1. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    Risk analysis of Android applications: A user-centric solution

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Sep 2015, In : Future Generation Computer Systems.

    Research output: Contribution to journalArticle

  4. Published

    Risk analysis: Requirements, conflicts and problems

    Ciechanowicz, Z., 1 Jan 1997, In : Computers and Security. 16, 3, p. 223-232 10 p.

    Research output: Contribution to journalArticle

  5. Published

    RGFGA: An efficient representation and crossover for grouping genetic algorithms

    Tucker, A., Crampton, J. & Swift, S., 2005, In : Evolutionary Computation. 13, 4, p. 477-500 24 p.

    Research output: Contribution to journalArticle

  6. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    RFID and Contactless Technology

    Hancke, G., Jan 2008, Smart Cards, Tokens, Security and Applications. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  8. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability

    Dent, A. W. & Tang, Q., 2007, Information Security -- ISC 2007. Garay, J. A., Lenstra, A. K., Mambo, M. & Peralta, R. (eds.). Springer-Verlag, p. 158-174 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Review of work experience in a Bachelor of Information Technology

    Pauling, J. W. & Komisarczuk, P., 2007, Proceedings of the ninth Australasian conference on Computing education-Volume 66. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Reverse Conformal Approach for On-line Experimental Design

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 185-192 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., Oct 2020, p. 471-480. 10 p.

    Research output: Contribution to conferencePaper

  15. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Jun 2014, 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Re-thinking the care of male prisoners who self-harm

    Neave, S., Glorney, E. & Coles-Kemp, L., 19 Jun 2018.

    Research output: Contribution to conferencePaper

  18. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticle

  20. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R., 2016, (Accepted/In press) Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Resilience Analysis of Software-Defined Networks Using Queueing Networks

    Nweke, L. O. & Wolthusen, S. D., 30 Mar 2020, 2020 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Unpublished
  23. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L., 1 Oct 2017, Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., Lanzi, A. A. & Monga, M., 2005, 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Rendering Interior Cultural Heritage Scenes Using Image-Based Shooting

    Happa, J., Bashford-Rogers, T., Debattista, K. & Chalmers, A., 2011, In : Eurographics, Heritage Area Paper.

    Research output: Contribution to journalArticle

  29. Published

    Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N. & Naccache, D., Jun 2019, In : digital investigation. 29, p. 198-209 12 p.

    Research output: Contribution to journalArticle

  30. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Remote Policy Enforcement for Trusted Application Execution in Mobile Environments

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2013, Trusted Systems: 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Bloem, R. & Lipp, P. (eds.). Cham: Springer International Publishing, p. 70-84 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K., 2014, In : International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticle

  33. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticle

  37. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  38. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Relations Among Notions of Plaintext Awareness

    Birkett, J. & Dent, A. W., 2008, Public Key Cryptography -- PKC 2008. Cramer, R. (ed.). Springer-Verlag, p. 47-64 18 p. (Lecture Notes in Computer Science; vol. 4939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  41. Published

    Relating toy models of quantum computation: comprehension, complementarity and dagger autonomous categories

    Pavlovic, D., 2011, In : Electronic Notes in Theoretical Computer Science. 270, 2, p. 121-139 19 p.

    Research output: Contribution to journalArticle

  42. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., Oct 2018, In : Journal of Cryptology. 31, 4, p. 917-964 48 p.

    Research output: Contribution to journalArticle

  43. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2012, In : Journal of Network and Computer Applications. 35, 1, p. 253-267 15 p.

    Research output: Contribution to journalArticle

  47. Published

    Regional Blackouts: Protection of Broadcast Content on 3G Networks

    Dent, A. W. & Tomlinson, A., 1 Oct 2004, p. 442-446. 5 p.

    Research output: Contribution to conferencePaper

  48. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In : Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticle

  49. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths

    Walter, C. D., 2008, CHES 2008. Oswald, E. & Rohatgi, P. (eds.). Springer, Vol. 5154. p. 214-227 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Reconstructing noisy polynomial evaluation in residue rings

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2006, In : J. Algorithms. 61, p. 47-59 13 p.

    Research output: Contribution to journalArticle

  57. Published

    Recent developments in cryptographic hash functions: Security implications and future directions

    Cid, C., 2006, In : Information Security Technical Report. 11, 2, p. 100 - 107 8 p.

    Research output: Contribution to journalArticle

  58. Published

    Realizing the quantum baker's map on a NMR quantum computer

    Brun, T. A. & Schack, R., 1999, In : Physical Review A. 59, p. 2649-2658 10 p.

    Research output: Contribution to journalArticle

  59. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished

    Randomness in Cryptography: Theory Meets Practice

    Hutchinson, D., 23 Feb 2019, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  64. Published

    Randomised Exponentiation Algorithms

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 451-473 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  65. Published

    Quantum-nondemolition measurement of small photon numbers and the preparation of number states

    Schack, R., Breitenbach, A. & Schenzle, A., 1992, In : Physical Review A. 45, p. 3260-3267 8 p.

    Research output: Contribution to journalArticle

  66. Published

    Quantum theory from four of Hardy's axioms

    Schack, R., 2003, In : Foundations of Physics. 33, p. 1461-1468 8 p.

    Research output: Contribution to journalArticle

  67. Published

    Quantum state diffusion, localization and computation

    Schack, R., Brun, T. A. & Percival, I. C., 1995, In : Journal of Physics A: Mathematical and General. 28, p. 5401-5413 13 p.

    Research output: Contribution to journalArticle

  68. Published

    Quantum state diffusion with a moving basis: computing quantum-optical spectra

    Schack, R., Brun, T. A. & Percival, I. C., 1996, In : Physical Review A. 53, p. 2694 1 p.

    Research output: Contribution to journalArticle

  69. Submitted

    Quantum speedups for lattice sieves are tenuous at best

    Gheorghiu, V., Postlethwaite, E. & Schanck, J., 2019, (Submitted)

    Research output: Other contribution

  70. Published

    Quantum probability from decision theory?

    Barnum, H., Caves, C. M., Finkelstein, J., Fuchs, C. A. & Schack, R., 2000, In : Proc. R. Soc. Lond. A. 456, p. 1175-1182 8 p.

    Research output: Contribution to journalArticle

  71. Published

    Quantum probabilities as Bayesian probabilities

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 65, p. 022305 1 p.

    Research output: Contribution to journalArticle

  72. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In : ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  73. Published

    Quantum Cryptography: A Practical Information Security Perspective

    Paterson, K. G., Piper, F. C. & Schack, R., 2007, Quantum Communication and Security. Zukowski, M., Kilin, S. & Kowalik, J. (eds.). IOS Press, p. 175-180 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  74. Published

    Quantum computing with separable states?

    Schack, R., 2001, Macroscopic Quantum Coherence and Quantum Computing. Averin, D. V., Ruggiero, B. & Silvestrini, P. (eds.). New York: Kluwer, p. 285

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Quantum chaos in open systems: a quantum state diffusion analysis

    Brun, T. A., Percival, I. C. & Schack, R., 1996, In : Journal of Physics A: Mathematical and General. 29, p. 2077-2090 14 p.

    Research output: Contribution to journalArticle

  76. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In : Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticle

  77. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In : Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticle

  78. Published

    Quantum and classical structures in nondeterministic computation

    Pavlovic, D., 2009, Proceedings of Quantum Interaction 2009. Bruza, P., Sofge, D. & Rijsbergen, K. V. (eds.). Springer-Verlag, Vol. 5494. p. 143-158 16 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. E-pub ahead of print

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 25 Nov 2019, Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, p. 521-551 31 p. (Lecture Notes in Computer Science; vol. 11921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Quantitative Concept Analysis

    Pavlovic, D., 2012, Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven, Belgium, May 7-10, 2012: Proceedings. Domenach, F., Ignatov, D. I. & Poelmans, J. (eds.). Springer, p. 260-277 18 p. (Lecture Notes in Computer Science; vol. 7278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Quantifying and qualifying trust: Spectral decomposition of trust networks

    Pavlovic, D., 2011, Proceedings of FAST 2010. Degano, P., Etalle, S. & Guttman, J. (eds.). Springer-Verlag, Vol. 6561. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., 2017, In : IACR Cryptology ePrint Archive. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  83. Published

    Quality of Service (QoS) Provisioning in Cognitive Wireless Ad Hoc Networks: Architecture, Open Issues and Design Approaches

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Quality of Service Architectures for Wireless Networks: Performance Metrics and Management. IGI Global, p. 575-594 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  84. Published

    Putting dots in triangles

    Blackburn, S., Paterson, M. & Stinson, D. R., 2011, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 78, p. 23-32

    Research output: Contribution to journalArticle

  85. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In : Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  86. Published

    Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Unpublished

    Public-Key Cryptography with Joint and Related-Key Security

    Thomson, S., 2014, (Unpublished) 192 p.

    Research output: ThesisDoctoral Thesis

  88. Published

    Public-key Cryptography on Smart Cards

    Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K. G. & Sidiropoulos, A., 1996, Cryptography: Policy and Algorithms, Proceedings. Springer, p. 250-269 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In : Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticle

  90. Published

    Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    De Capitani di Vimercati, S. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. 195 p. (Lecture Notes in Computer Science; vol. 7868)

    Research output: Book/ReportBook

  91. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    PsycoTrace: Virtual and Transparent Monitoring of a Process Self

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 1 Feb 2009, 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. p. 393-397 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Proxy Signatures Secure Against Proxy Key Exposure

    Schdult, J. C. N., Matsuura, K. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer, Vol. 4939. p. 344-359 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R., 2017, 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, p. 83-103 21 p. (Security and Cryptology; vol. 10543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In : Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticle

  99. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M., May 2017, (Unpublished) Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  100. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In : ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticle

Previous 12 3 4 5 6 7 8 9 ...21 Next