1. Conference contribution › Research
  2. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Guenther, F., Paterson, K. & Marson, G. A., 1 Aug 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Deriving authentication for pervasive security

    Pavlovic, D. & Meadows, C., 2008, Proceedings of the ISTPS 2008. McLean, J. (ed.). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Designing Workflows for Grid Enabled Internet Instruments

    Stirling, D., Welch, I. & Komisarczuk, P., 2008, 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France. p. 218-225 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892. p. 459-475 17 p. (Lecture Notes in Computer Science; vol. 10892).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Digital Liminalities: Understanding Isolated Communities on the Edge

    Jensen, R. B., Coles-Kemp, L., Wendt, N. & Lewis, M., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Digital rights management using a mobile phone

    Abbadi, I. & Mitchell, C. J., 2007, Proceedings of ICEC 2007, Ninth International Conference on Electronic Commerce, Minneapolis, USA, August 2007. ACM Press, p. 185-194 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N. & Ko, R. K. L., 2014, The 7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (IEEE SpaIoT 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Marmol, F. G., Tapiador, J. E. & Dong, M. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Digitalised Welfare: Systems For Both Seeing and Working With Mess

    Morris, A., Coles-Kemp, L. & Jones, W., Jul 2020, WebSci '20 conference. ACM, p. 26-31 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Digitally signed documents - Ambiguities and solutions

    Alsaid, A. & Mitchell, C. J., 2004, Proceedings - International Network Conference 2004 (INC 2004), University of Plymouth, UK, July 2004. Plymouth University, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Forthcoming

    Distance Bounding for RFID: Effectiveness of Terrorist Fraud

    Hancke, G., Nov 2012, (Accepted/In press) IEEE RFID-TA. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Distinguishing Exponent Digits by Observing Modular Subtractions

    Walter, C. D. & Thompson, S., 2001, CT-RSA 2001. Naccache, D. (ed.). Springer, Vol. 2020. p. 192-207 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Distributed Conformal Anomaly Detection

    Nouretdinov, I., 2 Feb 2017, Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Diversified Process Replicae for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. & Markantonakis, K., 18 Nov 2015, 20th European Symposium on Research in Computer Security (ESORICS 2015). Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. In preparation

    Evaluating the effectiveness of heuristic worst-case noise analysis in FHE

    Costache, A., Laine, K. & Player, R., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Exploring new and emerging applications of cognitive radio systems: Preliminary insights and framework

    Yau, K-L. A., Tan, F-A. G., Komisarczuk, P. & Teal, P. D., 2011, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium on. p. 153-157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. E-pub ahead of print

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 10 Jan 2020, SAC 2019. Springer, p. 467-491 25 p. (Lecture Notes in Computer Science; vol. 11959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Exponentiation using Division Chains

    Walter, C. D., 1997, 13th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 92-97 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Extended privilege inheritance in RBAC

    Dekker, M., Cederquist, J. G., Crampton, J. & Etalle, S., 2007, Proceedings of 2007 ACM Symposium on Information, Computer and Communications Security. Bao, F. & Miller, S. (eds.). ACM Press, p. 383-385 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Extending EMV to support Murabaha transactions

    Al-Meaither, M. & Mitchell, C. J., 2003, NORDSEC 2003, Proceedings of the Seventh Nordic Workshop on Secure IT Systems - Encouraging Cooperation, Gjøvik University College, Norway, October 2003. p. 95-108 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Failures of SET implementation - What is amiss?

    Jarupunphol, P. & Mitchell, C. J., 2002, Proceedings - APDSI 2002, 7th Asia-Pacific Decision Sciences Institute Conference, Bangkok, Thailand, July 2002. 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Fast Scalar Multiplication for ECC over GF(it p) using Division Chains

    Walter, C. D., 2011, WISA 2010. Chung, Y. & Yung, M. (eds.). Springer, Vol. 6513. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. E-pub ahead of print

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k)

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 10 Aug 2020, CRYPTO 2020. Springer, p. 186-212 27 p. (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Feature Correlation Attack on Biometric Privacy Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009). IEEE Computer Society Press, p. 1061-1065

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...21 Next