Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, CRYPTO 2017: Advances in Cryptology – CRYPTO 2017.Springer, p. 682-71029 p. (Lecture Notes in Computer Science; vol. 10403).
Research output: Chapter in Book/Report/Conference proceeding › Chapter
Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings.Springer, p. 429-44719 p.
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-518 p.
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Zhang, Q., Markantonakis, K. & Mayes, K., 2006, In: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on.0, p. 201 p.
Research output: Contribution to journal › Article › peer-review
Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016.Springer-Verlag, p. 173-18412 p. (Lecture Notes in Computer Science).
Research output: Chapter in Book/Report/Conference proceeding › Chapter
Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 2012, Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Mitchell, C. J. & Tomlinson, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 67-8216 p.
Research output: Chapter in Book/Report/Conference proceeding › Chapter