1. Working paper › Research
  2. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2019, (Submitted).

    Research output: Working paper

  3. E-pub ahead of print
  4. Published

    Anomalous Taint Detection

    Cavallaro, L. & Sekar, R., 1 Jun 2008.

    Research output: Working paper

  5. Published
  6. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  7. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  8. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  9. Forthcoming

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 20 Jul 2019, (Accepted/In press).

    Research output: Working paper

  10. Published

    Diversified Process Replicæ for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006.

    Research output: Working paper

  11. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J., 3 Jun 2016, 4 p.

    Research output: Working paper

  12. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  13. Published
  14. Published

    LISABETH: Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2007.

    Research output: Working paper

  15. Published

    Mining the Network Behavior of Bots

    Cavallaro, L., Kruegel, C. & Vigna, G., 1 Jul 2009.

    Research output: Working paper

  16. Unpublished
  17. Published

    PAriCheck: An efficient pointer arithmetic checker for C programs

    Younan, Y., Phillipaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 1 Jun 2009.

    Research output: Working paper

  18. Unpublished

    PKI - An Insider's View (Extended Abstract)

    Price, G., 2005, (Unpublished).

    Research output: Working paper

  19. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  20. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  21. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  22. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  23. Published
  24. Published
  25. Published
  26. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  27. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  28. Published

    Two partial orders on the set of antichains

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  29. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 9 Nov 2009.

    Research output: Working paper

  30. Exhibition › Research
  31. Published
  32. Published
  33. Other contribution › Research
  34. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution

  35. Published
  36. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  37. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  38. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  39. Published

    Bow ties are cool: an evening at the IISS with Toomas Hendrik Ilves

    Robinson, N. & Haggman, A., 3 Dec 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  40. Published

    Clausewitz and cyber security: towards a new Trinity?

    Haggman, A., 13 Feb 2014, Strife Blog.

    Research output: Other contribution

  41. Published

    Cyber risks to governance, Part I: Silk Road: resisting and reshaping governance

    Haggman, A., 20 Aug 2015, Strife Blog.

    Research output: Other contribution

  42. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  43. Published

    Cyber Weapons as a Game Changer: A Critical Reflection

    Haggman, A., 9 Jun 2015, E-International Relations.

    Research output: Other contribution

  44. Published

    Cyber Weapons Don't Go Boom

    Haggman, A., 9 Jun 2015, 1 p. Information Security Group.

    Research output: Other contribution

  45. Published

    Deconstructing the panopticon

    Haggman, A., 1 May 2014, Strife Blog.

    Research output: Other contribution

  46. Published

    Editorial response: The value of critical Geopolitics & critical security studies

    Robinson, N., Hardy, A. & Wendt, N., 18 Sep 2018, RHUL Geopolitics & Security.

    Research output: Other contribution

  47. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  48. Published

    Estimate All the {LWE, NTRU} Schemes!

    Albrecht, M. R., Curtis, B. R., Deo, A., Davidson, A., Player, R., Postlethwaite, E. W., Virdia, F. & Wunderer, T., 2018, 17 p. Springer.

    Research output: Other contribution

  49. Published

    Gaming...seriously?

    Haggman, A., 28 Mar 2018, TEISS.

    Research output: Other contribution

  50. Published

    Gaming...Seriously?

    Haggman, A., 11 Jul 2017, 1 p. Information Security Group.

    Research output: Other contribution

  51. Published

    How to stay in.eu: A post-Brexit gift from Estonia and an evening inside its Embassy

    Hardy, A., Robinson, N. & Haggman, A., 18 Nov 2016, RHUL Geopolitics & Security.

    Research output: Other contribution

  52. Published

    Impressions from a Talk on the Dark Web

    Davidson, A. & Haggman, A., 16 Feb 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  53. Published
  54. Published
  55. Unpublished
  56. Unpublished
  57. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  58. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  59. Submitted

    Quantum speedups for lattice sieves are tenuous at best

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 2019, (Submitted)

    Research output: Other contribution

  60. Published
  61. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  62. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  63. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  64. Published
  65. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  66. Published
  67. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  68. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  69. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  70. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  71. Published
  72. Published

    Tweet-Deck Diplomacy

    Robinson, N., 12 Jan 2017, RHUL Geopolitics & Security.

    Research output: Other contribution

  73. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  74. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  75. Doctoral Thesis › Research
  76. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  77. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  78. Unpublished

    Addressing Security and Privacy Issues in Low-Cost RFID Systems

    Bilal, Z., 2015, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  79. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T., 2018, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  80. Unpublished

    An Analysis of TLS 1.3 and its use in Composite Protocols

    Hoyland, J., 2018, (Unpublished) 273 p.

    Research output: ThesisDoctoral Thesis

  81. Unpublished

    Analysis and Classification of Android Malware

    Tam, K., 18 May 2016, (Unpublished) 197 p.

    Research output: ThesisDoctoral Thesis

  82. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  83. Unpublished

    Analysis of Lightweight and Efficient Symmetric-Key Primitives

    Ankele, R., 2018, (Unpublished) 257 p.

    Research output: ThesisDoctoral Thesis

  84. Unpublished

    Analysis of Public-Key Encryption Schemes in Extended Attack Models

    Sibborn, D., 2015, (Unpublished) 242 p.

    Research output: ThesisDoctoral Thesis

  85. Unpublished
  86. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  87. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  88. Unpublished

    Authenticated Encryption in Theory and in Practice

    Degabriele, J., 2014, (Unpublished) 182 p.

    Research output: ThesisDoctoral Thesis

  89. Unpublished

    Authentication by Gesture Recognition: a Dynamic Biometric Application

    Ducray, B., 2017, (Unpublished) 146 p.

    Research output: ThesisDoctoral Thesis

  90. Unpublished

    Authentication Issues in Near Field Communication and RFID

    Saeed, Q., 2014, (Unpublished) 137 p.

    Research output: ThesisDoctoral Thesis

  91. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  92. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  93. Unpublished

    Challenging Environments: Using Mobile Devices for Security

    Cobourne, S., 2018, (Unpublished) 230 p.

    Research output: ThesisDoctoral Thesis

  94. Unpublished

    Cold Boot Attacks on Post-Quantum Schemes

    Villanueva Polanco, R., 8 Mar 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  95. Unpublished

    Combinatorial Aspects of Key Predistribution for Resource-Constrained Networks

    Kendall, M., 2013, (Unpublished) 194 p.

    Research output: ThesisDoctoral Thesis

  96. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C., 2018, (Unpublished) 141 p.

    Research output: ThesisDoctoral Thesis

  97. Unpublished

    Context Based Anomaly Detection in Critical Infrastructures

    Mcevoy, T. R., 2013, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  98. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G., 2016, (Unpublished) 374 p.

    Research output: ThesisDoctoral Thesis

  99. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  100. Unpublished
  101. Unpublished

    Design and Analysis of Electronic Feedback Mechanisms

    Li, Q., 2012, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  102. Published

    Drawing out interaction: Lines around shared space.

    Heath, C. P., 2014, 382 p.

    Research output: ThesisDoctoral Thesis

  103. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  104. Unpublished

    Enhancing the Security of Centralised and Distributed Payments

    Jayasinghe, D., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

Previous 1 2 3 4 5 6 7 8 ...20 Next