1. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In: Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, (E-pub ahead of print) Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Unpublished

    Generic Access Control of Cloud Storage Using Attribute-Based Cryptography

    Xu, Z., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  5. Published

    Geographies of (con)text: language and structure in a digital age

    Thornton, P., 28 Nov 2017, In: Computational Culture: A Journal of Software Studies. Autumn 2017, Issue 6, p. 1-11 11 p.

    Research output: Contribution to journalSpecial issuepeer-review

  6. Published

    Geometric Secret Sharing Schemes and their Duals

    Martin, K. M. & Jackson, W-A., 1994, In: Designs, Codes and Cryptography. 4, p. 83-95 13 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Geometrical contributions to secret sharing theory

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 2004, In: Journal of Geometry. 79, 1-2, p. 102-133 32 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Geometry of abstraction in quantum computation

    Pavlovic, D., 19 Jul 2012, Proceedings of Symposia in Applied Mathematics. Abramsky, S. & Mislove, M. (eds.). AMS, Vol. 71. p. 233-267 (Proceedings of Symposia in Applied Mathematics; vol. 71).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Gesture recognition implemented on a personal limited device

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    Glamdring: Automatic Application Partitioning for Intel SGX

    Lind, J., Priebe, C., Muthukumaran, D., O'Keeffe, D., Aublin, P-L., Kelbert, F., Reiher, T., Goltzsche, D., Eyers, D. M., Kapitza, R., Fetzer, C. & Pietzuch, P. R., 2017, Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC ’17). USENIX, p. 285-298 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Golay Complementary Sequences

    Parker, M. G., Tellambura, C. & Paterson, K. G., 2003, Wiley Encyclopedia of Telecommunications. Proakis, J. G. (ed.). Wiley-Interscience

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    Governing Emergencies: Beyond Exceptionality

    Adey, P., Anderson, B. & Graham, S., 1 Mar 2015, In: Theory, Culture and Society. 32, 2, p. 3-17 15 p.

    Research output: Contribution to journalEditorialpeer-review

  14. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Grammar-based transformations: Attack and Defence

    Repel, D. & Stengel, I., 25 Jun 2014, In: Information and Computer Security . 22, 2, p. 141-154

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Graphical user interfaces in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, 4th International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2013, San Francisco, CA, USA, May 20, 2013. p. 25-28 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K., Oct 2016, In: Designs, Codes and Cryptography. 81, 1, p. 11-34 24 p.

    Research output: Contribution to journalArticlepeer-review

  19. E-pub ahead of print

    Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification

    Hurley-Smith, D. & Hernandez-Castro, J., 21 Nov 2018, (E-pub ahead of print) 4th International Conference on Research in Security Standardisation: SSR 2018. Cremers, C. & Lehmann, A. (eds.). Springer, p. 143-163 21 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Grid Enabled Internet Instruments

    Komisarczuk, P., Seifert, C. & Pemberton, D., 2007, Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. p. 1906-1911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Group communication: Design challenges in the development of key management frameworks in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2005, Proceedings of Security & Management (SAM '05), Las Vegas. p. 385-391 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In: Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Groups of prime power order with derived subgroup of prime order

    Blackburn, S. R., 1999, In: Journal of Algebra. 219, p. 625-657 33 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Grupos de Bieberbach Metabelianos com Quociente Derivado Finito

    Cid, C., 14 Jul 1999, 90 p.

    Research output: ThesisDoctoral Thesis

  27. Forthcoming

    Handbook of Mobilities

    Adey, P. (ed.), Bissell, D. (ed.), Hannam, K. (ed.), Merriman, P. (ed.) & Sheller, M. (ed.), 2013, (Accepted/In press) London: Routledge.

    Research output: Book/ReportAnthology

  28. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In: IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli

    Auerbach, B. & Poettering, B., 2018, p. 403-430. 28 p.

    Research output: Contribution to conferencePaperpeer-review

  30. Published

    HB-MP+ Protocol: An Improvement on the HB-MP Protocol

    Leng, X., Mayes, K. & Markantonakis, K., 1 Apr 2008, In: IEEE International Conference on RFID -- IEEE RFID 2008. p. 118-124 7 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Hearing attacks in network data: An effectiveness study

    Axon, L., Happa, J., Goldsmith, M. & Creese, S., Jun 2019, In: Computers and Security. 83, p. 367-388 22 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Hidden pairings and trapdoor DDH groups

    Dent, A. W. & Galbraith, S. D., 2006, Algorithmic Number Theory: 7th International Symposium (ANTS VII). Hess, F., Pauli, S. & Pohst, M. (eds.). Springer-Verlag, p. 436-451 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    Hierarchical, model-based risk management of critical infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, In: Reliability Engineering & System Safety. 94, 9, p. 1403 - 1415

    Research output: Contribution to journalArticlepeer-review

  37. Published

    High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology

    Happa, J., Artusi, A., Czanner, S. & Chalmers, A., 2010, In: Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Intelligent Cultural Heritage. p. 17-24 8 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, (E-pub ahead of print) p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  40. Published

    Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks

    Khan, H., Dowling, B. & Martin, K., 6 Sep 2018, p. 1064-1069. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  41. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In: Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Holding on to dissensus: Participatory interactions in security design

    Heath, C., Hall, P. & Coles-Kemp, L., 2018, In: Strategic Design Research Journal. 11, 2, p. 65-78 14 p.

    Research output: Contribution to journalSpecial issuepeer-review

  44. Published

    Honeycomb arrays

    Blackburn, S. R., Panoui, A., Paterson, M. B. & Stinson, D. R., 2010, In: The Electronic Journal of Combinatorics. 17, R172, p. 1 1 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Honeyc-the low-interaction client honeypot

    Seifert, C., Welch, I. & Komisarczuk, P., 2007, In: Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K., Nov 2018, In: Wireless Networks. 24, 8, p. 3009–3027 19 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Host mobility protocol for secure group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2007, Proceedings of 2007 International Conference on Future Generation Communication and Networking (FGCN 2007). IEEE Computer Society Press, p. 100-107

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Unpublished
  50. Published

    How not to secure wireless sensor networks: A plethora of insecure polynomial-based key pre-distribution schemes

    Mitchell, C. J., 23 Mar 2021, In: IET Information Security . 15, 3, p. 223-230 8 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published
  52. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published
  56. Published

    How to stay in.eu: A post-Brexit gift from Estonia and an evening inside its Embassy

    Hardy, A., Robinson, N. & Haggman, A., 18 Nov 2016, RHUL Geopolitics & Security.

    Research output: Other contribution

  57. Published

    Human-Computer Interaction for Security Research: The Case of EU E-Banking Systems

    Moeckel, C. & Faulkner, X., 5 Sep 2011, p. 406-409. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  58. Published

    Hybrid cryptography

    Dent, A. W., 2004, In: Cryptology ePrint Archive: Report. 2004/210

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Hybrid Encryption in a Multi-user Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B., 2018, p. 159-189. 31 p.

    Research output: Contribution to conferencePaperpeer-review

  60. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Hybrid signcryption schemes with insider security

    Dent, A. W., 2005, Information Security and Privacy: 10th Australasian Conference -- ACISP 2005. Boyd, C. & Nieto, J. M. G. (eds.). Springer-Verlag, p. 253-266 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  62. Published

    Hybrid signcryption schemes with outsider security

    Dent, A. W., 2005, Information Security: 8th International Conference -- ISC 2005. Zhou, J., Lopez, J., Deng, R. H. & Bao, F. (eds.). Springer-Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In: Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In: Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In: Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In: Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Ideal secret sharing schemes with multipartite access structures.

    Ng, S-L., 2006, In: IEE Proceedings on Communications. 153, 2, p. 165-168 4 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    Ideal Secret Sharing Schemes with Multiple Secrets

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Journal of Cryptology. 9, 6, p. 233-250 18 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published
  80. E-pub ahead of print

    Identity Confidentiality in 5G Mobile Telephony Systems

    Khan, H., Dowling, B. & Martin, K., 21 Nov 2018, (E-pub ahead of print) Security Standardisation Research: 4th International Conference, SSR 2018. Cremer, C. & Lehmann, A. (eds.). Switzerland: Springer, [Cham], p. 120-142 23 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  81. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H., 2010, In: Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Identity theft and reconstruction

    Ciechanowicz, C., 1 May 2010, In: Information Security Technical Report. 15, 2, p. 41

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K., 2011, In: International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K. G., 2005, Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005). Stockinger, H., Buyya, R. & Perrott, R. (eds.). IEEE Computer Society Press, p. 395-404 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  85. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G. & Smart, N. P., 2006, Automata, Languages and Programming (2) -- ICALP 2006. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I. (eds.). Springer-Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    Identity-based traitor tracing

    Abdalla, M., Dent, A. W., Malone-Lee, J., Neven, G., Phan, D. H. & Smart, N. P., 2007, Public Key Cryptography -- PKC 2007. Okamoto, T. & Wang, X. (eds.). Springer-Verlag, p. 458-476 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    Illuminating the Past: State of the Art

    Happa, J., Mudge, M., Debattista, K., Artusi, A., Gonçalves, A. & Chalmers, A., 2010, In: Virtual Reality. 14, 3, p. 155-182 28 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2008, SCN. Ostrovsky, R., Prisco, R. D. & Visconti, I. (eds.). Springer, Vol. 5229. p. 340-357 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Implementation of Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., Nov 2006.

    Research output: Contribution to conferencePaperpeer-review

  91. Published

    Implementing a Secure Log File Download Manager for the Java Card

    Markantonakis, K. & Xenitellis, S., 1999, Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. Kluwer, B.V., p. 143-162 20 p. (CMS '99).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  92. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  95. Published

    Implementing RLWE-based Schemes Using an RSA Co-Processor

    Albrecht, M., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F. & Wallner, A., 14 Oct 2018, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Ruhr University of Bochum, Vol. 2019, Issue 1.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  96. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Impressions from a Talk on the Dark Web

    Davidson, A. & Haggman, A., 16 Feb 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  98. Published

    Imprimitive permutation groups and trapdoors in iterated block ciphers

    Paterson, K. G., 1999, Proceedings, Fast Software Encryption Workshop. Knudsen, L. R. (ed.). Springer, p. 201-214 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  99. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, (E-pub ahead of print) Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In: IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...6 7 8 9 10 11 12 13 ...22 Next