1. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaperpeer-review

  3. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  4. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In: Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticlepeer-review

  5. Published

    The Principal Principle and Probability in the Many-Worlds interpretation

    Schack, R., 2010, Many Worlds? Everett, Quantum Theory, and Reality. S., S., J., B., A., K. & D., W. (eds.). Oxford: Oxford University Press, p. 467-475

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    The physically observable security of signature schemes

    Dent, A. W. & Malone-Lee, J., 2005, Cryptography and Coding: 10th IMA International Conference. Smart, N. P. (ed.). Springer-Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    The Navigation Metaphor in Security Economics

    Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W. & Verbij, R., 25 May 2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    The monitorability of service-level agreements for application-service provision

    Skene, J., Skene, A., Crampton, J. & Emmerich, W., 2007, Proceedings of the 6th International Workshop on Software and Performance. Cortellessa, V., Uchitel, S. & Yankelevich, D. (eds.). ACM Press, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  12. Published

    The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos

    Chaumette, S., Markantonakis, K., Mayes, K. & Sauveron, D., Sep 2006.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C., 2010, In: Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticlepeer-review

  15. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In: Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issuepeer-review

  16. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    The linear complexity of the self-shrinking generator

    Blackburn, S. R., 1999, In: IEEE Transactions on Information Theory. 45, 6, p. 2073-2077 5 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    The length of a typical Huffman codeword

    Schack, R., 1994, In: IEEE Transactions on Information Theory. IT-40, p. 1246-1247 2 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J., 2006, In: ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published
  23. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In: Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticlepeer-review

  25. Published
  26. Published

    The High-Fidelity Computer Reconstruction of Byzantine Art in Cyprus

    Happa, J., Zányi, E., Hulusi, V., Chrysanthou, Y. & Chalmers, A., 2008, In: Proceedings of IV International Cyprological Congress.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticlepeer-review

  28. Published

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, Palgrave Macmillan.

    Research output: Book/ReportAnthology

  29. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In: Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticlepeer-review

  30. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, (E-pub ahead of print) EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S., 1998, In: Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  34. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L., 6 Feb 2017, In: ACM Computing Surveys. 49, 4, p. 1-41 41 p., 76.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  36. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  37. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  38. Published

    The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem

    Blackburn, S. R., 2010, In: Journal of Mathematical Cryptology. 4, 2, p. 193-198 6 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaperpeer-review

  40. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  41. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  42. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  43. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  44. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  45. Published

    The Cramer-Shoup encryption scheme is plaintext aware in the standard model

    Dent, A. W., 2006, Advances in Cryptology -- Eurocrypt 2006. Vaudenay, S. (ed.). Springer-Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In: Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C., 2004, Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 155-169 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    The completion of a poset in a lattice of antichains

    Crampton, J. & Loizou, G., 2001, In: International Mathematical Journal. 1, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In: SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...43 Next