1. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2009, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    An online secret sharing scheme which identifies all cheaters

    Yeun, C. Y., Mitchell, C. J. & Burmester, M., 1998, Proceedings of NORDSEC '98, Trondheim, Norway, November 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    An Overview of the Formal Verification on the Digital Marketplace Cryptographic Protocols

    Goo, S. K., Irvine, J. & Tomlinson, A., 1 Jun 2006.

    Research output: Contribution to conferencePaper

  6. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In : Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticle

  7. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In : International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticle

  9. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In : Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticle

  10. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  11. Published

    Analysing and exploiting the Mantin biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T., Apr 2018, In : Designs, Codes and Cryptography. 86, 4, p. 743–770 28 p.

    Research output: Contribution to journalArticle

  12. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Analysing the Resilience of the Internet of Things Against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R., 2017, The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 11 p. (Lecture Notes in Computer Science; vol. 10658).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    Analysis and Classification of Android Malware

    Tam, K., 18 May 2016, (Unpublished) 197 p.

    Research output: ThesisDoctoral Thesis

  16. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  18. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In : Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticle

  19. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In : Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticle

  20. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In : IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticle

  21. Unpublished

    Analysis of Lightweight and Efficient Symmetric-Key Primitives

    Ankele, R., 2018, (Unpublished) 257 p.

    Research output: ThesisDoctoral Thesis

  22. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished

    Analysis of Public-Key Encryption Schemes in Extended Attack Models

    Sibborn, D., 2015, (Unpublished) 242 p.

    Research output: ThesisDoctoral Thesis

  24. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...8 9 10 11 12 13 14 15 ...83 Next