1. Unpublished

    Analysis of Lightweight and Efficient Symmetric-Key Primitives

    Ankele, R., 2018, (Unpublished) 257 p.

    Research output: ThesisDoctoral Thesis

  2. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Unpublished

    Analysis of Public-Key Encryption Schemes in Extended Attack Models

    Sibborn, D., 2015, (Unpublished) 242 p.

    Research output: ThesisDoctoral Thesis

  4. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Analyzing Multi-key Security Degradation

    Luykx, A., Mennink, B. & Paterson, K. G., 2017, Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS. p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Anomalous Taint Detection

    Cavallaro, L. & Sekar, R., 1 Jun 2008.

    Research output: Working paper

  8. Published

    Anomalous Taint Detection (Extended Abstract)

    Cavallaro, L. & Sekar, R., 2008, 11th International Symposium on Recent Advances in Intrusion Detection.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, (E-pub ahead of print) In: IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L., 16 Aug 2018, In: IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticlepeer-review

  12. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, (E-pub ahead of print) Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, (E-pub ahead of print) p. 496-511. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  17. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

    Di Pietro, R., Lombardi, F., Martinelli, F. & Sgandurra, D., 2015, In: Future Generation Computer Systems. 48, p. 28-38 11 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published
  21. Published
  22. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In: IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Unpublished
  26. Published

    Application of divide-and-conquer algorithm paradigm to improve the detection speed of high interaction client honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008. p. 1426-1432 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  28. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  29. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  31. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  32. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  33. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  35. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In: Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In: Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In: International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In: Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticlepeer-review

  42. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  43. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In: Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In: Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticlepeer-review

  46. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In: International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

Previous 1...3 4 5 6 7 8 9 10 ...43 Next