1. Published

    Security for Mobility

    Mitchell, C. J. (ed.), 2004, IEE Press. 440 p.

    Research output: Book/ReportAnthology

  2. Published

    Security For Video Broadcasting

    Tomlinson, A., 2008, Smart Cards, Tokens, Security and Applications. Springer, p. 139-154 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Security in Swarm Robotics

    Laing, T., Martin, K., Ng, S. & Tomlinson, A., Dec 2015, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. Tan, Y. (ed.). IGI Global, p. 42-66 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In: The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S., Jan 2018, In: Cryptography and Communications. 10, 1, p. 41-58 18 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Security of Open Satellite TV Receivers

    Markantonakis, K., Tunstall, M. & Mayes, K., Sep 2006.

    Research output: Contribution to conferencePaper

  11. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P., Aug 2014, Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, p. 1-19 19 p. (Lecture Notes in Computer Science; vol. 8616).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  16. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Security Server-Based Architecture for Mobile Ad Hoc Networks

    Darwish, S., Taylor, S. J. E. & Ghinea, G., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 926-930 5 p. 6296071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

    Chen, LI. (ed.) & Mitchell, C. J. (ed.), 2014, Springer-Verlag. 257 p. (Lecture Notes in Computer Science; vol. 8893)

    Research output: Book/ReportAnthology

  19. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  20. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  21. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Security vulnerabilities in DNS and DNSSEC

    Ariyapperuma, S. & Mitchell, C. J., 2007, Proceedings of ARES 2007, The International Conference on Availability, Reliability and Security, Vienna, April 2007. IEEE Computer Society Press, p. 335-342 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaperpeer-review

  25. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In: Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  26. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  28. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In: International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Semantic Attestation of Node Integrity in Overlays

    Baiardi, F. & Sgandurra, D., 2010, On the Move to Meaningful Internet Systems: OTM 2010: Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I. Meersman, R., Dillon, T. & Herrero, P. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 656-671 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Separability of very noisy mixed states and implications for NMR quantum computing

    Braunstein, S. L., Caves, C. M., Jozsa, R., Linden, N., Popescu, S. & Schack, R., 1999, In: Physical Review Letters. 83, p. 1054-1057 4 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  38. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  40. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  41. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In: Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Shifts on a finite qubit string: A class of quantum baker's maps

    Schack, R. & Caves, C. M., 2000, In: Applicable Algebra in Engineering, Communication and Computing (AAECC). 10, p. 305-310 6 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  47. Published

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 1 Apr 2020, In: Environment and Planning D: Society and Space. 38, 2, p. 364-382 19 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  49. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In: Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Signcryption schemes based on the RSA problem

    Dent, A. W. & Malone-Lee, J., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 99-120

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. E-pub ahead of print

    Signposts: Cyprus, the UK and the Future of the SBAs

    Dodds, K-J., Jensen, R. & Constantinou, C., 7 Nov 2015, (E-pub ahead of print) In: RUSI Journal. 160, 5, p. 36-45 10 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In: Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticlepeer-review

  53. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, (E-pub ahead of print) Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In: Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance

    Borgen, H., Bours, P. & Wolthusen, S. D., 2 Jun 2009, Third International Conference on Advances in Biometrics (ICB 2009). Springer-Verlag, p. 857-867

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Simulation on a quantum computer

    Schack, R., 2006, In: Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticlepeer-review

  62. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, (E-pub ahead of print) Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  65. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In: IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In: IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In: Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R., 2002, Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384. p. 71-88 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  71. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. E-pub ahead of print

    Slide reduction, revisited—filling the gaps in svp approximation

    Aggarwal, D., Li, J., Nguyen, P. Q. & Stephens-Davidowitz, N., 10 Aug 2020, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 274-295 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Small Scale Variants of the AES

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Fast Software Encryption, 12th International Workshop, FSE 2005. Springer, Vol. 3557. p. 145-162 18 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Smart card based authentication - any future?

    Markantonakis, K., Mayes, K. & Fred, P., 2005, In: Computers and Security. 24, 3, p. 188-191 4 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    Smart card Platform-Fingerprinting: Smart Card Technology International

    Mayes, K., Markantonakis, K. & Chen, C., Oct 2006, Smart Card Technology International: The Global Journal of Advanced Card Technology. Locke, M. (ed.). Smart Card Technology International, p. 78 82 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Piper, F. & Tunstall, M., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  79. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Mobile Robots: The Evolutionary Approach. Nadia, N., Leandro dos Santos, C. & Luiza de Macedo, M. (eds.). Vol. 50. p. 205 237 p. (Studies in Computational Intelligence; vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  81. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 1 Jan 2011, Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    Smart Cards

    Tunstall, M., Markantonakis, K., Sauveron, D. & Mayes, K., 2009, Handbook of Technology Management. Bidgoli, H. (ed.). John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingChapter

  84. Published

    Smart cards and the associated infrastructure problem

    Paterson, K. G., Piper, F. & Robshaw, M., 2002, In: Information Security Technical Report. 7, 3, p. 20-29 10 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Smart Cards for Security and Assurance

    Markantonakis, K., Piper, F. & Mayes, K., 2007, Managing Information Assurance in Financial Services. Information Science Publishing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    Smart Cards, Tokens, Security and Applications

    Mayes, K. & Markantonakis, K., 2010, Springer.

    Research output: Book/ReportBook

  87. Published

    Smart Cards: Communication Protocols and Applications

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Smart Cards: Communication Protocols and Applications.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published
  89. Published

    Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Dec 2013, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). Douligeris, C. & Serpanos, D. (eds.). Athens, Greece: IEEE Computer Science

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Smartphones as a Platform for Advanced Measurement and Processing

    Opperman, C. & Hancke, G., 2012, IEEE Instrumentation and Measurement Technology Conference. IEEE, p. 703 706 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals

    Ibrahim, S., Dec 2016, In: International Journal of Law, Crime and Justice. 47, p. 44-57 14 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Social and Cultural Geographies of Air Transport

    Adey, P. & Lin, W., Jul 2014, The Geographies of Air Transport. Goetz, A. & Budd, L. (eds.). p. 61-72 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  93. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In: Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Some Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., 2004, Advanced Encryption Standard - AES 2004, 4th International Conference. Berlin: Springer, Vol. 3373. p. 58-66 9 p. (Lecture Notes in Computer Science; vol. 3373).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Unpublished

    Some Algorithms for Learning with Errors

    Fitzpatrick, R., 21 Aug 2014, (Unpublished) 167 p.

    Research output: ThesisDoctoral Thesis

  96. Published

    Some New Circuit Codes

    Paterson, K. G. & Tuliani, J., 1998, In: IEEE Transactions on Information Theory. 44, p. 1305-1309 5 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    Some properties of the Yoshiara family of planes.

    Ng, S-L., 2002, In: European Journal of Combinatorics. 23, p. 77-81 5 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  99. Published

    Some Remarks on an Algorithm of Fitzpatrick

    Blackburn, S. R. & Chambers, W. G., 1996, In: IEEE Transactions on Information Theory. 42, 4, p. 1269-1271 3 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Some Remarks on Authentication Systems

    Anthony, M. H. G., Martin, K. M., Seberry, J. & Wild, P. R., 1990, Advances in Cryptology -Auscrypt'90. Springer-Verlag, Vol. 453. p. 122-139 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter