1. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  5. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In : Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticle

  8. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In : Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticle

  10. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In : International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticle

  11. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In : Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticle

  12. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  13. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In : Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticle

  14. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In : Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticle

  16. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In : International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticle

  19. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In : Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticle

  21. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In : IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticle

  24. Published

    Attacker-centric thinking in security: perspectives from financial services practitioners

    Moeckel, C., Aug 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaper

  25. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper