1. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticle

  2. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Forthcoming

    Biometric Technology

    Thornton, P. & Adey, P., 2015, (Accepted/In press) Dictionary of International Migration. Brasilia Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  4. Published

    B-ISDN implementation via satellite: the catalyst project

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F. & Smythe, C., 1993, Teletraffic Symposium, 10th. Performance Engineering in Telecommunications Network, Tenth UK. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In : Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticle

  6. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  7. Published

    Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases

    Cid, C. & Weinmann, R-P., 2009, Gröbner Bases, Coding, and Cryptography. Springer, p. 307-327 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    Blurred lines: intimacy, mobility, and the social military

    Adey, P., Denney, D., Jensen, R. & Pinkerton, A., 2016, In : Critical Military Studies. 2, 1-2, p. 7-24 18 p.

    Research output: Contribution to journalArticle

  9. Published

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 2018, Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards

    Markantonakis, K., 1999, Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, p. 230-243 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Bounded and Approximate Strong Satisfiability in Workflows

    Crampton, J., Gutin, G. & Majumdar, D., 28 May 2019, Proceedings of ACM SACMAT 2019. ACM, p. 179-184 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In : Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticle

  13. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In : The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticle

  14. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticle

  15. Published

    Bow ties are cool: an evening at the IISS with Toomas Hendrik Ilves

    Robinson, N. & Haggman, A., 3 Dec 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  16. Published

    Brauer's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticle

  17. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In : International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  20. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Broadcast-Enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D., Sep 2014, In : ACM Transactions on Sensor Networks. 11, 1, p. 1-33 33 p., 6.

    Research output: Contribution to journalArticle

  22. Published

    Broadening the scope of Fault Tolerance within Secure services

    Price, G., 2000, Security Protocols, 8th International Workshop, Cambridge, UK. 3-5 April, 2000. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  24. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P., 14 Dec 2016, In : IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  25. Published

    Building Attacker Personas in Practice - a Digital Banking Example

    Moeckel, C., 4 Jul 2018, Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (BCS), p. 1-5 5 p. (Electronic Workshops in Computing (eWiC)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Building better signcryption schemes with Tag-KEMs

    Bjørstad, T. E. & Dent, A. W., 2006, Public Key Cryptography -- PKC 2006. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Springer-Verlag, p. 491-507 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Building general purpose security services on trusted computing

    Chen, C., Mitchell, C. J. & Tang, S., 2012, Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Chen, L., Yung, M. & Zhu, L. (eds.). Springer-Verlag, Vol. 7222. p. 16-31 16 p. (Lecture Notes in Computer Science; no. 7222).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Building general-purpose security services on EMV payment cards

    Chen, C., Tang, S. & Mitchell, C. J., 2013, Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer-Verlag, p. 29-44 16 p. (LNICST; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Building key-private, public-key encryption schemes

    Paterson, K. G. & Srinivasan, S., 2009, ACISP. Boyd, C. & Neito, J. (eds.). Springer, p. 276-292 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Building Trustworthy Intrusion Detection through VM Introspection

    Baiardi, F. & Sgandurra, D., 1 Aug 2007, Third International Symposium on Information Assurance and Security. p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Business risks of software vulnerabilities: Four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses

    Kramer, H. & Walter, C., Mar 2015, Computer Weekly, p. 1-11 11 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  33. Published

    C 2 net: A Cross-Layer Quality of Service (QoS) Architecture for Cognitive Wireless Ad Hoc Networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 306-311 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  36. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P., Nov 2018, In : Schizophrenia bulletin. 44, 6, p. 1362–1372 11 p.

    Research output: Contribution to journalArticle

  37. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R., 9 Jan 2017, e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. Macau, China: IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Capture--A behavioral analysis tool for applications and documents

    Seifert, C., Steenson, R., Welch, I., Komisarczuk, P. & Endicott-Popovsky, B., 2007, In : digital investigation. 4, p. 23-30 8 p.

    Research output: Contribution to journalArticle

  40. Published

    Capturing Tacit Knowledge in Security Operation Centres

    Cho, S., Happa, J. & Creese, S., 24 Feb 2020, In : IEEE Access. 8, p. 42021 - 42041 21 p.

    Research output: Contribution to journalArticle

  41. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  44. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Causes of socioeconomic cybercrime in Nigeria

    Ibrahim, S., 18 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE Xplore, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  47. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G., 2005, PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  48. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In : IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticle

  49. Published

    CDT students take on the Cyber 9/12 Challenge in Geneva

    Haggman, A., 30 May 2017, RHUL Geopolitics and Security.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  50. Published

    Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., Apr 2018, In : IEEE Transactions on Information Forensics and Security . 13, 4, p. 1031-1041 11 p.

    Research output: Contribution to journalArticle

Previous 1...5 6 7 8 9 10 11 12 ...42 Next