1. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In: Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P., 2018, In: GeoHumanities. 4, 2, p. 417-437 21 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In: Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In: Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 3 4 5 6 7 8 ...209 Next