1. Conference contribution › Research
  2. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 19 May 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    A New Approach to Complex Dynamic Geofencing for Unmanned Aerial Vehicles

    Vagal, V., Markantonakis, K. & Shepherd, C., 14 Apr 2021, (Accepted/In press) 40th IEEE Digital Avionics Systems Conference (DASC). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, Progress in Cryptology – AFRICACRYPT 2019: 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings. Springer, p. 429-447 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, Oct 2020, Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020. p. 195-210 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A Pilot Study Investigating The Process of Risk Assessment and Re-Accreditation in UK Public Sector Systems

    Davies, M., Happa, J. & I, A., 2015, York Doctoral Symposium on Computer Science and Electronics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection

    Xu, Z. & Martin, K. M., 2013, The 15th IEEE International Conference on High Performance Computing and Communications. IEEE, p. 1593-1598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, Proceedings of the IEEE International Conference on Computer Systems and Applications. Washington, DC, USA: IEEE Computer Society Press, p. 851-858 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A Pragmatic System-Failure Assessment and Response Model

    Happa, J., Fairclough, G., Nurse, JRC., Agrafiotis, I., Goldsmith, M. & S, C., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Vol. 1. p. 503-508 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A privacy-aware reputation-based announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. M. & Ng, S-L., 2013, Wireless Vehicular Communications (WiVeC), 2013 IEEE 5th International Symposium on. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A scenario method to automatically assess ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. IEEE Computer Society, p. 544-551 8 p. 6787327

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K., 1 Jan 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. E-pub ahead of print

    A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, (E-pub ahead of print) Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A SECURE CHANNEL PROTOCOL FOR MULTI- APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY

    Markantonakis, K. & Mayes, K., 2004, Eight IFIP TC-6-11 Conference on Communications and Multimedia Security. Kluwer Academic Publishers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A secure electronic Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2003, Proceedings of eTransformation, 16th Bled eCommerce Conference, Bled, Slovenia, June 2003. p. 662-674

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A secure GSM-based Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2004, Proceedings of ICTTA 04, The 1st International Conference on Information & Communication Technologies from Theory to Applications, Damascus, Syria, April 2004. IEEE, p. 77-78 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M., 2010, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    A Security Analysis of Biometric Template Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 6 Jul 2009, Proceedings of the 6th International Conference on Image Analysis and Recognition (ICIAR 2009). Springer-Verlag, p. 429-438

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A security model for anonymous credential systems

    Pashalidis, A. & Mitchell, C. J., 2004, Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, I-NetSec'04. Deswarte, Y., Cuppens, F., Jajodia, S. & Wang, L. (eds.). Kluwer Academic Publishers, p. 183-189 (IFIP Conference Proceedings; vol. 148).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A semantical approach to equilibria and rationality

    Pavlovic, D., 2009, Proceedings of CALCO 2009. Kurz, A. & Tarlecki, A. (eds.). Springer-Verlag, Vol. 5728. p. 317-334 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    A service discovery threat model for ad hoc networks

    Leung, A. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 167-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, (E-pub ahead of print) The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Smart Micro-Grid Architecture for Resource Constrained Environments

    Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 2017, Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to Them

    Sbai, H., Goldsmith, M., Meftali, S. & Happa, J., 23 Sep 2018, (E-pub ahead of print) International Symposium on Cyberspace Safety and Security. p. 18-32 15 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors

    Reina, A., Fattori, A. & Cavallaro, L., 14 Apr 2013, ACM European Workshop on Systems Security (EuroSec). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L., 2014, Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A taxonomy of single sign-on systems

    Pashalidis, A. & Mitchell, C. J., 2003, Information Security and Privacy - 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11 2003, Proceedings. Safavi-Naini, R. & Seberry, J. (eds.). Springer-Verlag, Vol. 2727. p. 249-264 16 p. (Lecture Notes in Computer Science; vol. 2727).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    A user-centric m-payment solution

    Zhang, Q., Mayes, K. & Markantonakis, K., 1 Nov 2005, Mobile Technology, Applications and Systems, 2005 2nd International Conference on. p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Access control and authorization constraints for WS-BPEL

    Bertino, E., Crampton, J. & Paci, F., 2006, Proceedings of IEEE International Conference on Web Services. IEEE Computer Society Press, p. 275-284 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 2017, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Springer, p. 239-251 13 p. (Lecture Notes in Computer Science; vol. 10242).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of 3rd Annual Information Security South Africa Conference (ISSA 2003). p. 75-88 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 2 May 2019, CHI '19: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-12 12 p. 181

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 210-215 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. In preparation

    Achieving secure and efficient lattice-based public-key encryption: the impact of the secret-key distribution

    Bhattacharya, S., Garcia-Morchon, O., Player, R. & Tolhuizen, L., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Actor-Network Procedures

    Pavlovic, D. & Meadows, C., 2012, Distributed Computing and Internet Technology: 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012: Proceedings. Ramanujam, R. & Ramaswamy, S. (eds.). Springer-Verlag, p. 7-26 (Lecture Notes in Computer Science; vol. 7154).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Actual and perceived levels of risk in consumer e-commerce

    Jarupunphol, P. & Mitchell, C. J., 2001, Proceedings - 2nd International We-B Conference 2001, Perth, Western Australia, November 2001. p. 207-216 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Addressing privacy issues in location-based collaborative and distributed environments

    Saracino, A., Sgandurra, D. & Spagnuelo, D., 2014, 2014 International Conference on Collaboration Technologies and Systems, CTS 2014. IEEE Computer Society, p. 166-172 7 p. 6867560

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. E-pub ahead of print

    Adversary Model for Attacks Against IEC 61850 Real-Time Communication Protocols

    Nweke, L. O., Kahsay Weldehawaryat, G. & Wolthusen, S. D., 11 May 2020, (E-pub ahead of print) 2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020. Institute of Electrical and Electronics Engineers Inc., p. 1-8 8 p. 9089346. (2020 16th International Conference on the Design of Reliable Communication Networks, DRCN 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. E-pub ahead of print

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 22 Nov 2019, (E-pub ahead of print) ASIACRYPT 2019. p. 371-397 17 p. (Lecture Notes in Computer Science; vol. 11923).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    An Algebraic Approach to the Analysis of Constrained Workflow Systems

    Crampton, J., 2004, Proceedings of 3rd Workshop on Foundations of Computer Security (FCS'04). p. 61-74 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    An Analysis of Cyclical Interdependencies in Critical Infrastructures

    Svendsen, N. & Wolthusen, S. D., 3 Oct 2007, Proc. Second International Workshop on Critical Information Infrastructures Security (CRITIS 2007). Springer-Verlag, p. 25-36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    An Analysis of Phishing Blacklists: Google Safe Browsing, OpenPhish, and PhishTank

    Bell, S. & Komisarczuk, P., 4 Feb 2020, Proceedings of the Australasian Computer Science Week Multiconference 2020, ACSW 2020. Association for Computing Machinery (ACM), p. 1-11 11 p. 3. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    An analysis of the 3gpp-MAC scheme

    Knudsen, L. R. & Mitchell, C. J., 2001, Proceedings of WCC 2001, Paris, France, 8-12 January 2001. Augot, D. & Carlet, C. (eds.). p. 319-328 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    An Analysis of the Hermes8 Stream Ciphers

    Babbage, S., Cid, C., Pramstaller, N. & Raddum, H., 2007, Proceedings of the 12th Australasian Conference on Information Security and Privacy, ACISP 2007. Springer, Vol. 4586. p. 1-10 11 p. (Lecture Notes in Computer Science - LNCS; vol. 4586).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    An anonymous and undeniable payment scheme

    Chen, LI. & Mitchell, C. J., 1997, Proceedings of the First International Conference on Information and Communications Security, ICICS '97, Beijing, China, November 1997. Han, Y., Okamoto, T. & Qing, S. (eds.). Springer-Verlag, p. 478-482 5 p. (Lecture Notes in Computer Science; no. 1334).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...8 9 10 11 12 13 14 15 ...22 Next