1. Doctoral Thesis › Research
  2. Published

    Drawing out interaction: Lines around shared space.

    Heath, C. P., 2014, 382 p.

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  4. Unpublished

    Enhancing the Security of Centralised and Distributed Payments

    Jayasinghe, D., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  5. Unpublished

    Generic Access Control of Cloud Storage Using Attribute-Based Cryptography

    Xu, Z., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  6. Published

    Grupos de Bieberbach Metabelianos com Quociente Derivado Finito

    Cid, C., 14 Jul 1999, 90 p.

    Research output: ThesisDoctoral Thesis

  7. Published
  8. Unpublished

    Improvements and Generalisations of Signcryption Schemes

    Zhang, W., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  9. Unpublished

    Improving security and privacy in current mobile systems

    Khan, M., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  10. Unpublished

    Improving the Security of Real World Identity Management Systems

    Li, W., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  11. Unpublished

    Language in the Age of Algorithmic Reproduction: A Critique of Linguistic Capitalism

    Thornton, P., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  12. Unpublished

    Machine Learning Techniques for Evolving Threats

    Jordaney, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  13. Unpublished

    Managing Identity Management Systems

    Al-Sinani, H., 2012, (Unpublished) 423 p.

    Research output: ThesisDoctoral Thesis

  14. Unpublished

    Maximum-Matching based Maintenance of Structural Controllability

    Zhang, S., 3 Mar 2020, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  15. Unpublished

    Mitigating the Risk of Insider Threats When Sharing Credentials

    Alawneh, M., 2012, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  16. Unpublished

    Mutual Authentication Protocols for RFID Special Schemes

    Abu Ghazalah, S., 2016, (Unpublished) 181 p.

    Research output: ThesisDoctoral Thesis

  17. Unpublished

    New Attacks on FCSR-based Stream Ciphers

    Ali, A., 2011, (Unpublished) 248 p.

    Research output: ThesisDoctoral Thesis

  18. Unpublished

    Non-Interactive Key Exchange and Key Assignment Schemes

    Freire, E. S. V., 2014, (Unpublished)

    Research output: ThesisDoctoral Thesis

  19. Unpublished

    On Enhancing the Security of Time Constrained Mobile Contactless Transactions

    Gurulian, I., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  20. Forthcoming

    On Key Assignment Schemes and Cryptographic Enforcement Mechanisms for Information Flow Policies

    Farley, N., 12 Nov 2018, (Accepted/In press) 187 p.

    Research output: ThesisDoctoral Thesis

  21. Unpublished

    On Methodologies to Select Systems for Automated Personal Identification

    Palmer, A., 2015, (Unpublished) 513 p.

    Research output: ThesisDoctoral Thesis

  22. Unpublished

    On sequences and arrays with specific window properties

    Paterson, K. G., 1993, (Unpublished)

    Research output: ThesisDoctoral Thesis

  23. Unpublished

    On the Design and Implementation of Secure Network Protocols

    Alfardan, N., 2014, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  24. Unpublished

    ON THE SECURITY AND PERFORMANCE OF MOBILE DEVICES IN TRANSPORT TICKETING

    Umar, A., 2018, (Unpublished) 161 p.

    Research output: ThesisDoctoral Thesis

  25. Unpublished

    On the theory of point-weight designs

    Dent, A. W., 2001, (Unpublished)

    Research output: ThesisDoctoral Thesis

  26. Unpublished

    On the use of Attribute-based Encryption in Publicly Verifiable Outsourced Computation

    Alderman, J., 2016, (Unpublished) 277 p.

    Research output: ThesisDoctoral Thesis

  27. Unpublished

    On the Verification of Computation and Data Retrievability

    Janson, C., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  28. Unpublished

    On Using the System Management Mode for Security Purposes

    Rodrigues De Souza, W. A., 2017, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  29. Unpublished

    Parameter selection in lattice-based cryptography

    Player, R., 2018, (Unpublished)

    Research output: ThesisDoctoral Thesis

  30. Unpublished

    Platform Verification and Secure Program Execution in Embedded Devices

    Msgna, M., 2016, (Unpublished) 184 p.

    Research output: ThesisDoctoral Thesis

  31. Unpublished
  32. Unpublished

    Provable Security in the Real World: New Attacks and Analyses

    Woodage, J., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  33. Unpublished

    Public-Key Cryptography with Joint and Related-Key Security

    Thomson, S., 2014, (Unpublished) 192 p.

    Research output: ThesisDoctoral Thesis

  34. Unpublished

    Randomness in Cryptography: Theory Meets Practice

    Hutchinson, D., 23 Feb 2019, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  35. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  36. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  37. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  38. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  39. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis

  40. Unpublished

    Some Algorithms for Learning with Errors

    Fitzpatrick, R., 21 Aug 2014, (Unpublished) 167 p.

    Research output: ThesisDoctoral Thesis

  41. Published

    Strengthening Password-Based Authentication

    Al Maqbali, F., 2019, 207 p.

    Research output: ThesisDoctoral Thesis

  42. Unpublished
  43. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  44. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  45. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  46. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  47. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  48. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  49. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  50. Published
  51. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  52. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  53. Other contribution › Research
  54. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution

  55. Published

    2FA: Police Digital Security Centre

    Agha, D., May 2020

    Research output: Other contribution

  56. Published
  57. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  58. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  59. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  60. Published
  61. Published

    Bow ties are cool: an evening at the IISS with Toomas Hendrik Ilves

    Robinson, N. & Haggman, A., 3 Dec 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  62. Published

    Clausewitz and cyber security: towards a new Trinity?

    Haggman, A., 13 Feb 2014, Strife Blog.

    Research output: Other contribution

  63. Published

    Cyber risks to governance, Part I: Silk Road: resisting and reshaping governance

    Haggman, A., 20 Aug 2015, Strife Blog.

    Research output: Other contribution

  64. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  65. Published

    Cyber Weapons as a Game Changer: A Critical Reflection

    Haggman, A., 9 Jun 2015, E-International Relations.

    Research output: Other contribution

  66. Published

    Cyber Weapons Don't Go Boom

    Haggman, A., 9 Jun 2015, 1 p. Information Security Group.

    Research output: Other contribution

  67. Published

    Deconstructing the panopticon

    Haggman, A., 1 May 2014, Strife Blog.

    Research output: Other contribution

  68. Published

    Driverless Cars - Have we Learned Lessons From the Past?

    Butler, S., 17 Apr 2018, Information Security Magazine.

    Research output: Other contribution

  69. Published

    Editorial response: The value of critical Geopolitics & critical security studies

    Robinson, N., Hardy, A. & Wendt, N., 18 Sep 2018, RHUL Geopolitics & Security.

    Research output: Other contribution

  70. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  71. Published

    Estimate All the {LWE, NTRU} Schemes!

    Albrecht, M. R., Curtis, B. R., Deo, A., Davidson, A., Player, R., Postlethwaite, E. W., Virdia, F. & Wunderer, T., 2018, 17 p. Springer.

    Research output: Other contribution

  72. Published

    Gaming...seriously?

    Haggman, A., 28 Mar 2018, TEISS.

    Research output: Other contribution

  73. Published

    Gaming...Seriously?

    Haggman, A., 11 Jul 2017, 1 p. Information Security Group.

    Research output: Other contribution

  74. Published

    How to stay in.eu: A post-Brexit gift from Estonia and an evening inside its Embassy

    Hardy, A., Robinson, N. & Haggman, A., 18 Nov 2016, RHUL Geopolitics & Security.

    Research output: Other contribution

  75. Published

    Impressions from a Talk on the Dark Web

    Davidson, A. & Haggman, A., 16 Feb 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  76. Published
  77. Published
  78. Unpublished
  79. Unpublished
  80. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  81. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  82. Submitted

    Quantum speedups for lattice sieves are tenuous at best

    Albrecht, M., Gheorghiu, V., Postlethwaite, E. & Schanck, J., 2019, (Submitted)

    Research output: Other contribution

  83. Published
  84. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  85. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  86. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  87. Published
  88. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  89. Published
  90. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  91. Published
  92. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  93. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  94. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  95. Published
  96. Published

    Tweet-Deck Diplomacy

    Robinson, N., 12 Jan 2017, RHUL Geopolitics & Security.

    Research output: Other contribution

  97. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  98. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  99. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  100. Exhibition › Research
  101. Published
  102. Published
  103. Working paper › Research
  104. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2020, (Submitted).

    Research output: Working paper