1. Published

    Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Unpublished

    Public-Key Cryptography with Joint and Related-Key Security

    Thomson, S., 2014, (Unpublished) 192 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    Public-key Cryptography on Smart Cards

    Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K. G. & Sidiropoulos, A., 1996, Cryptography: Policy and Algorithms, Proceedings. Springer, p. 250-269 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In: Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    De Capitani di Vimercati, S. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. 195 p. (Lecture Notes in Computer Science; vol. 7868)

    Research output: Book/ReportBook

  6. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Proxy Signatures Secure Against Proxy Key Exposure

    Schdult, J. C. N., Matsuura, K. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer, Vol. 4939. p. 344-359 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In: Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticlepeer-review

  14. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M., May 2017, (Unpublished) Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  15. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In: ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Provably insecure group authentication: Not all security proofs are what they claim to be

    Mitchell, C. J., 3 Apr 2021, Security and Privacy: Select Proceedings of ICSP 2020. Stănică, P., Gangopadhyay, S. & Debnath, S. K. (eds.). Singapore: Springer-Verlag, p. 151-162 12 p. (LNEE; vol. 744).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Unpublished

    Provable Security in the Real World: New Attacks and Analyses

    Woodage, J., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  19. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G., 2011, In: IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Protocols and cryptography

    Ciechanowicz, C., 1 Feb 2010, In: Information Security Technical Report. 15, 1, p. 1

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Protection of Downloadable Software on SDR Devices

    Gallery, E. & Tomlinson, A., 1 Nov 2005.

    Research output: Contribution to conferencePaper

  22. E-pub ahead of print

    Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

    Fraser, A. & Quaglia, E., 8 Oct 2020, (E-pub ahead of print) SAC 2020 proceedings. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Properties of the frequency operator do not imply the quantum probability postulate

    Caves, C. M. & Schack, R., 2005, In: Ann. Phys.. 315, p. 123-146 24 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Properties of the Error Linear Complexity Spectrum

    Etzion, T., Kalouptsidis, N., Kolokotronis, N., Limniotis, K. & Paterson, K. G., 2009, In: IEEE Transactions on Information Theory. 55, 10, p. 4681-4686 6 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Proofs of security for ECIES

    Dent, A. W., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge: Cambridge University Press, p. 41-66 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Prolific codes with the identifiable parent property

    Blackburn, S. R., Etzion, T. & Ng, S-L., 2008, In: SIAM Journal on Discrete Mathematics. 22, 4, p. 1393-1410 18 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C., Aug 2013, CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042. p. 513-530 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Products of subsets in an abelian group

    Blackburn, S. R. & Spencer, A. J., 2003, In: Journal of Combinatorial Theory, Series A. 103, p. 53-68 16 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

    Da Silva, J., Feb 2021, In: Methodological Innovations.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  31. Published
  32. Published

    Problems and prospects of multi application smart cards in the UK financial industry

    Markantonakis, K. & Mayes, K., 2007, In: Icebe 2007: ieee international conference on e-Business engineering, proceedings. p. 447-452 6 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Probabilistic Naming of Functions in Stripped Binaries

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Dec 2020, Proceedings - 36th Annual Computer Security Applications Conference, ACSAC 2020. Association for Computing Machinery, Inc, p. 373-385 13 p. 3427265. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Probabilistic Contract Compliance for Mobile Applications

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 1 Sep 2013, 2013 International Conference on Availability, Reliability and Security. p. 599-606 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. & Ng, S., Jul 2017, In: IET Information Security . 11, 4, p. 204-210 7 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J., 7 Apr 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 75-90 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  39. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  40. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, (E-pub ahead of print) In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Privacy-preserving biometric matching using homomorphic encryption

    Pradel, G. & Mitchell, C., 22 Oct 2021, Proceedings: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2021, Shenyang, China. Zhao, L., Kumar, N., Hsu, R. C. & Zou, Z. (eds.). Los Alamitos: IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  43. Published

    Privacy-aware location database service for granular queries

    Kiyomoto, S., Martin, K. M. & Fukushima, K., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 28-37 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Published

    Privacy, compliance and the cloud

    Mitchell, C. J., 9 Mar 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, p. 3-14 12 p. (» Computer Communications and Networks).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Privacy Threats in a Mobile Enterprise Social Network

    Tomlinson, A., Yau, P-W. & MacDonald, J. A., 1 May 2010, In: Information Security Technical Report. 15, 2, p. 57 - 66

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 2018, In: Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Privacy in identity and access management systems

    Pashalidis, A. & Mitchell, C. J., 2012, Digital Identity and Access Management: Technologies and Frameworks. Sharman, R., Smith, S. D. & Gupta, M. (eds.). IGI Global, p. 316-328

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Privacy and Consent in Pervasive Networks

    Malik, N. A. & Tomlinson, A., 1 Aug 2009, In: Information Security Technical Report. 14, 3, p. 138 - 142

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Massimo, J., Paterson, K. & Somorovsky, J., 8 Oct 2018, CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Preserving Privacy in Assistive Technologies

    Goo, S. K., Irvine, J. M., Andonovic, I. & Tomlinson, A., 1 Jun 2009, p. 110 - 115.

    Research output: Contribution to conferencePaper

  56. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Preparation information and optimal decompositions for mixed quantum states

    Soklakov, A. N. & Schack, R., 2000, In: J. Mod. Opt.. 47, p. 2265-2276 12 p.

    Research output: Contribution to journalArticlepeer-review

  58. E-pub ahead of print

    Prenatal and perinatal risk and protective factors for psychosis: a systematic review and meta-analysis

    Davies, C., Segre, G., Estradé, A., Radua, J., De Micheli, A., Provenzani, U., Oliver, D., Salazar de Pablo, G., Ramella-Cravaro, V., Besozzi, M., Dazzan, P., Miele, M., Caputo, G., Spallarossa, C., Crossland, G., Ilyas, A., Spada, G., Politi, P., Murray, R., McGuire, P. & 1 others, Fusar-Poli, P., 24 Mar 2020, (E-pub ahead of print) In: The Lancet Psychiatry. p. 1-12 12 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Predicting the inversive generator

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2003, Cryptography and Coding. Proc. 9th IMA Intern. Conf on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer, p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Published

    Predicting nonlinear pseudorandom number generators

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2005, In: Math. Comp.. 74, p. 1471-1494 24 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Precise Bounds for Montgomery Modular Multiplication and some Potentially Insecure RSA Moduli

    Walter, C. D., 2002, CT-RSA 2002. Preneel, B. (ed.). Springer, Vol. 2271. p. 30-39 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Practical solutions to key escrow and regulatory aspects

    Jefferies, N., Mitchell, C. J. & Walker, M., 1996, Proceedings of Public Key Solutions '96, Zurich, Switzerland, September/October 1996.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Practical Signcryption

    Dent, A. W. (ed.) & Zheng, Y. (ed.), 2010, Springer-Verlag.

    Research output: Book/ReportBook

  66. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Practical eavesdropping and skimming attacks on high-frequency RFID tokens

    Hancke, G., 2011, In: Journal of Computer Security. p. 259 288 p.

    Research output: Contribution to journalArticlepeer-review

  69. Unpublished

    Practical Dynamic Symbolic Execution for JavaScript

    Loring, B., 16 Mar 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  70. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  72. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In: Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticlepeer-review

  75. Unpublished
  76. Published

    'Pour votre tranquillité': Ambiance, atmosphere, and surveillance

    Adey, P., Brayer, L., Masson, D., Murphy, P., Simpson, P. & Tixier, N., Oct 2013, In: Geoforum. 49, p. 299-309 11 p.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Unpublished

    Post-Quantum Cryptography: Cryptanalysis and Implementation

    Virdia, F., 2021, (Unpublished) 256 p.

    Research output: ThesisDoctoral Thesis

  80. Published

    Post-Quantum Certificates for Electronic Travel Documents

    Pradel, G. & Mitchell, C. J., 24 Dec 2020, Proceedings of DETIPS 2020 (Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy), September 18 2020. Springer, p. 56-73 18 p. (Lecture Notes in Computer Science; vol. 12580).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In: Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Posets and protocols - picking the right three-party protocol.

    Ng, S-L., 2003, In: IEEE Journal on Selected Areas in Communications. 21, 1, p. 55-61 6 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Polly Cracker, revisited

    Albrecht, M., Faugere, J-C., Farshim, P., Herold, G. & Perret, L., May 2016, In: Designs, Codes and Cryptography. 79, 2, p. 261-302 42 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Policy enforcement system for secure interoperable control in distributed Smart Grid systems

    Alcaraz, C., Lopez, J. & Wolthusen, S., 1 Jan 2016, In: Journal of Network and Computer Applications. 59, p. 301-314 14 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013. London, UK, April 8-9, 2013. Proceedings

    Fischer-Hübner, S. (ed.), de Leeuw, E. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. (IFIP Advances in Information and Communications Technology; no. 396)

    Research output: Book/ReportAnthology

  86. Published

    Point-weight designs with design conditions on t points

    Dent, A. W., 2008, In: Discrete Mathematics. 308, 11, p. 2080-2093 14 p.

    Research output: Contribution to journalArticlepeer-review

  87. Unpublished

    Platform Verification and Secure Program Execution in Embedded Devices

    Msgna, M., 2016, (Unpublished) 184 p.

    Research output: ThesisDoctoral Thesis

  88. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In: Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    PKI revisited - current issues and future trends

    Price, G. (ed.), Piper, F. (ed.) & Paterson, K. G. (ed.), 2003, Unkown Publisher. (Information Security Technical Report)

    Research output: Book/ReportBook

  94. Published

    PKI implementation issues in B2B e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2003, EICAR Conference Best Paper Proceedings, Copenhagen, Denmark, May 2003. Gattiker, U. E. (ed.). 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    PKI Challenges: An industry analysis

    Price, G., 2005, Applied Public Key Infrastructure 4th International Workshop: IWAP 2005, Singapore. 21-23 Sept 2005. Zhou, J., Kang, M-C., Bao, F. & Pang, H-H. (eds.). IOS Press, (FAIA).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Unpublished

    PKI - An Insider's View (Extended Abstract)

    Price, G., 2005, (Unpublished).

    Research output: Working paper

  97. Published

    Pioneering advanced mobile privacy and security

    Hulsebosch, R. J., Gunther, C., Horn, G., Holtmanns, S., Howker, K., Paterson, K. G., Claessens, J. & Schuba., M., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 383-432 50 p. (IEE Telecommunications Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. E-pub ahead of print

    Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S., 22 Apr 2016, (E-pub ahead of print) International Journal of Human Rights and Constitutional Studies. 1 ed. Inderscience, Vol. 4. p. 54-74 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  100. E-pub ahead of print

    Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

    Shepherd, C., Markantonakis, K., Van Heijningen, N., Aboulkassimi, D., Gaine, C., Heckmann, T. & Naccache, D., 17 Sep 2021, (E-pub ahead of print) In: Computers and Security. 102471.

    Research output: Contribution to journalArticlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...22 Next