1. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S., 22 Apr 2018, p. 46-51. 6 p.

    Research output: Contribution to conferencePaper

  2. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In : Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticle

  4. Published
  5. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, Vol. 9814. p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D., 1 Mar 2018, In : Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticle

  8. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In : International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticle

  9. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

    Sbai, H., Goldsmith, M., Meftali, S. & Happa, J., 23 Sep 2018, International Symposium on Cyberspace Safety and Security. p. 18-32 15 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In : ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticle

  13. Published

    A survey on Reinforcement learning models and algorithms for traffic signal control

    Yau, K. L. A., Qadir, J., Khoo, H. L., Ling, M. H. & Komisarczuk, P., 1 Jun 2017, In : ACM Computing Surveys. 50, 3, 3068287.

    Research output: Contribution to journalReview article

  14. Published

    A Survey on Security for Mobile Devices

    Polla, M. L., Martinelli, F. & Sgandurra, D., 2013, In : IEEE Communications Surveys and Tutorials. 15, 1, p. 446-471 26 p.

    Research output: Contribution to journalArticle

  15. Published

    A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors

    Reina, A., Fattori, A. & Cavallaro, L., 14 Apr 2013, ACM European Workshop on Systems Security (EuroSec). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L., 2014, Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  21. Published

    A user-centric m-payment solution

    Zhang, Q., Mayes, K. & Markantonakis, K., 1 Nov 2005, Mobile Technology, Applications and Systems, 2005 2nd International Conference on. p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In : Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticle

  24. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Virtual Teams Model for Supporting Maritime Technology Management

    Berner, G., Hopcraft, R., Scanlan, J., Lutzhoft, M. & Earthy, J., 26 Sep 2018, p. 81-86. 6 p.

    Research output: Contribution to conferencePaper

Previous 1...3 4 5 6 7 8 9 10 ...78 Next