Staff
Students
Search
Students
Staff
Find your course
About us
Study here
Departments
& Schools
Student life
International
Research
For business
Alumni
Home
>
Department of Information Security home
>
Research
>
Profile
>
Publications
Department of Information Security
Show 3 research groupings
Show 3 research groupings
CDT in Cyber Security for the Everyday
ISG Smart Card and IoT Security Centre
The Institute of Cyber Security Innovation
Profile
Researchers
Publications
Projects
Advanced search
Advanced search
Organisational unit
Reset
Department of Information Security
CDT in Cyber Security for the Everyday
ISG Smart Card and IoT Security Centre
Information Security Group
The Institute of Cyber Security Innovation
Type
Patent
→ Patent
Other contribution
→ Other contribution
Non-textual form
→ Exhibition
Chapter in Book/Report/Conference proceeding
→ Chapter
→ Entry for encyclopedia/dictionary
→ Conference contribution
→ Other contribution
→ Chapter (peer-reviewed)
Thesis
→ Doctoral Thesis
→ Master's Thesis
Contribution to non-peer-reviewed publication
→ Newspaper article
→ Internet publication
Contribution to journal
→ Article
→ Comment/debate
→ Book/Film/Article review
→ Editorial
→ Special issue
→ Review article
Book/Report
→ Book
→ Anthology
→ Commissioned report
→ Other report
Working paper
→ Working paper
Contribution to conference
→ Paper
→ Poster
→ Abstract
→ Other
Language
English
German
French
Spanish
Italian
Portuguese
Russian
Kazakh
Tswana
German (Austria)
English (New Zealand)
Spanish (Peru)
Icelandic
Hebrew
Arabic (Israel)
Chinese (Traditional)
Chinese (Simplified)
Catalan
Spanish (Puerto Rico)
Ladino
English (Ireland)
Chinese (Hong Kong)
German (Switzerland)
Spanish (Bolivia)
Arabic (Saudi Arabia)
Latvian
Bosnian
Estonian
Korean
Croatian
Dutch
Persian (Iran, Islamic Republic of)
Tajik
Czech
Ukranian
Hungarian
Lithuanian
Romanian
Slovak
Slovenian
Vietnamese
Indonesian
Other
Multiple languages
Undefined/Unknown
Publication year
Choose year
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1963
1800
to
Choose year
2025
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1963
1800
Publication category
Research
Peer-reviewed
Peer-reviewed
Not peer-reviewed
Open Access status
Open
Embargoed
Closed
Indeterminate
None
1 - 10 out of 2,181
Page size:
10
10
25
50
100
500
RSS feed of this list
Sort by:
Type
Publication date
Title
Type
Working paper › Research
Submitted
A Central Limit Framework for Ring-LWE Decryption
Murphy, S.
&
Player, R.
,
2020
, (Submitted).
Research output
:
Working paper
E-pub ahead of print
A note on the optimality of frequency analysis vs. l_p-optimization
Paterson, K.
&
Lacharite, M-S.
,
2015
, (E-pub ahead of print)
3 p.
Research output
:
Working paper
Published
Anomalous Taint Detection
Cavallaro, L.
&
Sekar, R.
,
1 Jun 2008
.
Research output
:
Working paper
Published
Anti-Taint-Analysis: Practical Evasion Techniques Against Information Flow Based Malware Defense
Cavallaro, L.
,
Saxena, P.
&
Sekar, R.
,
1 Nov 2007
.
Research output
:
Working paper
Unpublished
Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers
Gallery, E.
,
Tomlinson, A.
&
Delicata, R.
,
1 Jun 2005
, (Unpublished).
Research output
:
Working paper
Published
Attacking a Trusted Computing Platform [Improving the Security of TCG Specification
Bruschi, D.
,
Cavallaro, L.
,
Lanzi, A.
&
Monga, M.
,
2005
,
Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano
.
Research output
:
Working paper
Published
Conflict of interest policies: A general approach
Crampton, J.
&
Loizou, G.
,
2000
.
Research output
:
Working paper
Published
Diversified Process Replicæ for Defeating Memory Error Exploits
Bruschi, D.
,
Cavallaro, L.
&
Lanzi, A.
,
2006
.
Research output
:
Working paper
Published
Does the IdP Mix-Up attack really work?
Li, W.
&
Mitchell, C. J.
,
3 Jun 2016
,
4 p.
Research output
:
Working paper
Published
Evaluating and improving access control
Crampton, J.
,
Loizou, G.
&
O'Shea, G.
,
1999
.
Research output
:
Working paper
Previous
1
2
3
4
5
6
7
8
...
219
Next
Find an expert
Search for researchers:
Search for research:
Department of Information Security home
Research
Profile
Researchers
Publications
Projects