1. Article › Research › Peer-reviewed
  2. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In: Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticlepeer-review

  3. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In: Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    The Royal Holloway TTP-based key escrow scheme

    Mitchell, C. J., 1996, In: Information Security Technical Report. 1, 1, p. 63-69 7 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    The Sajdak Conjecture

    Blackburn, S. R., 1997, In: Math. Spectrum. 30, No. 1, p. 15-16 2 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., Nov 2019, In: Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    The status of national PKIs - A European overview

    Patsos, D., Ciechanowicz, C. & Piper, F., 1 Feb 2010, In: Information Security Technical Report. 15, 1, p. 13-20 8 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    The Virtual Reconstruction and Daylight Illumination of the Panagia Angeloktisti

    Happa, J., Artusi, A., Dubla, P., Bashford-Rogers, T., Debattista, K., Hulusi, V. & Chalmers, A., 2009, In: Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Cultural Heritage.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In: Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Threats to the Swarm: Security Considerations for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., 2009, In: International Journal on Advances in Security. 2, 2&3, p. 288 - 297

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Threshold Anonymous Announcement in VANETs.

    Chen, LI., Ng, S-L. & Wang, G., Mar 2011, In: IEEE Journal on Selected Areas in Communications. 29, 3, p. 605-615

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Too little too late: Can we control browser fingerprinting?

    Al-Fannah, N. M. & Mitchell, C., 7 Jan 2020, In: Journal of Intellectual Capital. 21, 2, p. 165-180 16 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Torsion-free metabelian groups with commutator quotient C_p^n x C_p^m

    Cid, C., 2002, In: Journal of Algebra. 248, p. 15-36 22 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

    Legg, P. A., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis, I., Goldsmith, M. & Creese, S., 2013, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4, 4, p. 20-37 18 p.

    Research output: Contribution to journalArticlepeer-review

  15. Forthcoming

    Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis

    Crampton, J., Gutin, G. & Majumdar, D., 13 Feb 2021, (Accepted/In press) In: ACM Transactions on Privacy and Security.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Traceability codes

    Blackburn, S., Etzion, T. & Ng, S-L., Nov 2010, In: Journal of Combinatorial Theory, Series A. 117, 8, p. 1049-1057

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Transparent Process Monitoring in a Virtual Environment

    Baiardi, F., Maggiari, D., Sgandurra, D. & Tamberi, F., 2009, In: Electronic Notes in Theoretical Computer Science. 236, p. 85 - 100

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Transport ticketing security and fraud controls

    Mayes, K. E., Markantonakis, K. & Hancke, G., 1 May 2009, In: Information Security Technical Report. 14, 2, p. 87-95 9 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In: Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Two Dimensional Runlength Constrained Arrays with Equal Horizontal and Vertical Constraints

    Blackburn, S. R., 2006, In: IEEE Transactions on Information Theory. 52, p. 3305-3309 5 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Two-dimensional patterns with distinct differences - constructions, bounds, and maximal anticodes

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Mar 2010, In: IEEE Transactions on Information Theory. 56, 3, p. 1216-1229 14 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In: Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., Jun 2017, In: IEEE Transactions on Information Forensics and Security . 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Understanding the Value and Potential of Threat Modeling for Application Security Design - An E-Banking Case Study

    Moeckel, C. & Abdallah, A. E., 2011, In: Journal of Information Assurance and Security. 6, 5, p. 346-356 11 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Unearthing feminist territories and terrains

    Jackman, A., Squire, R., Bruun, J. & Thornton, P., Jun 2020, In: Political Geography. 80, p. 1-12 12 p., 102180.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Unknown quantum states: The quantum de Finetti representation

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Journal of Mathematical Physics. 43, p. 4537-4559 23 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In: International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Unpredictability, information, and chaos

    Caves, C. M. & Schack, R., 1997, In: Complexity. 3, p. 46-57 12 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Updating the parameters of a threshold scheme by minimal broadcast

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: IEEE Transactions on Information Theory. 51, 2, p. 620-633 14 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Using Design Thinking to Understand Cyber Attack Surfaces of Future Smart Grids

    Snow, S., Happa, J., Horrocks, N. & Glencross, M., 30 Oct 2020, In: Frontiers in Energy Research. 8, p. 1-17 17 p., 591999.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I., 2017, In: Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Verification of Hardware combining Multiplication, Division Square Root

    Walter, C. D., 1995, In: Microprocessors and Microsystems. 19, p. 243-245 3 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Virtual relighting of a Roman statue head from Herculaneum: a case study

    Happa, J., Williams, M., Turley, G., Earl, G. P., Dubla, P., Beale, G., Gibbons, G., Debattista, K. & Chalmers, A., 2009, In: Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R., 27 Jul 2017, In: Journal of Sensors. 2017, p. 1-11 11 p., 3186482.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    War and Remembrance: The Case of Finnish Covert Operations in the First World War

    Haggman, A., 10 Dec 2014, In: Strife Journal. 4, p. 14-20 7 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In: IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Web-Services Architecture for Pervasive Computing Environment

    Malik, N. A. & Tomlinson, A., 1 Sep 2009, In: Pakistan Journal of Science. 61, 3, p. 153 - 157

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Website Credential Storage and Two-Factor Web Authentication with a Java SIM

    Hart, J., Markantonakis, K. & Mayes, K., 2010, In: Information security theory and practices: security and privacy of pervasive systems and smart devices. 6033, p. 229-236 8 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D., 2008, In: ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K., 11 Jun 2018, In: Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In: Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Yet another insecure group key distribution scheme using secret sharing

    Mitchell, C., Mar 2021, In: Journal of Information Security and Applications. 57, 4 p., 102713.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In: Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Zero/positive capacities of two-dimensional runlength constrained arrays

    Etzion, T. & Paterson, K. G., 2005, In: IEEE Transactions on Information Theory. 51, 9, p. 3186-3199 14 p.

    Research output: Contribution to journalArticlepeer-review

  50. Article › Research › Not peer-reviewed
  51. Published

    A Bit-fixing PRF with O(1) Collusion-Resistance from LWE

    Davidson, A. & Nishimaki, R., 21 Sep 2018, In: IACR Cryptology ePrint Archive. 2018, 890, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  52. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  53. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  54. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P., 14 Dec 2016, In: IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  55. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T., 1 Jun 2018, In: Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  56. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In: Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  57. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In: IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  58. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In: Computer Weekly.

    Research output: Contribution to journalArticle

  59. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  60. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  61. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S., 6 Aug 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  62. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In: Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  63. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In: Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  64. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A., Jan 2017, In: Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  65. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  66. Published

    Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., 2017, In: IACR Cryptology ePrint Archive. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  67. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  68. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In: Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  69. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In: Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  70. Patent › Research
  71. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  72. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  73. Other report › Research
  74. Published

    AES Security Report: ECRYPT Report D.STVL.2

    Cid, C. & Gilbert, H., 30 Jan 2006, ECRYPT. 73 p.

    Research output: Book/ReportOther report

  75. Published

    Algebraic Cryptanalysis of Symmetric Primitives: ECRYPT report D.STVL.7

    Cid, C., 18 Jul 2008, ECRYPT. 42 p.

    Research output: Book/ReportOther report

  76. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  77. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  78. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  79. Published
  80. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  81. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  82. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  83. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  84. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  85. Commissioned report › Research
  86. Published

    Class Number Relations in Algebraic Number Fields

    Walter, C. D., 1 Apr 1976, University of Cambridge.

    Research output: Book/ReportCommissioned report

  87. Published

    Measurement Study on Malicious Web Servers in the. nz Domain: Final Report September 2009

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, InternetNZ. 1 p.

    Research output: Book/ReportCommissioned report

  88. Anthology › Research
  89. Published

    Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

    Wolthusen, S. D. (ed.), Lopez, J. (ed.) & Setola, R. (ed.), 2 Mar 2012, Heidelberg, Germany: Springer-Verlag. 357 p.

    Research output: Book/ReportAnthology

  90. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  91. Published
  92. Published

    From Above: war, verticality and violence

    Adey, P. (ed.), Whitehead, M. (ed.) & Williams, A. (ed.), 2013, London: Hurst.

    Research output: Book/ReportAnthology

  93. Forthcoming

    Handbook of Mobilities

    Adey, P. (ed.), Bissell, D. (ed.), Hannam, K. (ed.), Merriman, P. (ed.) & Sheller, M. (ed.), 2013, (Accepted/In press) London: Routledge.

    Research output: Book/ReportAnthology

  94. Published

    Information and Communications Security: 11th International Conference, ICICS 2009, Beijing, China, December 2009, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.) & Wang, G. (ed.), 2009, Springer-Verlag. 504 p. (Lecture Notes in Computer Science; vol. 5927)

    Research output: Book/ReportAnthology

  95. Published

    Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings

    Markowitch, A. (ed.), Bilas, A. (ed.), Hoepman, J-H. (ed.), Mitchell, C. J. (ed.) & Quisquater, J-J. (ed.), 2009, Springer-Verlag. 167 p. (Lecture Notes in Computer Science; vol. 5746)

    Research output: Book/ReportAnthology

  96. Published

    Information Security, 18th International Conference, ISC 2015. Trondheim, Norway, September 9-11, 2015. Proceedings.

    Lopez, J. (ed.) & Mitchell, C. J. (ed.), 2015, Springer-Verlag. 570 p. (Lecture Notes in Computer Science; vol. 9290)

    Research output: Book/ReportAnthology

  97. Published

    Mathematics of Dependable Systems: Proceedings of the first IMA Conference, Royal Holloway, September 1993

    Mitchell, C. J. (ed.) & Stavridou, V. (ed.), 1995, Oxford University Press. 295 p.

    Research output: Book/ReportAnthology

  98. Published

    Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013. London, UK, April 8-9, 2013. Proceedings

    Fischer-Hübner, S. (ed.), de Leeuw, E. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. (IFIP Advances in Information and Communications Technology; no. 396)

    Research output: Book/ReportAnthology

  99. Published
  100. Published
  101. Published

    Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

    Livraga, G. (ed.) & Mitchell, C. J. (ed.), Sep 2017, Berlin: Springer-Verlag. 235 p. (Lecture Notes in Computer Science; vol. 10547)

    Research output: Book/ReportAnthology

  102. Published

    Security for Mobility

    Mitchell, C. J. (ed.), 2004, IEE Press. 440 p.

    Research output: Book/ReportAnthology

  103. Published

    Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

    Chen, LI. (ed.) & Mitchell, C. J. (ed.), 2014, Springer-Verlag. 257 p. (Lecture Notes in Computer Science; vol. 8893)

    Research output: Book/ReportAnthology

  104. Published

    Security Standardisation Research: 6th International Conference, SSR 2020, London, UK, November 30 – December 1, 2020, Proceedings

    van der Merwe, T. (ed.), Mitchell, C. J. (ed.) & Mehrnezhad, M. (ed.), 30 Nov 2020, Springer. 169 p. (Lecture Notes in Computer Science; vol. 12529)

    Research output: Book/ReportAnthology

  105. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  106. Published

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, Palgrave Macmillan.

    Research output: Book/ReportAnthology