1. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In : Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticle

  3. Published

    Regional Blackouts: Protection of Broadcast Content on 3G Networks

    Dent, A. W. & Tomlinson, A., 1 Oct 2004, p. 442-446. 5 p.

    Research output: Contribution to conferencePaper

  4. Published

    Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2012, In : Journal of Network and Computer Applications. 35, 1, p. 253-267 15 p.

    Research output: Contribution to journalArticle

  5. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., Oct 2018, In : Journal of Cryptology. 31, 4, p. 917-964 48 p.

    Research output: Contribution to journalArticle

  9. Published

    Relating toy models of quantum computation: comprehension, complementarity and dagger autonomous categories

    Pavlovic, D., 2011, In : Electronic Notes in Theoretical Computer Science. 270, 2, p. 121-139 19 p.

    Research output: Contribution to journalArticle

  10. Published

    Relations Among Notions of Plaintext Awareness

    Birkett, J. & Dent, A. W., 2008, Public Key Cryptography -- PKC 2008. Cramer, R. (ed.). Springer-Verlag, p. 47-64 18 p. (Lecture Notes in Computer Science; vol. 4939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  14. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticle

  15. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K., 2014, In : International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticle

  19. Published

    Remote Policy Enforcement for Trusted Application Execution in Mobile Environments

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2013, Trusted Systems: 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Bloem, R. & Lipp, P. (eds.). Cham: Springer International Publishing, p. 70-84 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N. & Naccache, D., Jun 2019, In : digital investigation. 29, p. 198-209 12 p.

    Research output: Contribution to journalArticle

  22. Published

    Rendering Interior Cultural Heritage Scenes Using Image-Based Shooting

    Happa, J., Bashford-Rogers, T., Debattista, K. & Chalmers, A., 2011, In : Eurographics, Heritage Area Paper.

    Research output: Contribution to journalArticle

  23. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., Lanzi, A. A. & Monga, M., 2005, 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L., 1 Oct 2017, Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Unpublished
  29. Published

    Resilience Analysis of Software-Defined Networks Using Queueing Networks

    Nweke, L. O. & Wolthusen, S. D., 30 Mar 2020, 2020 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R., 2016, (Accepted/In press) Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticle

  32. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Re-thinking the care of male prisoners who self-harm

    Neave, S., Glorney, E. & Coles-Kemp, L., 19 Jun 2018.

    Research output: Contribution to conferencePaper

  34. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Jun 2014, 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Forthcoming

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., 16 Feb 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  37. Published

    Reverse Conformal Approach for On-line Experimental Design

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 185-192 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Review of work experience in a Bachelor of Information Technology

    Pauling, J. W. & Komisarczuk, P., 2007, Proceedings of the ninth Australasian conference on Computing education-Volume 66. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability

    Dent, A. W. & Tang, Q., 2007, Information Security -- ISC 2007. Garay, J. A., Lenstra, A. K., Mambo, M. & Peralta, R. (eds.). Springer-Verlag, p. 158-174 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    RFID and Contactless Technology

    Hancke, G., Jan 2008, Smart Cards, Tokens, Security and Applications. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  44. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    RGFGA: An efficient representation and crossover for grouping genetic algorithms

    Tucker, A., Crampton, J. & Swift, S., 2005, In : Evolutionary Computation. 13, 4, p. 477-500 24 p.

    Research output: Contribution to journalArticle

  46. Published

    Risk analysis: Requirements, conflicts and problems

    Ciechanowicz, Z., 1 Jan 1997, In : Computers and Security. 16, 3, p. 223-232 10 p.

    Research output: Contribution to journalArticle

  47. Published

    Risk analysis of Android applications: A user-centric solution

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Sep 2015, In : Future Generation Computer Systems.

    Research output: Contribution to journalArticle

  48. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  49. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering

    Paterson, K. G., 1998, In : Designs, Codes and Cryptography. 14, p. 247-259 13 p.

    Research output: Contribution to journalArticle

  56. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 Nov 2019, In : IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  57. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  58. Published

    RSA-based undeniable signatures for general moduli

    Galbraith, S., Mao, W. & Paterson, K. G., 2002, Topics in Cryptology - CT-RSA 2002. Preneel, B. (ed.). Springer, p. 200-217 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    Run-Time Monitoring of Data-Handling Violations

    Happa, J., Moffat, N., Goldsmith, M. & Creese, S., 2018, Computer Security. Springer, p. 213-232 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Published
  61. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  65. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Scalable RFID pseudonym protocol

    Song, B. & Mitchell, C. J., 2009, NSS 2009, Network & System Security, 19-21 October 2009, Gold Coast, Queensland, Australia. IEEE Computer Society Press, p. 216-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In : Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticle

  68. Published
  69. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  70. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2-4, 2016.. p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Secret Public Key Protocols Revisited

    Lim, H. W. & Paterson, K. G., 2009, Security Protocols. Christianson, B. (ed.). Springer, p. 237-256 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    Secret Sharing in Hierarchical Groups

    Charnes, C., Martin, K. M., Pieprzyk, J. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 81-86 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  73. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Secret, verifiable auctions from elections

    Quaglia, E. & Smyth, B., 19 Jun 2018, In : Theoretical Computer Science. 730, p. 44-92 49 p.

    Research output: Contribution to journalArticle

  75. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p. (Lecture Notes in Computer Science ; vol. 9100)(Security and Cryptology - sub series ).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P., 1998, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430. p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    Secure Delivery of Conditional Access Applications to Mobile Receivers

    Gallery, E. & Tomlinson, A., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  83. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Secure Proximity Identification for RFID

    Hancke, G. & Drimer, S., 2009, Security in RFID and Sensor Networks: Zhang and Kitsos (Eds). Auerbach Publications, (Wireless Networks and Mobile Communications).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  88. Published

    Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

    Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M. & Darwish, S., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 777-784 8 p. 6296048

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Forthcoming

    Secure Shared Processing on a Cluster of Trust-Anchors

    Mayes, K., 15 May 2020, (Accepted/In press). 16 p.

    Research output: Contribution to conferencePaper

  90. Published

    Secure Sharing of an ICT Infrastructure through Vinci

    Baiardi, F. & Sgandurra, D., 2008, Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Hausheer, D. & Schönwälder, J. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 65-78 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  91. Published

    Secure Smart, Embedded Devices, Platforms and Applications

    Mayes, K. & Markantonakis, K., 2014, Springer. 568 p.

    Research output: Book/ReportBook

  92. Published

    Secure virtual disk images for grid computing

    Gebhardt, C. & Tomlinson, A., Oct 2008, p. 19-29. 11 p.

    Research output: Contribution to conferencePaper

  93. Published

    Securing a Community Cloud

    Baiardi, F. & Sgandurra, D., 1 Jun 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. p. 32-41 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Securing Autonomous Networks through Virtual Closure

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Jun 2016, In : International Journal of Intelligent Computing Research (IJICR). 7, 2, p. 694-705 12 p.

    Research output: Contribution to journalArticle

  96. Published

    Securing Financially Sensitive Environments with OpenBSD

    Humphrey, N. C. P., 18 Jan 2008

    Research output: ThesisMaster's Thesis

  97. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Securing Grid Workflows with Trusted Computing

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 1 Jun 2008, p. 510-519. 10 p.

    Research output: Contribution to conferencePaper

  99. Published

    Securing Grid Workflows with Trusted Computing (Extended Abstract)

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 2008, p. 700. 1 p.

    Research output: Contribution to conferenceAbstract

  100. Published

    Securing Peer-to-Peer networks using Trusted Computing

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 271-298 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  101. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. Published

    Securing the volume/volumen: Comments on Stuart Elden's Plenary paper 'Secure the volume'

    Adey, P., May 2013, In : Political Geography. 34, p. 52-54 3 p.

    Research output: Contribution to journalArticle

  104. Published

    Security

    Martin, K. M., 2003, E-Commerce Handbook. Thomson-Gee

    Research output: Chapter in Book/Report/Conference proceedingChapter

  105. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  106. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  107. Published

    Security and Anonymity of Identity-based Encryption with Multiple Trusted Authorities

    Paterson, K. G. & Srinivasan, S., 2008, Pairing 2008. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 354-375 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  108. Published

    Security and Integrity of a Distributed File Storage in a Virtual Environment

    Sala, G., Sgandurra, D. & Baiardi, F., 1 Sep 2007, Fourth International IEEE Security in Storage Workshop. p. 58-69 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis

  112. Published

    Security and Resilience for Smart Devices and Applications

    Sauveron, D. (Guest ed.), Markantonakis, K. (Guest ed.), Mayes, K. (Guest ed.) & Verikoukis, C. (Guest ed.), 2011, In : EURASIP Journal on Wireless Communications and Networking. 2011

    Research output: Contribution to journalSpecial issue

  113. Published

    Security and the politics of resilience: An aesthetic response

    Grove, K. & Adey, P., 1 Feb 2015, In : Politics. 35, 1, p. 78-84 7 p.

    Research output: Contribution to journalArticle

  114. Published

    Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

    Livraga, G. (ed.) & Mitchell, C. J. (ed.), Sep 2017, Berlin: Springer-Verlag. 235 p. (Lecture Notes in Computer Science; vol. 10547)

    Research output: Book/ReportAnthology

  115. Published

    Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

    Yau, K-L. A., Poh, G. S. & Komisarczuk, P., 2013, In : IJAHUC. 12, 3, p. 157-176 20 p.

    Research output: Contribution to journalArticle

  116. Published

    Security atmospheres or the crystallisation of worlds

    Adey, P., Jan 2014, In : Environment and Planning D: Society and Space. 32, 5, p. 834-851 18 p.

    Research output: Contribution to journalArticle

  117. Published

    Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G., Markantonakis, K. & Mayes, K., May 2010, In : Journal of Internet Technology. 11, 3, p. 307 313 p.

    Research output: Contribution to journalArticle

  118. Published

    Security Challenges in the Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K. & Irvine, J. M., 1 Sep 2004, p. 3267 - 3270.

    Research output: Contribution to conferencePaper

  119. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  120. Published

    Security Constraints on the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2003, In : IACR Cryptology ePrint Archive. 2003, p. 13 1 p.

    Research output: Contribution to journalArticle

  121. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In : Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticle

  122. Published

    Security Evaluation and Certification Process

    Sauveron, D., Dusart, P., Trotin, A., Markantonakis, K. & Mayes, K., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  123. Published

    Security for distributed systems: Foundations of access control

    Bertino, E. & Crampton, J., 2007, Information Assurance: Survivability and Security in Networked Systems. Qian, Y., Tipper, D., Krishnamurthy, P. & Joshi, J. (eds.). Morgan Kaufman, p. 39-80 42 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  124. Published

    Security for Mobility

    Mitchell, C. J. (ed.), 2004, IEE Press. 440 p.

    Research output: Book/ReportAnthology

  125. Published

    Security For Video Broadcasting

    Tomlinson, A., 2008, Smart Cards, Tokens, Security and Applications. Springer, p. 139-154 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  126. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  127. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Security in Swarm Robotics

    Laing, T., Martin, K., Ng, S. & Tomlinson, A., Dec 2015, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. Tan, Y. (ed.). IGI Global, p. 42-66 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  129. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In : The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticle

  131. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S., Jan 2018, In : Cryptography and Communications. 10, 1, p. 41-58 18 p.

    Research output: Contribution to journalArticle

  133. Published

    Security of Open Satellite TV Receivers

    Markantonakis, K., Tunstall, M. & Mayes, K., Sep 2006.

    Research output: Contribution to conferencePaper

  134. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  135. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  139. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  140. Published

    Security Server-Based Architecture for Mobile Ad Hoc Networks

    Darwish, S., Taylor, S. J. E. & Ghinea, G., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 926-930 5 p. 6296071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Published

    Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

    Chen, LI. (ed.) & Mitchell, C. J. (ed.), 2014, Springer-Verlag. 257 p. (Lecture Notes in Computer Science; vol. 8893)

    Research output: Book/ReportAnthology

  142. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  143. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  144. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    Security vulnerabilities in DNS and DNSSEC

    Ariyapperuma, S. & Mitchell, C. J., 2007, Proceedings of ARES 2007, The International Conference on Availability, Reliability and Security, Vienna, April 2007. IEEE Computer Society Press, p. 335-342 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaper

  147. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In : Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  148. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  149. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  150. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In : International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticle

  153. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Semantic Attestation of Node Integrity in Overlays

    Baiardi, F. & Sgandurra, D., 2010, On the Move to Meaningful Internet Systems: OTM 2010: Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I. Meersman, R., Dillon, T. & Herrero, P. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 656-671 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  155. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Separability of very noisy mixed states and implications for NMR quantum computing

    Braunstein, S. L., Caves, C. M., Jozsa, R., Linden, N., Popescu, S. & Schack, R., 1999, In : Physical Review Letters. 83, p. 1054-1057 4 p.

    Research output: Contribution to journalArticle

  158. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaper

  160. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  161. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  162. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  163. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In : Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticle

  166. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Shifts on a finite qubit string: A class of quantum baker's maps

    Schack, R. & Caves, C. M., 2000, In : Applicable Algebra in Engineering, Communication and Computing (AAECC). 10, p. 305-310 6 p.

    Research output: Contribution to journalArticle

  168. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  169. E-pub ahead of print

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 5 Mar 2020, In : Environment and Planning D: Society and Space. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  170. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaper

  171. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In : Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticle

  172. Published

    Signcryption schemes based on the RSA problem

    Dent, A. W. & Malone-Lee, J., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 99-120

    Research output: Chapter in Book/Report/Conference proceedingChapter

  173. E-pub ahead of print

    Signposts: Cyprus, the UK and the Future of the SBAs

    Dodds, K-J., Jensen, R. & Constantinou, C., 7 Nov 2015, In : RUSI Journal. 160, 5, p. 36-45 10 p.

    Research output: Contribution to journalArticle

  174. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In : Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticle

  175. Published

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 2017, Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Springer-Verlag, Vol. 10323 LNCS. p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  180. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In : Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticle

  181. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Simulating the Influences of Aging and Ocular Disease on Biometric Recognition Performance

    Borgen, H., Bours, P. & Wolthusen, S. D., 2 Jun 2009, Third International Conference on Advances in Biometrics (ICB 2009). Springer-Verlag, p. 857-867

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    Simulation on a quantum computer

    Schack, R., 2006, In : Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticle

  184. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  187. Published

    Single sign-on using trusted platforms

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 2003, Proceedings. Springer-Verlag, Vol. 2851. p. 54-68 15 p. (Lecture Notes in Computer Science; vol. 2851).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  188. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In : IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticle

  189. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In : IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticle

  190. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In : Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticle

  191. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R., 2002, Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384. p. 71-88 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  192. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  193. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  194. E-pub ahead of print

    Slide reduction, revisited—filling the gaps in svp approximation

    Aggarwal, D., Li, J., Nguyen, P. Q. & Stephens-Davidowitz, N., 10 Aug 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 274-295 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12171 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    Sliding Windows Succumbs to Big Mac Attack

    Walter, C. D., 2001, CHES 2001. Koç, Ç. K., Naccache, D. & Paar, C. (eds.). Springer, Vol. 2162. p. 286-299 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  196. Published

    Small Scale Variants of the AES

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Fast Software Encryption, 12th International Workshop, FSE 2005. Springer, Vol. 3557. p. 145-162 18 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    Smart card based authentication - any future?

    Markantonakis, K., Mayes, K. & Fred, P., 2005, In : Computers and Security. 24, 3, p. 188-191 4 p.

    Research output: Contribution to journalArticle

  198. Published

    Smart card Platform-Fingerprinting: Smart Card Technology International

    Mayes, K., Markantonakis, K. & Chen, C., Oct 2006, Smart Card Technology International: The Global Journal of Advanced Card Technology. Locke, M. (ed.). Smart Card Technology International, p. 78 82 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  199. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  200. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Piper, F. & Tunstall, M., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  201. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Mobile Robots: The Evolutionary Approach. Nadia, N., Leandro dos Santos, C. & Luiza de Macedo, M. (eds.). Vol. 50. p. 205 237 p. (Studies in Computational Intelligence; vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  202. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  203. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 1 Jan 2011, Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  204. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  205. Published

    Smart Cards

    Tunstall, M., Markantonakis, K., Sauveron, D. & Mayes, K., 2009, Handbook of Technology Management. Bidgoli, H. (ed.). John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingChapter

  206. Published

    Smart cards and the associated infrastructure problem

    Paterson, K. G., Piper, F. & Robshaw, M., 2002, In : Information Security Technical Report. 7, 3, p. 20-29 10 p.

    Research output: Contribution to journalArticle

  207. Published

    Smart Cards for Security and Assurance

    Markantonakis, K., Piper, F. & Mayes, K., 2007, Managing Information Assurance in Financial Services. Information Science Publishing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  208. Published

    Smart Cards, Tokens, Security and Applications

    Mayes, K. & Markantonakis, K., 2010, Springer.

    Research output: Book/ReportBook

  209. Published

    Smart Cards: Communication Protocols and Applications

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Smart Cards: Communication Protocols and Applications.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  210. Published
  211. Published

    Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Dec 2013, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). Douligeris, C. & Serpanos, D. (eds.). Athens, Greece: IEEE Computer Science

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Smartphones as a Platform for Advanced Measurement and Processing

    Opperman, C. & Hancke, G., 2012, IEEE Instrumentation and Measurement Technology Conference. IEEE, p. 703 706 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals

    Ibrahim, S., Dec 2016, In : International Journal of Law, Crime and Justice. 47, p. 44-57 14 p.

    Research output: Contribution to journalArticle

  214. Published

    Social and Cultural Geographies of Air Transport

    Adey, P. & Lin, W., Jul 2014, The Geographies of Air Transport. Goetz, A. & Budd, L. (eds.). p. 61-72 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  215. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In : Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticle

  216. Published

    Some Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., 2004, Advanced Encryption Standard - AES 2004, 4th International Conference. Berlin: Springer, Vol. 3373. p. 58-66 9 p. (Lecture Notes in Computer Science; vol. 3373).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  217. Unpublished

    Some Algorithms for Learning with Errors

    Fitzpatrick, R., 21 Aug 2014, (Unpublished) 167 p.

    Research output: ThesisDoctoral Thesis

  218. Published

    Some New Circuit Codes

    Paterson, K. G. & Tuliani, J., 1998, In : IEEE Transactions on Information Theory. 44, p. 1305-1309 5 p.

    Research output: Contribution to journalArticle

  219. Published

    Some properties of the Yoshiara family of planes.

    Ng, S-L., 2002, In : European Journal of Combinatorics. 23, p. 77-81 5 p.

    Research output: Contribution to journalArticle

  220. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  221. Published

    Some Remarks on an Algorithm of Fitzpatrick

    Blackburn, S. R. & Chambers, W. G., 1996, In : IEEE Transactions on Information Theory. 42, 4, p. 1269-1271 3 p.

    Research output: Contribution to journalArticle

  222. Published

    Some Remarks on Authentication Systems

    Anthony, M. H. G., Martin, K. M., Seberry, J. & Wild, P. R., 1990, Advances in Cryptology -Auscrypt'90. Springer-Verlag, Vol. 453. p. 122-139 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  223. Published

    Some Security Aspects of the MIST Randomized Exponentiation Algorithm

    Walter, C. D., 2003, CHES 2002. Jr., B. S. K., Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 2523. p. 276-290 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In : Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticle

  225. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In : IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticle

  226. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In : IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticle

  228. Published

    Specifying and enforcing constraints in role-based access control

    Crampton, J., 2003, Proceedings of 8th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 43-50 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Speech security and permanents of (0,1) matrices

    Mitchell, C. J., 1989, Cryptography and Coding: Proceedings of the IMA Cryptography and Coding Conference, Cirencester, December 1986. Beker, H. J. & Piper, F. C. (eds.). Oxford University Press, p. 231-240 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  230. Published

    Spy agents: Evaluating trust in remote environments

    Kalogridis, G., Mitchell, C. J. & Clemo, G., 2005, Proceedings of the 2005 International Conference on Security and Management (SAM '05), June 2005, Las Vegas, USA. Arabnia, H. R. (ed.). CSREA Press, p. 405-411 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In : Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticle

  232. Published

    Squeezed light from a self-frequency doubling laser

    Sizmann, A., Schack, R. & Schenzle, A., 1990, In : Europhysics Letters. 13, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  233. Published

    SSL/TLS session-aware user authentication using a GAA bootstrapped key

    Chen, C., Mitchell, C. J. & Tang, S., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication, 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings. Ardagna, C. & Zhou, J. (eds.). Springer-Verlag, Vol. 6633. p. 54-68 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  234. Published

    Stability of Power Network State Estimation Under Attack

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference Asia (ISGT Asia 2014). IEEE Press, p. 441 446 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, NDSS Symposium 2017. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In : Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticle

  237. Published

    State preparation based on Grover's algorithm in the presence of global information about the state

    Soklakov, A. N. & Schack, R., 2005, In : Optics and Spectroscopy. 99, p. 211-217 7 p.

    Research output: Contribution to journalArticle

  238. Published

    Static Analysis on x86 Executable for Preventing Automatic Mimicry Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 12 Jul 2007, In the Proceedings of the GI SIG SIDAR Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. In preparation
  240. Published

    Statistical attacks on cookie masking for RC4

    Paterson, K., Sep 2018, In : Cryptography and Communications. 10, 5, p. 777-801 25 p.

    Research output: Contribution to journalArticle

  241. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  242. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A., 2014, UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  243. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In : Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticle

  244. Published

    Storage efficient decoding for a class of binary de Bruijn sequences

    Paterson, K. G. & Robshaw, M. J. B., 1995, In : Discrete Mathematics. 138, p. 327-341 15 p.

    Research output: Contribution to journalArticle

  245. Published

    Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

    Rezaei Khouzani, M., Pham, V. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 59-78 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  246. Published

    Strengthening Password-Based Authentication

    Al Maqbali, F., 2019, 207 p.

    Research output: ThesisDoctoral Thesis

  247. Published
  248. E-pub ahead of print

    Strong Post-Compromise Secure Proxy Re-Encryption

    Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S. & Wolthusen, S. D., 6 Oct 2008, Computer Security - ESORICS 2008: Proc. 13th European Symposium on Research in Computer Security. Springer-Verlag, p. 49-65

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  250. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  251. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, Proceedings of the 8th International Workshop on Critical Information Infrastructures Security. Springer-Verlag, p. 120-132

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  254. Published

    Subjective probability and quantum certainty

    Caves, C. M., Fuchs, C. A. & Schack, R., 2007, In : Studies in History and Philosophy of Modern Physics. 38, 2, p. 255-274 20 p.

    Research output: Contribution to journalArticle

  255. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  256. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticle

  257. E-pub ahead of print

    Subverting Decryption in AEAD

    Armour, M. & Poettering, B., 18 Nov 2019, Cryptography and Coding - 17th IMA International Conference, IMACC 2019, Proceedings. Albrecht, M. (ed.). Springer, p. 22-41 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11929 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. Published

    Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

    Rupp, A., Leander, G., Bangerter, E., Dent, A. W. & Sadeghi, A-R., 2008, Advances in Cryptology -- Asiacrypt 2008. Pieprzyk, J. (ed.). Springer-Verlag, p. 489-505 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  259. Published

    SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., 1 Oct 2017, In : IEEE Transactions on Mobile Computing. 16, 10, p. 2927-2940 14 p.

    Research output: Contribution to journalArticle

  260. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticle

  261. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., Apr 2009, p. 307- 312.

    Research output: Contribution to conferencePaper

  262. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In : Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticle

  263. Published

    Switch reduction for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1987, In : Electronics Letters. 23, p. 346-347 2 p.

    Research output: Contribution to journalArticle

  264. Published

    Switching networks for bidirectional telephone systems

    Mitchell, C. J. & Wild, P. R., 1988, In : Ars Combinatoria. 25A, p. 89-94 6 p.

    Research output: Contribution to journalArticle

  265. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  267. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  268. Published

    Systolic Modular Multiplication

    Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 3, p. 376-378 3 p.

    Research output: Contribution to journalArticle

  269. Published

    Tactical decompositions of designs

    Beker, H. J., Mitchell, C. J. & Piper, F. C., 1982, In : Aequationes Mathematicae. 25, p. 123-152 30 p.

    Research output: Contribution to journalArticle

  270. Published

    TACTICS: Validation of the security framework developed for tactical SOA

    Gkioulos, V., Risthein, E. & Wolthusen, S., Aug 2017, In : Journal of Information Security and Applications. 35, p. 96-105 10 p.

    Research output: Contribution to journalArticle

  271. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Tailoring authentication protocols to match underlying mechanisms

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1996, Information Security and Privacy - Proceedings: First Australasian Conference, Wollongong, NSW, Australia, June 1996. Pieprzyk, J. & Seberry, J. (eds.). Springer-Verlag, p. 121-133 13 p. (Lecture Notes in Computer Science; no. 1172).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  274. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  275. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  276. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  277. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  278. E-pub ahead of print

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 27 Apr 2019, Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV. p. 108-128 21 p. (Lecture Notes in Computer Science; vol. XV).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  279. Published

    Technical Perspective: On heartbleed: A Hard Beginnyng Makth a Good Endyng

    Paterson, K., 21 Feb 2018, In : Communications of the ACM. 61, 3, p. 108-108 1 p.

    Research output: Contribution to journalComment/debate

  280. Unpublished
  281. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1 Oct 1998, Proc. 2nd IMACS Internat. Conf. on Circuits, Systems Computers. Vol. 2. p. 945-949 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  282. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  283. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In : Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  284. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  285. Published

    Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., 1 Nov 2006, Computational Intelligence and Security, 2006 International Conference on. Vol. 1. p. 604 -608

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Published

    Ten reasons WHY IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems

    Palmer, A. & Hurrey, C., 2012, Proceedings of the 2012 European Intelligence and Security Informatics Conference. Washington: IEEE Computer Society, p. 311-316 6 p. Palmer:2012:TRW:2373856.2372920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B., 2003, Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  288. Published

    TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., Aug 2019, 28th USENIX Security Symposium (USENIX Sec). p. 729-746 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    The ambiguous class group and the genus group of certain non-normal extensions

    Walter, C. D., 1979, In : Mathematika. 26, p. 113-124 12 p.

    Research output: Contribution to journalArticle

  290. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  291. Published
  292. E-pub ahead of print

    The Authorization Policy Existence Problem

    Berge, P., Crampton, J., Gutin, G. & Watrigant, R., 28 Nov 2018, In : IEEE Transactions on Dependable and Secure Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  293. Published

    The Benefits and Drawbacks of Using Electronic Identities

    Price, G., 2008, In : Information Security Technical Report. 13, 2

    Research output: Contribution to journalArticle

  294. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R., 16 Mar 2017, In : Journal of Computer Security. 25, 1, p. 83-115 33 p.

    Research output: Contribution to journalArticle

  295. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, D. K. (eds.). Springer, p. 369-381 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  296. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  297. Published

    The Case for a Secure Multi-Application Smart Card Operating System

    Markantonakis, K., 1998, Proceedings of the First International Workshop on Information Security. London, UK: Springer-Verlag, p. 188-197 10 p. (ISW '97).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    The class number of pure fields of prime degree

    Parry, C. J. & Walter, C. D., 1976, In : Mathematika. 23, p. 220-226 7 p.

    Research output: Contribution to journalArticle

  299. Published

    The class number of pure fields of prime degree (addendum)

    Parry, C. J. & Walter, C. D., 1977, In : Mathematika. 24, p. 122 1 p.

    Research output: Contribution to journalArticle

  300. Published

    The combinatorics of cryptographic key establishment

    Martin, K. M., 2007, Surveys in Combinatorics. Cambridge University Press, Vol. 346. p. 223-273 51 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  301. Published

    The combinatorics of generalised cumulative arrays.

    Martin, K. M. & Ng, S-L., 2007, In : Journal of Mathematical Cryptology. 1, 1, p. 13-32 20 p.

    Research output: Contribution to journalArticle

  302. Published

    The combinatorics of perfect authentication schemes

    Mitchell, C. J., Walker, M. & Wild, P. R., 1994, In : SIAM Journal on Discrete Mathematics. 7, 1, p. 102-107 6 p.

    Research output: Contribution to journalArticle

  303. Published

    The completion of a poset in a lattice of antichains

    Crampton, J. & Loizou, G., 2001, In : International Mathematical Journal. 1, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  304. Published

    The consistency of task-based authorization constraints in workflow systems

    Tan, K., Crampton, J. & Gunter, C., 2004, Proceedings of 17th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 155-169 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  305. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    The cost of reducing key-storage requirements in secure networks

    Mitchell, C. J. & Piper, F. C., 1987, In : Computers and Security. 6, 4, p. 339-341 3 p.

    Research output: Contribution to journalArticle

  307. Published

    The Cramer-Shoup encryption scheme is plaintext aware in the standard model

    Dent, A. W., 2006, Advances in Cryptology -- Eurocrypt 2006. Vaudenay, S. (ed.). Springer-Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  308. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  309. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  310. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  311. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  312. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  313. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaper

  314. Published

    The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem

    Blackburn, S. R., 2010, In : Journal of Mathematical Cryptology. 4, 2, p. 193-198 6 p.

    Research output: Contribution to journalArticle

  315. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaper

  316. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  317. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  318. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L., 6 Feb 2017, In : ACM Computing Surveys. 49, 4, p. 1-41 41 p., 76.

    Research output: Contribution to journalArticle

  319. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  320. Published

    The Filing Cabinet Problem

    Martin, K. M. & Koumandos, S., 1998, In : Bulletin of the ICA. 22, p. 25-30 6 p.

    Research output: Contribution to journalArticle

  321. Published

    The future of SET

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings of UKAIS 2002, Leeds, UK, April 2002. p. 9-17 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    The Geometry of Shared Secret Schemes

    Martin, K. M., Simmons, G. J. & Jackson, W-A., 1991, In : Bulletin of the ICA. 1, p. 71-88 18 p.

    Research output: Contribution to journalArticle

  324. Forthcoming

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, (Accepted/In press) Palgrave Macmillan.

    Research output: Book/ReportAnthology

  325. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In : Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticle

  326. Published

    The High-Fidelity Computer Reconstruction of Byzantine Art in Cyprus

    Happa, J., Zányi, E., Hulusi, V., Chrysanthou, Y. & Chalmers, A., 2008, In : Proceedings of IV International Cyprological Congress.

    Research output: Contribution to journalArticle

  327. Published
  328. Published

    The impact of quantum computing on real-world security: A 5G case study

    Mitchell, C. J., Jun 2020, In : Computers and Security. 93, p. 1-11 11 p., 101825.

    Research output: Contribution to journalArticle

  329. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published
  331. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J., 2006, In : ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticle

  332. Published

    The length of a typical Huffman codeword

    Schack, R., 1994, In : IEEE Transactions on Information Theory. IT-40, p. 1246-1247 2 p.

    Research output: Contribution to journalArticle

  333. Published

    The linear complexity of the self-shrinking generator

    Blackburn, S. R., 1999, In : IEEE Transactions on Information Theory. 45, 6, p. 2073-2077 5 p.

    Research output: Contribution to journalArticle

  334. Published

    The Location Information Preference Authority: Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2004, Nordsec 2004, The 9th Nordic Workshop on Secure IT-systems, Helsinki University of Technology, Finland, November 2004. Liimatainen, S. & Virtanen, T. (eds.). p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    The Maple Package “Janet”: I. Polynomials Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  336. Published

    The Maple Package “Janet”: II. Linear Partial Differential Systems

    Blinkow, Y., Cid, C., Gerdt, V., Plesken, W. & Robertz, D., 2003, Proceedings of the Sixth International Workshop on Computer Algebra in Scientific Computing, CASC’ 2003. 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In : Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issue

  338. Published

    The MIFARE Classic story

    Mayes, K. E. & Cid, C., 2010, In : Information Security Technical Report. 15, 1, p. 8 - 12

    Research output: Contribution to journalArticle

  339. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  340. Published

    The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos

    Chaumette, S., Markantonakis, K., Mayes, K. & Sauveron, D., Sep 2006.

    Research output: Contribution to conferencePaper

  341. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  342. Published

    The monitorability of service-level agreements for application-service provision

    Skene, J., Skene, A., Crampton, J. & Emmerich, W., 2007, Proceedings of the 6th International Workshop on Software and Performance. Cortellessa, V., Uchitel, S. & Yankelevich, D. (eds.). ACM Press, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    The Navigation Metaphor in Security Economics

    Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W. & Verbij, R., 25 May 2016, In : IEEE Security and Privacy Magazine. 14, 3, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  344. Published

    The personal CA - PKI for a Personal Area Network

    Gehrmann, C., Nyberg, K. & Mitchell, C. J., 2002, Proceedings - IST Mobile & Wireless Communications Summit 2002, Thessaloniki, Greece, June 2002. p. 31-35 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  346. Published

    The physically observable security of signature schemes

    Dent, A. W. & Malone-Lee, J., 2005, Cryptography and Coding: 10th IMA International Conference. Smart, N. P. (ed.). Springer-Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  347. Published

    The Principal Principle and Probability in the Many-Worlds interpretation

    Schack, R., 2010, Many Worlds? Everett, Quantum Theory, and Reality. S., S., J., B., A., K. & D., W. (eds.). Oxford: Oxford University Press, p. 467-475

    Research output: Chapter in Book/Report/Conference proceedingChapter

  348. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In : Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticle

  349. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  350. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaper

  351. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  352. Published

    The RAKAPOSHI Stream Cipher

    Cid, C., Kiyomoto, S. & Kurihara, J., 2009, Information and Communications Security, 11th International Conference, ICICS 2009. Springer, Vol. 5927. p. 32-46 15 p. (Lecture Notes in Computer Sciences - LNCS; vol. 5927).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In : Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticle

  354. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  355. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In : Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticle

  356. Published
  357. Published

    The Sajdak Conjecture

    Blackburn, S. R., 1997, In : Math. Spectrum. 30, No. 1, p. 15-16 2 p.

    Research output: Contribution to journalArticle

  358. Published

    The secondary and approximate authorization model and its application to Bell-LaPadula policies

    Crampton, J., Leung, W. & Beznosov, K., 2006, Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    The Secure and Multiple Payment System based on the Mobile Phone Platform

    Zhang, Q., Brites Moita, J. N., Mayes, K. & Markantonakis, K., 2004, The Secure and Multiple Payment System based on the Mobile Phone Platform.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    The security architecture of the secure mobile messaging demonstrator

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1988, Proceedings of UK IT 88. IED, Swansea, p. 171-174 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  361. Published

    The security issue

    Mitchell, C. J., 1989, Proceedings of Value Added Network Services for Europe, London, September 1989. London: IBC Technical Services Ltd, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In : Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticle

  363. Published
  364. Published

    The status of national PKIs - A European overview

    Patsos, D., Ciechanowicz, C. & Piper, F., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 13-20 8 p.

    Research output: Contribution to journalArticle

  365. Published

    The TypTop System: Personalized Typo-Tolerant Password Checking

    Chatterjee, R., Woodage, J., Pnueli, Y., Chowdhury, A. & Ristenpart, T., 30 Oct 2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 329-346 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  366. Published

    The unreasonable ineffectiveness of security engineering: An overview

    Pavlovic, D., 2010, Proceedings of IEEE Conference on Software Engineering and Formal Methods, Pisa, Italy, 2010. Fiadeiro, J. L. & Gnesi, S. (eds.). IEEE, p. 12-18 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  367. Published

    The use of Trusted Third Parties and Secure Billing in UMTS

    Chen, LI., Hitz, H-J., Horn, G., Howker, K., Kessler, V., Knudsen, L. R., Mitchell, C. J. & Radu, C., 1996, Proceedings of the ACTS Mobile Communications Summit, Granada, Spain, 27-29 November 1996. Vol. 2. p. 493-499 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  368. Published

    The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti

    Happa, J., Artusi, A., Dubla, P., Bashford-Rogers, T., Debattista, K., Hulusi, V. & Chalmers, A., 2009, In : Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Cultural Heritage.

    Research output: Contribution to journalArticle

  369. In preparation

    The Way We Evacuate: emergency, reproduction and the aesthetics of mobility

    Adey, P., 2020, (In preparation) Duke University Press.

    Research output: Book/ReportBook

  370. Published

    Theoretical Analysis of Security Attacks from a Swarm-like Perspective

    George, C., Goo, S. K. & Tomlinson, A., 2011.

    Research output: Contribution to conferencePaper

  371. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In : Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticle

  372. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  373. Published

    Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

    Tomlinson, A. & Yap, J. Y., 14 Jul 2013, p. 39-45. 6 p.

    Research output: Contribution to conferencePaper

  374. Published

    Threat modeling approaches and tools for securing architectural designs of an e-banking application

    Moeckel, C. & Abdallah, A. E., 14 Oct 2010, p. 149-154. 6 p.

    Research output: Contribution to conferencePaper

  375. Published

    Threats to the Swarm: Security Considerations for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., 2009, In : International Journal on Advances in Security. 2, 2&3, p. 288 - 297

    Research output: Contribution to journalArticle

  376. Published

    Threshold Anonymous Announcement in VANETs.

    Chen, LI., Ng, S-L. & Wang, G., Mar 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 605-615

    Research output: Contribution to journalArticle

  377. Published

    Threshold MACs

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R., Wang, H. & Wild, P. R., 2003, Information Security and Cryptology - ICISC 2002. Springer, Vol. 2587. p. 237-252 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  378. Published

    Thwarting timing attacks using ATM networks

    Price, G., 2001, Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  379. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  382. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In : Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticle

  385. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  387. Published

    Torsion-free metabelian groups with commutator quotient C_p^n x C_p^m

    Cid, C., 2002, In : Journal of Algebra. 248, p. 15-36 22 p.

    Research output: Contribution to journalArticle

  388. Published

    Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

    de Amorim, R. C. & Komisarczuk, P., 2014, Case Studies in Secure Computing: Achievements and Trends. 1st ed. CRC Press, p. 295 1 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  389. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  390. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

    Legg, P. A., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis, I., Goldsmith, M. & Creese, S., 2013, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4, 4, p. 20-37 18 p.

    Research output: Contribution to journalArticle

  392. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  393. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  395. Forthcoming

    Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

    Gómez-Cabrera, A., Escamilla-Ambrosio, P. J., Rodríguez-Mota, A. & Happa, J., 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  396. Published

    Towards an Access-Control Framework for Countering Insider Threats

    Crampton, J. & Huth, M., 2010, Insider Threats in Cyber Security and Beyond. Bishop, M., Gollmann, D., Hunker, J. & Probst, C. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  397. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaper

  398. Published

    Towards Bidirectional Ratcheted Key Exchange

    Poettering, B. & Rösler, P., 2018, p. 3-32. 30 p.

    Research output: Contribution to conferencePaper

  399. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  400. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  401. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  404. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  405. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Traceability codes

    Blackburn, S., Etzion, T. & Ng, S-L., Nov 2010, In : Journal of Combinatorial Theory, Series A. 117, 8, p. 1049-1057

    Research output: Contribution to journalArticle

  407. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  408. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  410. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  411. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In : Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  412. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Transparent Process Monitoring in a Virtual Environment

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 2009, In : Electronic Notes in Theoretical Computer Science. 236, p. 85 - 100

    Research output: Contribution to journalArticle

  414. Published

    Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G., 1 May 2009, In : Information Security Technical Report. 14, 2, p. 87-95 9 p.

    Research output: Contribution to journalArticle

  415. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K., 1998, Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  419. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  420. Published

    Tripartite authenticated key agreement protocols from pairings

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. IMA Conference on Cryptography and Coding. Paterson, K. G. (ed.). Springer, p. 332-359 28 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  421. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  422. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In : Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticle

  423. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  425. Published
  426. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  427. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  428. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  429. Published

    Trusted Computing: Providing security for Peer-to-Peer Networks

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Proc. Fifth International Conference on Peer-to-Peer Computing. Caronni, G. (ed.). IEEE Computer Society Press, p. 117-124 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  430. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In : Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticle

  431. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  432. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  434. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  436. Published

    Tweet-Deck Diplomacy

    Robinson, N., 12 Jan 2017, RHUL Geopolitics & Security.

    Research output: Other contribution

  437. Published

    Two Dimensional Runlength Constrained Arrays with Equal Horizontal and Vertical Constraints

    Blackburn, S. R., 2006, In : IEEE Transactions on Information Theory. 52, p. 3305-3309 5 p.

    Research output: Contribution to journalArticle

  438. Published

    Two partial orders on the set of antichains

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  439. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Two Rounds RFID Grouping-Proof Protocol

    Abu Ghazalah, S. & Markantonakis, K., 3 May 2016, p. 193-203. 11 p.

    Research output: Contribution to conferencePaper

  441. Published

    Two-dimensional patterns with distinct differences - constructions, bounds, and maximal anticodes

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Mar 2010, In : IEEE Transactions on Information Theory. 56, 3, p. 1216-1229 14 p.

    Research output: Contribution to journalArticle

  442. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Ubiquitous one-time password service using generic authentication architecture

    Chen, C., Mitchell, C. J. & Tang, S., Nov 2010. 8 p.

    Research output: Contribution to conferencePaper

  444. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In : Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticle

  445. Published

    Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure

    Martin, K. M. & Paterson, M. B., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 143-152 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  446. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  448. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., Jun 2017, In : IEEE Transactions on Information Forensics and Security . 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticle

  449. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Understanding the Value and Potential of Threat Modeling for Application Security Design - An E-Banking Case Study

    Moeckel, C. & Abdallah, A. E., 2011, In : Journal of Information Assurance and Security. 6, 5, p. 346-356 11 p.

    Research output: Contribution to journalArticle

  451. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In : Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticle

  453. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  455. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published

    Unknown quantum states: The quantum de Finetti representation

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Journal of Mathematical Physics. 43, p. 4537-4559 23 p.

    Research output: Contribution to journalArticle

  457. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  458. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In : International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticle

  459. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In : Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticle

  460. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  462. Published

    Updating the parameters of a threshold scheme by minimal broadcast

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In : IEEE Transactions on Information Theory. 51, 2, p. 620-633 14 p.

    Research output: Contribution to journalArticle

  463. Published

    Usability and Security in EU E-Banking Systems - Towards an Integrated Evaluation Framework

    Moeckel, C., 30 Aug 2011. 4 p.

    Research output: Contribution to conferencePaper

  464. Forthcoming

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 9 Apr 2020, (Accepted/In press) Proceedings of SecWeb 2020, 11 September 2020. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  466. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In : International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticle

  467. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  468. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In : Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticle

  470. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  471. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  472. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 2020, In : Frontiers in Energy Research.

    Research output: Contribution to journalArticle

  474. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  477. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  478. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  484. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  487. Published
  488. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  489. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  490. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticle

  491. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  493. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I., 2017, In : Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticle

  494. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D., 2015, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  495. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  496. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  497. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In : Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticle

  498. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution