1. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  3. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In: IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Watching You Watching Me: The Art of Playing the Panopticon

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., 2014, Digital Enlightenment Yearbook 2014: Social Networks and Social Machines, Surveillance and Empowerment. O'Hara, K., Nguyen, C. & Haynes, P. (eds.). IOS Press, p. 147-162 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    War and Remembrance: The Case of Finnish Covert Operations in the First World War

    Haggman, A., 10 Dec 2014, In: Strife Journal. 4, p. 14-20 7 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  10. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R., 27 Jul 2017, In: Journal of Sensors. 2017, p. 1-11 11 p., 3186482.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...209 Next