1. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In : Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticle

  2. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K., 2010, In : Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticle

  3. Published

    Web-Services Architecture for Pervasive Computing Environment

    Malik, N. A. & Tomlinson, A., 1 Sep 2009, In : Pakistan Journal of Science. 61, 3, p. 153 - 157

    Research output: Contribution to journalArticle

  4. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  8. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In : IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticle

  9. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Watching You Watching Me: The Art of Playing the Panopticon

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., 2014, Digital Enlightenment Yearbook 2014: Social Networks and Social Machines, Surveillance and Empowerment. O'Hara, K., Nguyen, C. & Haynes, P. (eds.). IOS Press, p. 147-162 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    War and Remembrance: The Case of Finnish Covert Operations in the First World War

    Haggman, A., 10 Dec 2014, In : Strife Journal. 4, p. 14-20 7 p.

    Research output: Contribution to journalArticle

  13. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  15. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R., 27 Jul 2017, In : Journal of Sensors. 2017, p. 1-11 11 p., 3186482.

    Research output: Contribution to journalArticle

  16. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Virtual relighting of a Roman statue head from Herculaneum: a case study

    Happa, J., Williams, M., Turley, G., Earl, G. P., Dubla, P., Beale, G., Gibbons, G., Debattista, K. & Chalmers, A., 2009, In : Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticle

  19. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  20. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In : Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticle

  24. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  25. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

Previous 1 2 3 4 5 6 7 8 ...83 Next