1. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Dynamic access policies for unconditionally secure secret sharing schemes

    Martin, K. M., 2005, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan. IEEE Computer Society Press, p. 61-66

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In : Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticle

  5. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In : J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticle

  9. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Editorial

    Tomlinson, A., 2007, In : Information Security Technical Report. 12, 3, p. 111-112 2 p.

    Research output: Contribution to journalEditorial

  14. Published

    Editorial response: The value of critical Geopolitics & critical security studies

    Robinson, N., Hardy, A. & Wendt, N., 18 Sep 2018, RHUL Geopolitics & Security.

    Research output: Other contribution

  15. Published

    e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies

    Balfe, S. & Paterson, K. G., 2008, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008). Xu, S., Nita-Rotaru, C. & Seifert, J. P. (eds.). ACM, p. 81-92 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Effective maritime cybersecurity regulation – the case for a cyber code

    Hopcraft, R. & Martin, K., 11 Sep 2018, In : Journal of the Indian Ocean Region. 14, 3, p. 354-366 13 p.

    Research output: Contribution to journalSpecial issue

  18. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In : secure Magazine. 1, 9

    Research output: Contribution to journalArticle

  19. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In : Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticle

  20. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, p. 226-229. 4 p.

    Research output: Contribution to conferencePaper

  22. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Efficient Attack Graph Analysis through Approximate Inference

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E., Jul 2017, In : ACM Transactions on Information and System Security. 20, 3, p. 1-30 30 p., 10.

    Research output: Contribution to journalArticle

  24. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  25. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In : Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticle

  26. Published

    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

    Birkett, J., Dent, A. W., Neven, G. & Schuldt, J. C. N., 2007, Information Security and Privacy: 12th Australasian Conference -- ACISP 2007. Pieprzyk, J., Ghodosi, H. & Dawson, E. (eds.). Springer-Verlag, p. 274-292 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticle

  29. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  30. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In : IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticle

  31. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N., 2006, ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaper

  34. Published

    Efficient KEMs with Partial Message Recovery

    Bjørstad, T. E., Dent, A. W. & Smart, N. P., 2007, Cryptography and Coding -- 11th IMA International Conference. Galbraith, S. D. (ed.). Springer-Verlag, p. 233-256 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Efficient key predistribution for grid-based wireless sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., 2008, Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2008, ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    Efficient Secret Sharing without a Mutually Trusted Authority

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Eurocrypt '95. Springer, Vol. 921. p. 183-193 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticle

  42. E-pub ahead of print

    Efficient, XOR-Based, Ideal (t,n)− threshold Schemes

    Chen, L., Laing, T. & Martin, K., 28 Oct 2016, Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052. p. 467-483 17 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Emergency Mobilities

    Adey, P., 25 Jan 2016, In : Mobilities. 11, 1, p. 32-48 17 p.

    Research output: Contribution to journalArticle

  46. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Enabling Fair ML Evaluations for Security

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 8 Oct 2018, p. 2264-2266. 3 p.

    Research output: Contribution to conferencePoster

  48. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In : Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticle

  49. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Butler-Rees, A. & Robinson, N., Nov 2020, In : Emotion, Space and Society. 37, 7 p., 100743.

    Research output: Contribution to journalArticle

  51. E-pub ahead of print

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Encyclopedia of Cyber Warfare

    Springer, P. J. (ed.) & Repel, D., 2017, Encyclopedia of Cyber Warfare. 1 ed. ABC-Clio, p. 51-52 2 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  53. Published

    End-to-end Cryptographic Security Systems for Payments

    Cid, C., Jan 2011, E-finance & Payments Law & Policy newsletter, 5, 01.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  54. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Submitted

    Enhanced Cyber-Physical Security Using Attack-resistant Cyber Nodes and Event-triggered Moving Target Defence

    Mayes, K., Higgins, M. & Teng, F., 24 Oct 2020, (Submitted) In : IET Cyber-Physical Systems: Theory & Applications. 11 p.

    Research output: Contribution to journalArticle

  61. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  63. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaper

  68. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Unpublished

    Enhancing the Security of Centralised and Distributed Payments

    Jayasinghe, D., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  72. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In : ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticle

  76. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In : Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticle

  77. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In : Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticle

  78. Published

    Enumerating Perfect Maps

    Paterson, K. G. & Hoare, P. R., 1995, Cryptography and Coding IV. Farrell, P. G. (ed.). Southend-On-Sea, Essex: Formara Ltd.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  79. Published

    Enumeration of Finite Groups

    Blackburn, S. R., Neumann, P. M. & Venkataraman, G., 2007, Cambridge: Cambridge University Press.

    Research output: Book/ReportBook

  80. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In : Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticle

  81. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  82. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In : Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticle

  83. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P., 2009, In : Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticle

  87. Published

    Estimate All the {LWE, NTRU} Schemes!

    Albrecht, M. R., Curtis, B. R., Deo, A., Davidson, A., Player, R., Postlethwaite, E. W., Virdia, F. & Wunderer, T., 2018, 17 p. Springer.

    Research output: Other contribution

  88. Forthcoming

    Estimating quantum speedups for lattice sieves

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 16 Aug 2020, (Accepted/In press) ASIACRYPT 2020. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Forthcoming

    Estonia: From the Bronze Night to Cybersecurity Pioneers

    Hardy, A. & Robinson, N., 2020, (Accepted/In press) The Routledge Companion to Global Cyber Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In : Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticle

  91. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. E-pub ahead of print

    Evacuated to Death: The Lexicon, Concept, and Practice of Mobility in the Nazi Deportation and Killing Machine

    Searles-Adey, P., 29 Aug 2019, In : Annals of the Association of American Geographers. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  93. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  94. E-pub ahead of print

    Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

    Costache, A., Laine, K. & Player, R., 13 Sep 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Springer, p. 546-565 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  98. Published

    Everyday Cryptography: Fundamental Principles & Applications

    Martin, K., 8 Jun 2017, 2nd ed. Oxford University Press. 720 p.

    Research output: Book/ReportBook

  99. Published

    Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

    Sgandurra, D. & Lupu, E., 8 Feb 2016, In : ACM Computing Surveys. 48, 3, p. 1-38 38 p., 46.

    Research output: Contribution to journalArticle

  100. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H., 2006, Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1...4 5 6 7 8 9 10 11 ...21 Next