1. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Zero/positive capacities of two-dimensional runlength constrained arrays

    Etzion, T. & Paterson, K. G., 2005, In : IEEE Transactions on Information Theory. 51, 9, p. 3186-3199 14 p.

    Research output: Contribution to journalArticle

  4. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 9 Nov 2009.

    Research output: Working paper

  7. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In : Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  9. Published
  10. Published
  11. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  12. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In : Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticle

  13. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  14. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Why so serious? Introducing a fun take on cyber war

    Haggman, A., 5 May 2018, New Statesman, 2018, 4-10 May, p. 16-18 3 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  16. Published

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K., 11 Jun 2018, In : Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticle

  17. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  18. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Who needs trust for 5G?

    Mitchell, C. J., 2 May 2020, arXiv.

    Research output: Working paper

  20. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D., 2008, In : ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticle

  21. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., Dec 2012, Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    What Should You Pay to Protect Your Data? The Economics of Cyber Security

    Ertan, A., 9 Mar 2018, Cyber World , March 2018 edition, p. 50-55 6 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  24. Published

    What is trusted computing?

    Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    What Can Identity-Based Cryptography Offer to Web Services?

    Crampton, J., Lim, H. W. & Paterson, K. G., 2007, Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA.. ACM Press, p. 26-36 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In : Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticle

  27. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K., 2010, In : Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticle

  28. Published

    Web-Services Architecture for Pervasive Computing Environment

    Malik, N. A. & Tomlinson, A., 1 Sep 2009, In : Pakistan Journal of Science. 61, 3, p. 153 - 157

    Research output: Contribution to journalArticle

  29. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  33. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In : IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticle

  34. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Watching You Watching Me: The Art of Playing the Panopticon

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., 2014, Digital Enlightenment Yearbook 2014: Social Networks and Social Machines, Surveillance and Empowerment. O'Hara, K., Nguyen, C. & Haynes, P. (eds.). IOS Press, p. 147-162 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    War and Remembrance: The Case of Finnish Covert Operations in the First World War

    Haggman, A., 10 Dec 2014, In : Strife Journal. 4, p. 14-20 7 p.

    Research output: Contribution to journalArticle

  38. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  40. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R., 27 Jul 2017, In : Journal of Sensors. 2017, p. 1-11 11 p., 3186482.

    Research output: Contribution to journalArticle

  41. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Virtual relighting of a Roman statue head from Herculaneum: a case study

    Happa, J., Williams, M., Turley, G., Earl, G. P., Dubla, P., Beale, G., Gibbons, G., Debattista, K. & Chalmers, A., 2009, In : Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticle

  44. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  45. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In : Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticle

  49. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  50. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  51. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D., 2015, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  52. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I., 2017, In : Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticle

  53. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticle

  56. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  57. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  58. Published
  59. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  60. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 2020, In : Frontiers in Energy Research.

    Research output: Contribution to journalArticle

  73. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  75. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In : Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticle

  77. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  79. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In : International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticle

  80. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Usability and Security in EU E-Banking Systems - Towards an Integrated Evaluation Framework

    Moeckel, C., 30 Aug 2011. 4 p.

    Research output: Contribution to conferencePaper

  83. Published

    Updating the parameters of a threshold scheme by minimal broadcast

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In : IEEE Transactions on Information Theory. 51, 2, p. 620-633 14 p.

    Research output: Contribution to journalArticle

  84. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  85. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In : Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticle

  87. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In : International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticle

  88. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  89. Published

    Unknown quantum states: The quantum de Finetti representation

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Journal of Mathematical Physics. 43, p. 4537-4559 23 p.

    Research output: Contribution to journalArticle

  90. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In : Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticle

  94. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Understanding the Value and Potential of Threat Modeling for Application Security Design - An E-Banking Case Study

    Moeckel, C. & Abdallah, A. E., 2011, In : Journal of Information Assurance and Security. 6, 5, p. 346-356 11 p.

    Research output: Contribution to journalArticle

  96. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., Jun 2017, In : IEEE Transactions on Information Forensics and Security . 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticle

  98. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure

    Martin, K. M. & Paterson, M. B., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 143-152 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 3 4 5 6 7 8 ...21 Next