1. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns

    Amorim, R. C. & Komisarczuk, P., 2014, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  9. Published

    Cyber Weapons Don't Go Boom

    Haggman, A., 9 Jun 2015, 1 p. Information Security Group.

    Research output: Other contribution

  10. Published

    Cyber Weapons as a Game Changer: A Critical Reflection

    Haggman, A., 9 Jun 2015, E-International Relations.

    Research output: Other contribution

  11. Unpublished
  12. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  13. Published

    Cyber Security Threats and Challenges in Collaborative Mixed-Reality

    Happa, J., Glencross, M. & Steed, A., 9 Apr 2019, In: Frontiers in ICT. 6, p. 1-20 20 p., 5.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Cyber Security Strategy Wargame

    Haggman, A., 17 Aug 2017.

    Research output: Contribution to conferencePosterpeer-review

  15. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Cyber Security for Small Businesses: A Review Of the Advice

    Agha, D., Rowell, J. & Choudhury, R., 13 Jun 2019.

    Research output: Contribution to conferencePoster

  17. Published

    Cyber Security Education, Qualifications and Training

    Martin, K. M., 2015, Engineering and Technology Reference. IET

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  18. Published

    Cyber security and the Leviathan

    Da Silva, J., May 2022, In: Computers and Security. 116, 102674.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Cyber risks to governance, Part I: Silk Road: resisting and reshaping governance

    Haggman, A., 20 Aug 2015, Strife Blog.

    Research output: Other contribution

  20. Published
  21. Published

    Cyber Deterrence Theory and Practise

    Haggman, A., 5 May 2018, Cyber Security: Power and Technology. Lehto, M. & Neittaanmäki, P. (eds.). 1 ed. Springer International Publishing, Vol. 93. p. 63-81 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  22. E-pub ahead of print

    Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums

    Butler, S., 22 Jun 2021, (E-pub ahead of print) Socio-Technical Aspects in Security and Trust: 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers. Springer, p. 135-153 19 p. (Lecture Notes in Computer Science; vol. 12812).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Cumulative Arrays and Geometric Secret Sharing Schemes

    Jackson, W-A. & Martin, K. M., 1993, Advances in Cryptology: Auscrypt '92. Springer, Vol. 718. p. 48-55 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    Cultural Heritage Predictive Rendering

    Happa, J., Bashford-Rogers, T., Wilkie, A., Artusi, A., Debattista, K. & Chalmers, A., 2012, In: Computer Graphics Forum.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Cryptography in theory and practice: The case of encryption in IPsec

    Paterson, K. G. & Yau, A. K. L., 2006, Eurocrypt 2006. Vaudenay, S. (ed.). Springer, p. 12-29 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In: Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Cryptography from Pairings

    Paterson, K. G., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge University Press, p. 215-251 37 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    Cryptography for mobile security

    Mitchell, C. J., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 3-10 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published
  32. Published

    Cryptography: The Key to Digital Security, How it Works, and Why it Matters

    Martin, K. M., 2020, New York: W.W. Norton. 320 p.

    Research output: Book/ReportBook

  33. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In: Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K., 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing. p. 15-30 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Unpublished

    Cryptographic Security of SSH Encryption Schemes

    Hansen, T., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  37. Published
  38. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Cryptographic enforcement of information flow policies without public information via tree partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 24 Aug 2017, In: Journal of Computer Security. 25, 6, p. 511-535 25 p.

    Research output: Contribution to journalArticlepeer-review

  40. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, (E-pub ahead of print) 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Forthcoming

    Cryptographic controls: the heart of cyber security

    Martin, K., 2018, (Accepted/In press) Handbook of Security Science. Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  43. Published

    CryptoCache: Network caching with confidentiality

    Leguay, J., Paschos, G., Quaglia, E. & Smyth, B., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Crypto Wars 2.0: RHUL Students head to the 3rd inter-CDT workshop in Oxford

    Haggman, A., 29 Jun 2017, RHUL Geopolitics and Security.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  45. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In: IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Cryptanalysis of two cryptosystems based on group actions

    Blackburn, S. R. & Galbraith, S. D., 1999, Advances in Cryptology -- ASIACRYPT '99. Lam, K. Y., Xing, C. & Okamoto, E. (eds.). Berlin: Springer, p. 52-61 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In: Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticlepeer-review

  49. E-pub ahead of print

    Cryptanalysis of the multivariate encryption scheme EFLASH

    Øygarden, M., Felke, P., Raddum, H. & Cid, C., 14 Feb 2020, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2020 - The Cryptographers Track at the RSA Conference 2020, Proceedings. Jarecki, S. (ed.). Springer, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12006 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In: Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Cryptanalysis of the EPBC authenticated encryption mode

    Mitchell, C. J., 2007, Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Springer-Verlag, Vol. 4887. p. 118-128 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G., 2016, (Unpublished) 374 p.

    Research output: ThesisDoctoral Thesis

  53. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In: IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticlepeer-review

  54. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, (E-pub ahead of print) p. 3-31. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  55. E-pub ahead of print

    Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y., Sasaki, Y. & Viguier, B., 27 Oct 2018, (E-pub ahead of print) p. 35-64. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  56. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 1 Dec 2021, (E-pub ahead of print) p. 160-184. 25 p.

    Research output: Contribution to conferencePaperpeer-review

  57. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Cryptanalysis of a message authentication code due to Cary and Venkatesan

    Blackburn, S. R. & Paterson, K. G., 2004, Fast Software Encryption 2004. Roy, B. & Meier, W. (eds.). Berlin: Springer, p. 446-453 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Cryptanalysis of a hybrid authentication protocol for large mobile networks

    Tang, Q. & Mitchell, C. J., Apr 2006, In: Journal of Systems and Software. 79, 4, p. 496-501 6 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In: Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In: Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In: IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticlepeer-review

  64. Unpublished

    Cryptanalysis and Applications of Lattice-based Encryption Schemes

    Curtis, B., 2020, (Unpublished) 220 p.

    Research output: ThesisDoctoral Thesis

  65. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In: Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Criteria to evaluate Automated Personal Identification Mechanisms

    Palmer, A., 1 Dec 2008, In: Computers and Security. 27, 7-8, p. 260-284 25 p., Palmer:2008:CEA2639520.2639609.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 21-46 26 p.

    Research output: Contribution to journalArticlepeer-review

  70. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, (E-pub ahead of print) In: Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    Crime, Regulation and Control During the Blitz: Protecting the Population of Bombed Cities

    Adey, P., Cox, D. J. & Godfrey, B., Mar 2016, Bloomsbury Academic. 272 p. (History of Crime Deviance and Punishment)

    Research output: Book/ReportBook

  73. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  74. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review

  75. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  78. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  79. Published

    Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Theory Workshop (AusCTW), 2010 Australian. p. 35-42 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Context-aware content-centric collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P. & Clark, T., 2012, Proceedings of the 2nd International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA?12). p. 54-57 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Unpublished

    Context Based Anomaly Detection in Critical Infrastructures

    Mcevoy, T. R., 2013, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  82. Published

    Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L. & Law, T. F., 2014, 1st Workshop on Social Network Security (SocialSec 2014) in conjunction with 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2014). Hasan, R. (ed.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Consumer risk perceptions in e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 308-315 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  85. Forthcoming

    Constructing orientable sequences

    Mitchell, C. J. & Wild, P. R., 1 Mar 2022, (Accepted/In press) In: IEEE Transactions on Information Theory. to appear

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, (E-pub ahead of print) Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In: IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  93. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In: Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  95. Published

    Conquering Generals: an NP-Hard Proof of Useful Work

    Loe, A. & Quaglia, E., 15 Jun 2018, CryBlock'18: Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. ACM, p. 54-59 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Connectivity, Communications and Technology

    Haggman, A., 7 Dec 2016, International Relations. McGlinchey, S. (ed.). E-International Relations, p. 135-143 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  97. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 105–123 19 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 313-322 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution