1. Anthology › Research
  2. Published
  3. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  4. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  5. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  6. Book › Research
  7. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  8. Published

    Achieving context awareness and intelligence in cognitive radio networks using reinforcement learning for stateful applications

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, School of Engineering and Computer Science, Victoria University of Wellington.

    Research output: Book/ReportBook

  9. Forthcoming

    Air

    Adey, P., 2013, (Accepted/In press) London: Reaktion Books.

    Research output: Book/ReportBook

  10. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M., 2006, Springer.

    Research output: Book/ReportBook

  11. Published

    Crime, Regulation and Control During the Blitz: Protecting the Population of Bombed Cities

    Adey, P., Cox, D. J. & Godfrey, B., Mar 2016, Bloomsbury Academic. 272 p. (History of Crime Deviance and Punishment)

    Research output: Book/ReportBook

  12. Published

    Cryptography: The Key to Digital Security, How it Works, and Why it Matters

    Martin, K. M., 2020, New York: W.W. Norton. 320 p.

    Research output: Book/ReportBook

  13. Published

    Digital Identity: Ground-up Perspectives

    Coles-Kemp, L. & Heath, C. P. R., 2020, 46 p.

    Research output: Book/ReportBook

  14. Published

    Enumeration of Finite Groups

    Blackburn, S. R., Neumann, P. M. & Venkataraman, G., 2007, Cambridge: Cambridge University Press.

    Research output: Book/ReportBook

  15. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  16. Published

    Everyday Cryptography: Fundamental Principles & Applications

    Martin, K., 8 Jun 2017, 2nd ed. Oxford University Press. 720 p.

    Research output: Book/ReportBook

  17. Published
  18. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.), 8 May 2018, Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  19. Published

    Levitation: The Science, Myth and Magic of Suspension

    Adey, P., 1 May 2017, London: Reaktion Books. 272 p.

    Research output: Book/ReportBook

  20. Published

    Mobility (Second edition)

    Adey, P., 2017, 2nd ed. Routledge. 386 p.

    Research output: Book/ReportBook

  21. Published

    Pairing 2008

    Galbraith, S. D. (ed.) & Paterson, K. G. (ed.), 2008, Springer. (Lecture Notes in Computer Science)

    Research output: Book/ReportBook

  22. Published

    PKI revisited - current issues and future trends

    Price, G. (ed.), Piper, F. (ed.) & Paterson, K. G. (ed.), 2003, Unkown Publisher. (Information Security Technical Report)

    Research output: Book/ReportBook

  23. Published

    Practical Signcryption

    Dent, A. W. (ed.) & Zheng, Y. (ed.), 2010, Springer-Verlag.

    Research output: Book/ReportBook

  24. Published

    Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    De Capitani di Vimercati, S. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. 195 p. (Lecture Notes in Computer Science; vol. 7868)

    Research output: Book/ReportBook

  25. Published

    Secure Smart, Embedded Devices, Platforms and Applications

    Mayes, K. & Markantonakis, K., 2014, Springer. 568 p.

    Research output: Book/ReportBook

  26. Published

    Smart Cards, Tokens, Security and Applications

    Mayes, K. & Markantonakis, K., 2010, Springer.

    Research output: Book/ReportBook

  27. In preparation

    The Way We Evacuate: emergency, reproduction and the aesthetics of mobility

    Adey, P., 2020, (In preparation) Duke University Press.

    Research output: Book/ReportBook

  28. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  29. Master's Thesis › Research
  30. Published

    Securing Financially Sensitive Environments with OpenBSD

    Humphrey, N. C. P., 18 Jan 2008

    Research output: ThesisMaster's Thesis

  31. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  32. Doctoral Thesis › Research
  33. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  34. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  35. Unpublished

    Addressing Security and Privacy Issues in Low-Cost RFID Systems

    Bilal, Z., 2015, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  36. Unpublished

    Advancements in Proxy Re-Encryption: Defining Security for wider Applications

    Lee, E., 2020, (Unpublished) 221 p.

    Research output: ThesisDoctoral Thesis

  37. Unpublished

    An Analysis of Primality Testing and Its Use in Cryptographic Applications

    Massimo, J., 2020, (Unpublished) 209 p.

    Research output: ThesisDoctoral Thesis

  38. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T., 2018, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  39. Unpublished

    An Analysis of TLS 1.3 and its use in Composite Protocols

    Hoyland, J., 2018, (Unpublished) 273 p.

    Research output: ThesisDoctoral Thesis

  40. Unpublished

    Analysis and Classification of Android Malware

    Tam, K., 18 May 2016, (Unpublished) 197 p.

    Research output: ThesisDoctoral Thesis

  41. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  42. Unpublished

    Analysis of Lightweight and Efficient Symmetric-Key Primitives

    Ankele, R., 2018, (Unpublished) 257 p.

    Research output: ThesisDoctoral Thesis

  43. Unpublished

    Analysis of Public-Key Encryption Schemes in Extended Attack Models

    Sibborn, D., 2015, (Unpublished) 242 p.

    Research output: ThesisDoctoral Thesis

  44. Unpublished
  45. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  46. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  47. Unpublished

    Authenticated Encryption in Theory and in Practice

    Degabriele, J., 2014, (Unpublished) 182 p.

    Research output: ThesisDoctoral Thesis

  48. Unpublished

    Authentication by Gesture Recognition: a Dynamic Biometric Application

    Ducray, B., 2017, (Unpublished) 146 p.

    Research output: ThesisDoctoral Thesis

  49. Unpublished

    Authentication Issues in Near Field Communication and RFID

    Saeed, Q., 2014, (Unpublished) 137 p.

    Research output: ThesisDoctoral Thesis

  50. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  51. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  52. Unpublished

    Building and breaking encrypted search schemes for ordered data

    Lacharite, M-S., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  53. Unpublished

    Challenging Environments: Using Mobile Devices for Security

    Cobourne, S., 2018, (Unpublished) 230 p.

    Research output: ThesisDoctoral Thesis

  54. Unpublished

    Cold Boot Attacks on Post-Quantum Schemes

    Villanueva Polanco, R., 8 Mar 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  55. Unpublished

    Combinatorial Aspects of Key Predistribution for Resource-Constrained Networks

    Kendall, M., 2013, (Unpublished) 194 p.

    Research output: ThesisDoctoral Thesis

  56. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C., 2018, (Unpublished) 141 p.

    Research output: ThesisDoctoral Thesis

  57. Unpublished

    Computing Functions Securely: Theory, Implementation and Cryptanalysis

    Davidson, A., 2019, (Unpublished) 383 p.

    Research output: ThesisDoctoral Thesis

  58. Unpublished

    Context Based Anomaly Detection in Critical Infrastructures

    Mcevoy, T. R., 2013, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  59. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G., 2016, (Unpublished) 374 p.

    Research output: ThesisDoctoral Thesis

  60. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  61. Unpublished

    Cryptographic Security of SSH Encryption Schemes

    Hansen, T., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  62. Unpublished
  63. Unpublished

    Design and Analysis of Electronic Feedback Mechanisms

    Li, Q., 2012, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  64. Unpublished
  65. Published

    Drawing out interaction: Lines around shared space.

    Heath, C. P., 2014, 382 p.

    Research output: ThesisDoctoral Thesis

  66. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  67. Unpublished

    Enhancing the Security of Centralised and Distributed Payments

    Jayasinghe, D., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  68. Unpublished

    Generic Access Control of Cloud Storage Using Attribute-Based Cryptography

    Xu, Z., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  69. Published

    Grupos de Bieberbach Metabelianos com Quociente Derivado Finito

    Cid, C., 14 Jul 1999, 90 p.

    Research output: ThesisDoctoral Thesis

  70. Published
  71. Unpublished

    Improvements and Generalisations of Signcryption Schemes

    Zhang, W., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  72. Unpublished

    Improving security and privacy in current mobile systems

    Khan, M., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  73. Unpublished

    Improving the Security of Real World Identity Management Systems

    Li, W., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  74. Unpublished

    Language in the Age of Algorithmic Reproduction: A Critique of Linguistic Capitalism

    Thornton, P., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  75. Unpublished

    Machine Learning Techniques for Evolving Threats

    Jordaney, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  76. Unpublished

    Managing Identity Management Systems

    Al-Sinani, H., 2012, (Unpublished) 423 p.

    Research output: ThesisDoctoral Thesis

  77. Unpublished

    Maximum-Matching based Maintenance of Structural Controllability

    Zhang, S., 3 Mar 2020, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  78. Unpublished

    Mitigating the Risk of Insider Threats When Sharing Credentials

    Alawneh, M., 2012, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  79. Unpublished

    Modelling Digital Banking Attackers – Attacker-Centric Approaches in Security

    Moeckel, C., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  80. Unpublished

    Mutual Authentication Protocols for RFID Special Schemes

    Abu Ghazalah, S., 2016, (Unpublished) 181 p.

    Research output: ThesisDoctoral Thesis

  81. Unpublished

    New Attacks on FCSR-based Stream Ciphers

    Ali, A., 2011, (Unpublished) 248 p.

    Research output: ThesisDoctoral Thesis

  82. Unpublished

    Non-Interactive Key Exchange and Key Assignment Schemes

    Freire, E. S. V., 2014, (Unpublished)

    Research output: ThesisDoctoral Thesis

  83. Unpublished

    On Enhancing the Security of Time Constrained Mobile Contactless Transactions

    Gurulian, I., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  84. Forthcoming

    On Key Assignment Schemes and Cryptographic Enforcement Mechanisms for Information Flow Policies

    Farley, N., 12 Nov 2018, (Accepted/In press) 187 p.

    Research output: ThesisDoctoral Thesis

  85. Unpublished

    On Methodologies to Select Systems for Automated Personal Identification

    Palmer, A., 2015, (Unpublished) 513 p.

    Research output: ThesisDoctoral Thesis

  86. Unpublished

    On sequences and arrays with specific window properties

    Paterson, K. G., 1993, (Unpublished)

    Research output: ThesisDoctoral Thesis

  87. Unpublished

    On the Design and Implementation of Secure Network Protocols

    Alfardan, N., 2014, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  88. Unpublished

    ON THE SECURITY AND PERFORMANCE OF MOBILE DEVICES IN TRANSPORT TICKETING

    Umar, A., 2018, (Unpublished) 161 p.

    Research output: ThesisDoctoral Thesis

  89. Unpublished

    On the theory of point-weight designs

    Dent, A. W., 2001, (Unpublished)

    Research output: ThesisDoctoral Thesis

  90. Unpublished

    On the use of Attribute-based Encryption in Publicly Verifiable Outsourced Computation

    Alderman, J., 2016, (Unpublished) 277 p.

    Research output: ThesisDoctoral Thesis

  91. Published
  92. Unpublished

    On the Verification of Computation and Data Retrievability

    Janson, C., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  93. Unpublished

    On Using the System Management Mode for Security Purposes

    Rodrigues De Souza, W. A., 2017, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  94. Unpublished

    Parameter selection in lattice-based cryptography

    Player, R., 2018, (Unpublished)

    Research output: ThesisDoctoral Thesis

  95. Unpublished

    Platform Verification and Secure Program Execution in Embedded Devices

    Msgna, M., 2016, (Unpublished) 184 p.

    Research output: ThesisDoctoral Thesis

  96. Unpublished
  97. Unpublished

    Provable Security in the Real World: New Attacks and Analyses

    Woodage, J., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  98. Unpublished

    Public-Key Cryptography with Joint and Related-Key Security

    Thomson, S., 2014, (Unpublished) 192 p.

    Research output: ThesisDoctoral Thesis

  99. Unpublished

    Randomness in Cryptography: Theory Meets Practice

    Hutchinson, D., 23 Feb 2019, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  100. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  101. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  102. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  103. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  104. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis