1. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  4. Published

    Parameterized Complexity of the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gutin, Z. & Wahlstrom, M., 2017, Combinatorial Optimization and Graph Algorithms. Fukunaga, T. & Kawarabayashi, K. (eds.). Springer-Verlag, p. 101-120 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Unpublished

    Parameter selection in lattice-based cryptography

    Player, R., 2018, (Unpublished)

    Research output: ThesisDoctoral Thesis

  6. Published

    Pancake: Frequency Smoothing for Encrypted Data Stores

    Grubbs, P., Khandelwal, A., Lacharite, M-S., Brown, L., Li, L., Agarwal, R. & Ristenpart, T., Aug 2020, 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, p. 2451-2468 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Pairings for Cryptographers

    Galbraith, S. D., Paterson, K. G. & Smart, N. P., 2008, In : Discrete Applied Mathematics. 156, p. 3113-3121.

    Research output: Contribution to journalArticle

  10. Published

    Pairing 2008

    Galbraith, S. D. (ed.) & Paterson, K. G. (ed.), 2008, Springer. (Lecture Notes in Computer Science)

    Research output: Book/ReportBook

  11. Published

    Padding Oracle Attacks on the ISO CBC Mode Encryption Standard

    Paterson, K. G. & Yau, A., 2004, Proc. CT-RSA04. Okamoto, T. (ed.). Springer, p. 305-323 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    Padding oracle attacks on CBC-mode encryption with random and secret IVs

    Yau, A. K. L., Paterson, K. G. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer, p. 299-319 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Overpromised or Underdelivered?: Evaluating the Performance of Australia's National Cyber Security Strategy

    Haggman, A., 9 Nov 2017, Asia Pacific Security Magazine, November/December 2017, p. 10 11 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  15. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Orthogonal Sequences of Polynomials over Arbitrary Fields

    Blackburn, S. R., 1998, In : Journal of Number Theory. 68, 1, p. 99-111 13 p.

    Research output: Contribution to journalArticle

  19. Published

    Orientable Sequences

    Martin, K. M., Dai, Z. D., Robshaw, M. J. B. & Wild, P. R., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 97-115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Orbit-homogeneity in permutation groups

    Cameron, P. J. & Dent, A. W., 2006, In : Bulletin of the London Mathematical Society. 38, 4, p. 587-596 10 p.

    Research output: Contribution to journalArticle

  22. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Optimal updating of ideal threshold schemes

    Martin, K. M., Barwick, S. G., Jackson, W-A. & O'Keefe, C. M., 2006, In : Australasian Journal of Combinatorics. 36, p. 123-132 10 p.

    Research output: Contribution to journalArticle

  24. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Optimal Parameters for Fully On-Line Arithmetic

    Walter, C. D., 1995, In : International J. of Computer Mathematics. 56, p. 11-18 8 p.

    Research output: Contribution to journalArticle

  26. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Optimal linear perfect hash families

    Blackburn, S. R. & Wild, P. R., 1998, In : Journal of Combinatorial Theory, Series A. 83, p. 233-250 18 p.

    Research output: Contribution to journalArticle

  28. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Forthcoming

    Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

    Crampton, J., Farley, N., Gutin, G. & Jones, M., 2015, (Accepted/In press) 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy: DBSec 2015. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    One-to-one correspondence between slowly decaying interfacial profiles and reflectivity

    Dietrich, S. & Schack, R., 1987, In : Physical Review Letters. 58, p. 140-143 4 p.

    Research output: Contribution to journalArticle

  33. Published

    One-time-password-authenticated key exchange

    Paterson, K. G. & Stebila, D., 2010, ACISP. Steinfeld, R. & Hawkes, P. (eds.). Springer, p. 264-281 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In : IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticle

  35. Published

    One-round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2009, In : International Journal of Applied Cryptography. 1, 3, p. 181-199 19 p.

    Research output: Contribution to journalArticle

  36. Published

    One leak will sink a ship: WebRTC IP address leaks

    Al-Fannah, N. M., 7 Dec 2017, p. 1-5. 5 p.

    Research output: Contribution to conferencePaper

  37. Forthcoming

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 30 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  38. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C., Oct 2015, In : Journal of Cryptology. 28, p. 769–795 27 p.

    Research output: Contribution to journalArticle

  40. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Unpublished

    On Using the System Management Mode for Security Purposes

    Rodrigues De Souza, W. A., 2017, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  42. Published

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M., Oct 2016, In : ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p., 8.

    Research output: Contribution to journalArticle

  43. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints

    Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2015, (Accepted/In press) 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Unpublished

    On the Verification of Computation and Data Retrievability

    Janson, C., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  45. Published

    On the value of threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Oct 2002, In : Operating Systems Review. 36, 4, p. 30-35 6 p.

    Research output: Contribution to journalArticle

  46. Unpublished

    On the use of Attribute-based Encryption in Publicly Verifiable Outsourced Computation

    Alderman, J., 2016, (Unpublished) 277 p.

    Research output: ThesisDoctoral Thesis

  47. Published

    On the unbearable lightness of FIPS 140-2 randomness tests

    Hurley-Smith, D., Patsakis, C. & Hernandez-Castro, J., 17 Apr 2020, In : IEEE Transactions on Information Forensics and Security . p. 1-13 13 p.

    Research output: Contribution to journalArticle

  48. Unpublished

    On the theory of point-weight designs

    Dent, A. W., 2001, (Unpublished)

    Research output: ThesisDoctoral Thesis

  49. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    On the Security of RC4 in TLS

    Alfardan, N., Bernstein, D. J., Paterson, K., Poettering, B. & Schuldt, J., Aug 2013, USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter

  52. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    On the Security of 2-Key Triple DES

    Mitchell, C. J., Nov 2016, In : IEEE Transactions on Information Theory. 62, 11, p. 6260-6267 8 p.

    Research output: Contribution to journalArticle

  54. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 1 Dec 2010, In : International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticle

  55. Unpublished

    ON THE SECURITY AND PERFORMANCE OF MOBILE DEVICES IN TRANSPORT TICKETING

    Umar, A., 2018, (Unpublished) 161 p.

    Research output: ThesisDoctoral Thesis

  56. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Unpublished
  58. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups.

    Paterson, K. G. & Srinivasan, S., 2009, In : Designs, Codes and Cryptography. 52, p. 219-241 23 p.

    Research output: Contribution to journalArticle

  60. Published

    On the relation between the MXL family of algorithms and Groebner basis algorithms

    Albrecht, M., Cid, C., Faugere, J-C. & Perret, L., Aug 2012, In : Journal of Symbolic Computation. 47, 8, p. 926-941 16 p.

    Research output: Contribution to journalArticle

  61. Published

    On the potential of high density smart cards

    Mayes, K. E. & Markantonakis, K., 2006, In : Information Security Technical Report. 11, 3, p. 147 - 153

    Research output: Contribution to journalArticle

  62. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Yeo, A., Jun 2013, In : ACM Transactions on Information and System Security. 16, 1, 4.

    Research output: Contribution to journalArticle

  65. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B., 2017, p. 519-534. 16 p.

    Research output: Contribution to conferencePaper

  66. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A., Jan 2017, In : Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  67. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification

    Blasco, J. & Peris-Lopez, P., 24 Aug 2018, In : Sensors (Switzerland). 18, 9, p. 1-20 20 p., 2782.

    Research output: Contribution to journalArticle

  74. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    On the Existence of de Bruijn Tori with Two by Two Windows

    Hurlbert, G., Mitchell, C. J. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 213-230 18 p.

    Research output: Contribution to journalArticle

  77. Published

    On the existence and construction of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2000, In : IEEE Transactions on Information Theory. 46, 6, p. 1974-1987 14 p.

    Research output: Contribution to journalArticle

  78. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaper

  79. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    ON THE DISTRIBUTION OF THE SUBSET SUM PSEUDORANDOM NUMBER GENERATOR ON ELLIPTIC CURVES

    Blackburn, S. R., Ostafe, A. & Shparlinski, I. E., 2011, In : Uniform Distribution Theory. 6, 1, p. 127-142 16 p.

    Research output: Contribution to journalArticle

  81. Unpublished

    On the Design and Implementation of Secure Network Protocols

    Alfardan, N., 2014, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  82. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In : Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticle

  83. Published

    On the composition of matroids and ideal secret sharing schemes.

    Ng, S-L. & Walker, M., 2001, In : Designs, Codes and Cryptography. 24, p. 49-67

    Research output: Contribution to journalArticle

  84. Published

    On the complexity of the BKW algorithm on LWE

    Albrecht, M., Cid, C., Faugere, J-C., Fitzpatrick, R. & Perret, L., Feb 2015, In : Designs, Codes and Cryptography. 74, 2, p. 325-354 30 p.

    Research output: Contribution to journalArticle

  85. Published

    On the average energy of circulant graphs

    Blackburn, S. R. & Shparlinski, I. E., 2008, In : Linear Algebra and Its Applications. 428, p. 1956-1963 8 p.

    Research output: Contribution to journalArticle

  86. Published

    On the applicability of combinatorial designs to key predistribution for wireless sensor networks

    Martin, K. M., 2009, Coding and Cryptology (IWCC2009). Springer, Vol. 5557. p. 124-145 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    On the (In)security of Two Buyer-Seller Watermarking Protocols

    Martin, K. M. & Poh, G. S., 2008, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29. INSTICC Press, p. 253-260 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    On Sharing Many Secrets

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Asiacrypt '94, Lecture Notes in Computer Science. Springer, Vol. 917. p. 42-54 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  93. Unpublished

    On sequences and arrays with specific window properties

    Paterson, K. G., 1993, (Unpublished)

    Research output: ThesisDoctoral Thesis

  94. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    On Recovering Affine Encodings in White-Box Implementations

    Derbez, P., Fouque, P-A., Lambin, B. & Minaud, B., 14 Aug 2018, In : TCHES. 2018, 3, p. 121-149 29 p.

    Research output: Contribution to journalArticle

  96. Published

    On quantum statistics in data analysis

    Pavlovic, D., 2008, Quantum Interaction 2008. Bruza, P. (ed.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    On partitional clustering of malware

    de Amorim, R. C. & Komisarczuk, P., 2012, Cyberpatterns 2012. p. 47-51 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    On parameter selection for server-aided RSA computation schemes

    Burns, J. & Mitchell, C. J., 1994, In : IEEE Transactions on Computers. 43, 2, p. 163-174 12 p.

    Research output: Contribution to journalArticle

  100. Published

    On multi-channel MAC protocols in cognitive radio networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 300-305 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...21 Next