographic Protocols" by Xu, Zhang and Zhu.

    Ng, S-L., 1999, In: Operating Systems Review. 33, 3, p. 5-6

    Research output: Contribution to journalComment/debate

  27. Published

    Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al.

    Chen, L. & Ng, S-L., 2010, In: IEEE Transaction on Vehicular Technology. 59, 3, p. 1503-1505 3 p.

    Research output: Contribution to journalComment/debatepeer-review

  28. Published

    Comments on ``Dynamic Participation in a Secure Conference Scheme for Mobile Communications''.

    Ng, S-L., 2001, In: IEEE Transaction on Vehicular Technology. 50, 1, p. 334-335

    Research output: Contribution to journalComment/debatepeer-review

  29. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Comments on mutual authentication and key exchange protocols for low power wireless communications

    Ng, S-L. & Mitchell, C. J., 2004, In: IEEE Communications Letters. 8, 4, p. 262-263 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  32. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In: Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Commoning mobility: Towards a new politics of mobility transitions

    Nikolaeva, A., Adey, P., Cresswell, T., Jeonjae Lee, J., Novoa, A. & Temenos, C., Jun 2019, In: Transactions of the Institute of British Geographers. 44, 2, p. 346-360 15 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Communicating Afghanistan: Strategic Narratives and the Case of UK Public Opinion

    Jensen, R., 2015, Strategic Narratives, Public Opinion and War: Winning Domestic Support for the Afghan War. de Graaf, B., Dimitriu, G. & Ringsmose, J. (eds.). London: Routledge, p. 300-317 (Contemporary Security Studies).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Community-centric engagement: lessons learned from privacy awareness intervention design

    Coles-Kemp, L. & Ashenden, D., 1 Sep 2012, Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. p. 4:1-4:4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Comparison of dynamic biometrie security characteristics against other biometrics

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  38. Published

    Comparison of Messaging Protocols for Emerging Wireless Networks

    Bagale, J. N., Moore, J. P. T., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C., 2018, (Unpublished) 141 p.

    Research output: ThesisDoctoral Thesis

  40. Published

    Complex Event as an Core Aspect of Enterprise Architecture - EDEMF: Event Driven Enterprise Architecture Modeling Framework

    Kim, H., Oussena, S. & Komisarczuk, P., 2013, ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems, Volume 3, Angers, France, 4-7 July, 2013. p. 292-301 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In: EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Computational and Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2004, Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing, CASC 2004. p. 93-103 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Unpublished

    Computing Functions Securely: Theory, Implementation and Cryptanalysis

    Davidson, A., 2019, (Unpublished) 383 p.

    Research output: ThesisDoctoral Thesis

  44. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In: IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Concurrent Signatures

    Chen, L., Kudla, C. J. & Paterson, K. G., 2004, Proc. Eurocrypt 2004. Cachin, C. & Camenisch, J. (eds.). Springer, p. 287-305 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    Conditional Access in Mobile Systems: Securing the Application

    Gallery, E. & Tomlinson, A., 1 Feb 2005, p. 190-197. 8 p.

    Research output: Contribution to conferencePaper

  47. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In: Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Confidential Signatures and Deterministic Signcryption

    Dent, A. W., Fischlin, M., Maulis, M., Stam, M. & Schroder, D., 2010, Public Key Cryptography -- PKC 2010. Nguyen, P. & Pointcheval, D. (eds.). p. 462-479 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  52. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 313-322 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 105–123 19 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Connectivity, Communications and Technology

    Haggman, A., 7 Dec 2016, International Relations. McGlinchey, S. (ed.). E-International Relations, p. 135-143 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  57. Published

    Conquering Generals: an NP-Hard Proof of Useful Work

    Loe, A. & Quaglia, E., 15 Jun 2018, CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, p. 54-59 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In: Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  59. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In: IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  61. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, (E-pub ahead of print) Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., 6 Aug 2021, arXiv, 19 p.

    Research output: Working paper

  68. Published

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  69. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L. & Law, T. F., 2014, 1st Workshop on Social Network Security (SocialSec 2014) in conjunction with 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2014). Hasan, R. (ed.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Unpublished

    Context Based Anomaly Detection in Critical Infrastructures

    Mcevoy, T. R., 2013, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  72. Published

    Context-aware content-centric collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P. & Clark, T., 2012, Proceedings of the 2nd International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA?12). p. 54-57 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Theory Workshop (AusCTW), 2010 Australian. p. 35-42 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  75. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  76. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review

  79. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  80. Published

    Crime, Regulation and Control During the Blitz: Protecting the Population of Bombed Cities

    Adey, P., Cox, D. J. & Godfrey, B., Mar 2016, Bloomsbury Academic. 272 p. (History of Crime Deviance and Punishment)

    Research output: Book/ReportBook

  81. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, (E-pub ahead of print) In: Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 21-46 26 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Criteria to evaluate Automated Personal Identification Mechanisms

    Palmer, A., 1 Dec 2008, In: Computers and Security. 27, 7-8, p. 260-284 25 p., Palmer:2008:CEA2639520.2639609.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In: Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  88. Unpublished

    Cryptanalysis and Applications of Lattice-based Encryption Schemes

    Curtis, B., 2020, (Unpublished) 220 p.

    Research output: ThesisDoctoral Thesis

  89. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In: IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In: Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In: Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Cryptanalysis of a hybrid authentication protocol for large mobile networks

    Tang, Q. & Mitchell, C. J., Apr 2006, In: Journal of Systems and Software. 79, 4, p. 496-501 6 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Cryptanalysis of a message authentication code due to Cary and Venkatesan

    Blackburn, S. R. & Paterson, K. G., 2004, Fast Software Encryption 2004. Roy, B. & Meier, W. (eds.). Berlin: Springer, p. 446-453 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  96. E-pub ahead of print

    Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y., Sasaki, Y. & Viguier, B., 27 Oct 2018, (E-pub ahead of print) p. 35-64. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  97. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, (E-pub ahead of print) p. 3-31. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  98. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In: IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticlepeer-review

  99. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G., 2016, (Unpublished) 374 p.

    Research output: ThesisDoctoral Thesis

  100. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 12 3 4 5 6 7 8 9 ...22 Next