1. Article › Research › Peer-reviewed
  2. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In: Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    'Pour votre tranquillité': Ambiance, atmosphere, and surveillance

    Adey, P., Brayer, L., Masson, D., Murphy, P., Simpson, P. & Tixier, N., Oct 2013, In: Geoforum. 49, p. 299-309 11 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In: Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Practical eavesdropping and skimming attacks on high-frequency RFID tokens

    Hancke, G., 2011, In: Journal of Computer Security. p. 259 288 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Predicting nonlinear pseudorandom number generators

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2005, In: Math. Comp.. 74, p. 1471-1494 24 p.

    Research output: Contribution to journalArticlepeer-review

  8. E-pub ahead of print

    Prenatal and perinatal risk and protective factors for psychosis: a systematic review and meta-analysis

    Davies, C., Segre, G., Estradé, A., Radua, J., De Micheli, A., Provenzani, U., Oliver, D., Salazar de Pablo, G., Ramella-Cravaro, V., Besozzi, M., Dazzan, P., Miele, M., Caputo, G., Spallarossa, C., Crossland, G., Ilyas, A., Spada, G., Politi, P., Murray, R., McGuire, P. & 1 others, Fusar-Poli, P., 24 Mar 2020, (E-pub ahead of print) In: The Lancet Psychiatry. p. 1-12 12 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Preparation information and optimal decompositions for mixed quantum states

    Soklakov, A. N. & Schack, R., 2000, In: J. Mod. Opt.. 47, p. 2265-2276 12 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Privacy and Consent in Pervasive Networks

    Malik, N. A. & Tomlinson, A., 1 Aug 2009, In: Information Security Technical Report. 14, 3, p. 138 - 142

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 2018, In: Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Privacy Threats in a Mobile Enterprise Social Network

    Tomlinson, A., Yau, P-W. & MacDonald, J. A., 1 May 2010, In: Information Security Technical Report. 15, 2, p. 57 - 66

    Research output: Contribution to journalArticlepeer-review

  13. E-pub ahead of print

    Privacy-preserving Group Authentication for RFID Tags Using Bit-Collision Patterns

    Yang, A., Boshoff, D., Hu, Q., Hancke, G., Luo, X., Weng, J., Mayes, K. & Markantonakis, K., 12 Feb 2021, (E-pub ahead of print) In: IEEE Internet of Things Journal.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. & Ng, S., Jul 2017, In: IET Information Security . 11, 4, p. 204-210 7 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Problems and prospects of multi application smart cards in the UK financial industry

    Markantonakis, K. & Mayes, K., 2007, In: Icebe 2007: ieee international conference on e-Business engineering, proceedings. p. 447-452 6 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Producing ‘good enough’ automated transcripts securely: Extending Bokhove and Downey (2018) to address security concerns

    Da Silva, J., Feb 2021, In: Methodological Innovations.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Products of subsets in an abelian group

    Blackburn, S. R. & Spencer, A. J., 2003, In: Journal of Combinatorial Theory, Series A. 103, p. 53-68 16 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Prolific codes with the identifiable parent property

    Blackburn, S. R., Etzion, T. & Ng, S-L., 2008, In: SIAM Journal on Discrete Mathematics. 22, 4, p. 1393-1410 18 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Properties of the Error Linear Complexity Spectrum

    Etzion, T., Kalouptsidis, N., Kolokotronis, N., Limniotis, K. & Paterson, K. G., 2009, In: IEEE Transactions on Information Theory. 55, 10, p. 4681-4686 6 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Properties of the frequency operator do not imply the quantum probability postulate

    Caves, C. M. & Schack, R., 2005, In: Ann. Phys.. 315, p. 123-146 24 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Protocols and cryptography

    Ciechanowicz, C., 1 Feb 2010, In: Information Security Technical Report. 15, 1, p. 1

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G., 2011, In: IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In: ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In: Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In: Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In: Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Putting dots in triangles

    Blackburn, S., Paterson, M. & Stinson, D. R., 2011, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 78, p. 23-32

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In: Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In: Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Quantum chaos in open systems: a quantum state diffusion analysis

    Brun, T. A., Percival, I. C. & Schack, R., 1996, In: Journal of Physics A: Mathematical and General. 29, p. 2077-2090 14 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In: ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Quantum probabilities as Bayesian probabilities

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 65, p. 022305 1 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Quantum probability from decision theory?

    Barnum, H., Caves, C. M., Finkelstein, J., Fuchs, C. A. & Schack, R., 2000, In: Proc. R. Soc. Lond. A. 456, p. 1175-1182 8 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Quantum state diffusion with a moving basis: computing quantum-optical spectra

    Schack, R., Brun, T. A. & Percival, I. C., 1996, In: Physical Review A. 53, p. 2694 1 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Quantum state diffusion, localization and computation

    Schack, R., Brun, T. A. & Percival, I. C., 1995, In: Journal of Physics A: Mathematical and General. 28, p. 5401-5413 13 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Quantum theory from four of Hardy's axioms

    Schack, R., 2003, In: Foundations of Physics. 33, p. 1461-1468 8 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Quantum-nondemolition measurement of small photon numbers and the preparation of number states

    Schack, R., Breitenbach, A. & Schenzle, A., 1992, In: Physical Review A. 45, p. 3260-3267 8 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Realizing the quantum baker's map on a NMR quantum computer

    Brun, T. A. & Schack, R., 1999, In: Physical Review A. 59, p. 2649-2658 10 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Recent developments in cryptographic hash functions: Security implications and future directions

    Cid, C., 2006, In: Information Security Technical Report. 11, 2, p. 100 - 107 8 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Reconstructing noisy polynomial evaluation in residue rings

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2006, In: J. Algorithms. 61, p. 47-59 13 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Redundant integer representations and fast exponentiation

    Gollmann, D., Han, Y. & Mitchell, C. J., 1996, In: Designs, Codes and Cryptography. 7, p. 135-151 17 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2012, In: Journal of Network and Computer Applications. 35, 1, p. 253-267 15 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., Oct 2018, In: Journal of Cryptology. 31, 4, p. 917-964 48 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Relating toy models of quantum computation: comprehension, complementarity and dagger autonomous categories

    Pavlovic, D., 2011, In: Electronic Notes in Theoretical Computer Science. 270, 2, p. 121-139 19 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Remarks on KRA's key recovery block format

    Rantos, K. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 632-634 3 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K., 2014, In: International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N. & Naccache, D., Jun 2019, In: digital investigation. 29, p. 198-209 12 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Rendering Interior Cultural Heritage Scenes Using Image-Based Shooting

    Happa, J., Bashford-Rogers, T., Debattista, K. & Chalmers, A., 2011, In: Eurographics, Heritage Area Paper.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Resolvable Designs Applicable to Cryptographic Authentication Schemes

    Martin, K. M., Seberry, J. & Wild, P., 1992, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 12, p. 153-160 8 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    RGFGA: An efficient representation and crossover for grouping genetic algorithms

    Tucker, A., Crampton, J. & Swift, S., 2005, In: Evolutionary Computation. 13, 4, p. 477-500 24 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Risk analysis: Requirements, conflicts and problems

    Ciechanowicz, Z., 1 Jan 1997, In: Computers and Security. 16, 3, p. 223-232 10 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Risk analysis of Android applications: A user-centric solution

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Sep 2015, In: Future Generation Computer Systems.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering

    Paterson, K. G., 1998, In: Designs, Codes and Cryptography. 14, p. 247-259 13 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In: Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Secret, verifiable auctions from elections

    Quaglia, E. & Smyth, B., 19 Jun 2018, In: Theoretical Computer Science. 730, p. 44-92 49 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Securing Autonomous Networks through Virtual Closure

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Jun 2016, In: International Journal of Intelligent Computing Research (IJICR). 7, 2, p. 694-705 12 p.

    Research output: Contribution to journalArticlepeer-review

  57. Forthcoming

    Securing emergent behaviour in swarm robotics

    Chen, L. & Ng, S-L., 20 Oct 2021, (Accepted/In press) In: Journal of Information Security and Applications.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Securing the volume/volumen: Comments on Stuart Elden's Plenary paper 'Secure the volume'

    Adey, P., May 2013, In: Political Geography. 34, p. 52-54 3 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Security and the politics of resilience: An aesthetic response

    Grove, K. & Adey, P., 1 Feb 2015, In: Politics. 35, 1, p. 78-84 7 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

    Yau, K-L. A., Poh, G. S. & Komisarczuk, P., 2013, In: IJAHUC. 12, 3, p. 157-176 20 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Security atmospheres or the crystallisation of worlds

    Adey, P., 1 Jan 2014, In: Environment and Planning D: Society and Space. 32, 5, p. 834-851 18 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G., Markantonakis, K. & Mayes, K., May 2010, In: Journal of Internet Technology. 11, 3, p. 307 313 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Security Constraints on the Oswald-Aigner Exponentiation Algorithm

    Walter, C. D., 2003, In: IACR Cryptology ePrint Archive. 2003, p. 13 1 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Security defects in C.C.I.T.T. Recommendation X.509 - The directory authentication framework

    I'Anson, C. & Mitchell, C. J., Apr 1990, In: Computer Communication Review. 20, 2, p. 30-34 5 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In: The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S., Jan 2018, In: Cryptography and Communications. 10, 1, p. 41-58 18 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In: International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Separability of very noisy mixed states and implications for NMR quantum computing

    Braunstein, S. L., Caves, C. M., Jozsa, R., Linden, N., Popescu, S. & Schack, R., 1999, In: Physical Review Letters. 83, p. 1054-1057 4 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In: Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Shifts on a finite qubit string: A class of quantum baker's maps

    Schack, R. & Caves, C. M., 2000, In: Applicable Algebra in Engineering, Communication and Computing (AAECC). 10, p. 305-310 6 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Shoe: Towards a Promiscuous Politics of Emergency Evacuation Mobility

    Adey, P., 1 Apr 2020, In: Environment and Planning D: Society and Space. 38, 2, p. 364-382 19 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In: Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticlepeer-review

  73. E-pub ahead of print

    Signposts: Cyprus, the UK and the Future of the SBAs

    Dodds, K-J., Jensen, R. & Constantinou, C., 7 Nov 2015, (E-pub ahead of print) In: RUSI Journal. 160, 5, p. 36-45 10 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Simple algorithm for local conversion of pure states

    Jensen, J. G. & Schack, R., 2001, In: Physical Review A. 63, p. 062303 1 p.

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Simplification and Generalisation of the Wu-Wu Broadcasting Cryptosystem

    Martin, K. M., 1998, In: Electronics Letters. 34, 24, p. 2328-2329 2 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    Simulation on a quantum computer

    Schack, R., 2006, In: Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Single Track Circuit Codes

    Hiltgen, A. P. & Paterson, K. G., 2001, In: IEEE Transactions on Information Theory. 47, 6, p. 2587-2595 9 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Single Track Gray Codes

    Hiltgen, A. P., Paterson, K. G. & Brandestini, M., 1996, In: IEEE Transactions on Information Theory. 42, p. 1555-1561.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Single--chip 2-port Adapters for Wave Digital Filters

    Tomlinson, A. & Mirza, A. R., 1989, In: Electronics Letters. 25, 23, p. 1553-1555 3 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Smart card based authentication - any future?

    Markantonakis, K., Mayes, K. & Fred, P., 2005, In: Computers and Security. 24, 3, p. 188-191 4 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Smart cards and the associated infrastructure problem

    Paterson, K. G., Piper, F. & Robshaw, M., 2002, In: Information Security Technical Report. 7, 3, p. 20-29 10 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals

    Ibrahim, S., Dec 2016, In: International Journal of Law, Crime and Justice. 47, p. 44-57 14 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Solutions to the multidestination secure electronic mail problem

    Mitchell, C. J. & Walker, M., 1988, In: Computers and Security. 7, p. 483-488 6 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Some New Circuit Codes

    Paterson, K. G. & Tuliani, J., 1998, In: IEEE Transactions on Information Theory. 44, p. 1305-1309 5 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Some properties of the Yoshiara family of planes.

    Ng, S-L., 2002, In: European Journal of Combinatorics. 23, p. 77-81 5 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Some Remarks on an Algorithm of Fitzpatrick

    Blackburn, S. R. & Chambers, W. G., 1996, In: IEEE Transactions on Information Theory. 42, 4, p. 1269-1271 3 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In: Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In: IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Space/Time Trade-Offs for Higher Radix Modular Multiplication using Repeated Addition

    Walter, C. D., 1997, In: IEEE Transactions on Computers. 46, 2, p. 139-141 3 p.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Squeezed light from a laser with an internal chi2-nonlinear element

    Schack, R., Sizmann, A. & Schenzle, A., 1991, In: Physical Review A. 43, p. 6303 1 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Squeezed light from a self-frequency doubling laser

    Sizmann, A., Schack, R. & Schenzle, A., 1990, In: Europhysics Letters. 13, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Standardising authentication protocols based on public key techniques

    Mitchell, C. J. & Thomas, A., 1993, In: Journal of Computer Security. 2, p. 23-36 14 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    State preparation based on Grover's algorithm in the presence of global information about the state

    Soklakov, A. N. & Schack, R., 2005, In: Optics and Spectroscopy. 99, p. 211-217 7 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Statistical attacks on cookie masking for RC4

    Paterson, K., Sep 2018, In: Cryptography and Communications. 10, 5, p. 777-801 25 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Still Faster Modular Multiplication

    Walter, C. D., 1995, In: Electronics Letters. 31, 4, p. 263-264 2 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    Storage efficient decoding for a class of binary de Bruijn sequences

    Paterson, K. G. & Robshaw, M. J. B., 1995, In: Discrete Mathematics. 138, p. 327-341 15 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    Subjective probability and quantum certainty

    Caves, C. M., Fuchs, C. A. & Schack, R., 2007, In: Studies in History and Philosophy of Modern Physics. 38, 2, p. 255-274 20 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Substitution Attacks against Message Authentication

    Armour, M. & Poettering, B., 20 Sep 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 3, p. 152-168 17 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., 1 Oct 2017, In: IEEE Transactions on Mobile Computing. 16, 10, p. 2927-2940 14 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Supporting user privacy in location based services

    Gajparia, A., Mitchell, C. J. & Yeun, C. Y., 2005, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-B, p. 2837-2847 11 p.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    Switch minimisation for a simple bidirectional network

    Mitchell, C. J. & Wild, P. R., 1988, In: Electronics Letters. 24, 20, p. 1284-1286 3 p.

    Research output: Contribution to journalArticlepeer-review