1. Article › Research › Not peer-reviewed
  2. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T., 1 Jun 2018, In : Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  3. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In : Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  4. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In : IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  5. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  6. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  7. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S., 6 Aug 2018, (Submitted) In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  8. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In : Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  9. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In : Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  10. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A., Jan 2017, In : Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  11. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  12. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  13. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In : Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  14. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In : Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  15. Article › Research › Peer-reviewed
  16. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    RUSH, M. & Ibrahim, S., 1 Mar 2018, In : Sociological Research Online. 23, 1, p. 177-196 20 p.

    Research output: Contribution to journalArticle

  17. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In : Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticle

  18. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In : Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticle

  19. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In : Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticle

  20. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  21. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  22. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticle

  23. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticle

  24. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In : Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticle

  25. Published

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P., 2018, In : GeoHumanities. 4, 2, p. 417-437 21 p.

    Research output: Contribution to journalArticle

  26. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In : Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticle

  27. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In : Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticle

  28. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In : Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticle

  29. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In : International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticle

  30. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In : Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticle

  31. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticle

  32. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In : HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticle

  33. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In : Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticle

  34. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In : Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticle

  35. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In : IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticle

  36. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In : Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticle

  37. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In : Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticle

  38. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In : The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticle

  39. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In : BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticle

  40. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticle

  41. Published

    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, In : E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on. 0, p. 20 1 p.

    Research output: Contribution to journalArticle

  42. E-pub ahead of print

    A new description of orthogonal bases

    Coecke, B., Vicary, J. & Pavlovic, D., 9 Nov 2012, In : Mathematical Structures in Computer Science.

    Research output: Contribution to journalArticle

  43. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In : European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticle

  44. Published

    A note on an upper bound of traceability codes

    Owen, S. & Ng, S-L., 2 Apr 2015, In : Australasian Journal of Combinatorics. 62, 1, p. 140-146 7 p.

    Research output: Contribution to journalArticle

  45. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In : Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticle

  46. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In : Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticle

  47. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In : Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticle

  48. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  49. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K., Mar 2013, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticle

  50. Published

    A pragmatic alternative to undetectable signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Apr 2002, In : Operating Systems Review. 36, 2, p. 6-11 6 p.

    Research output: Contribution to journalArticle

  51. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H., 2006, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticle

  52. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In : Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticle

  53. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In : Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticle

  54. Published

    A Re-painted Amazon

    Earl, G., Beale, G., Happa, J., Williams, M., Turley, G., Martinez, K. & Chalmers, A., 2009, In : Proceedings of EVA: Electronic Information and the Visual Arts.

    Research output: Contribution to journalArticle

  55. Published

    A representation of a family of secret sharing matroids.

    Ng, S-L., 2003, In : Designs, Codes and Cryptography. 30, p. 5-19 15 p.

    Research output: Contribution to journalArticle

  56. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In : IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticle

  57. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In : The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticle

  58. Published

    A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 19 Sep 2017, In : IACR Transactions on Symmetric Cryptology. 2017, 3, p. 73-107 35 p.

    Research output: Contribution to journalArticle

  59. Published

    A security scheme for resource sharing over a network

    Burns, J. & Mitchell, C. J., Feb 1990, In : Computers and Security. 9, 1, p. 67-75 9 p.

    Research output: Contribution to journalArticle

  60. E-pub ahead of print

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., 19 Jun 2019, In : IEEE Transactions on Industrial Informatics. p. 1-11 11 p.

    Research output: Contribution to journalArticle

  61. Published

    A simple necessary decoherence condition for a set of histories

    Scherer, A., Soklakov, A. N. & Schack, R., 2004, In : Physics Letters A. 326, p. 307 1 p.

    Research output: Contribution to journalArticle

  62. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In : Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticle

  63. Published

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D., 1 Mar 2018, In : Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticle

  64. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In : International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticle

  65. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In : ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticle

  66. Published

    A Survey on Security for Mobile Devices

    Polla, M. L., Martinelli, F. & Sgandurra, D., 2013, In : IEEE Communications Surveys and Tutorials. 15, 1, p. 446-471 26 p.

    Research output: Contribution to journalArticle

  67. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In : Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticle

  68. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In : Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticle

  69. Published

    A WEB-BASED BOARD GAME FOR TEACHING ASPECTS OF INTERNET ENGINEERING

    Komisarczuk, P. & Welch, I., 2007, In : Advanced Technology for Learning. 4, 4, p. 194-199 6 p.

    Research output: Contribution to journalArticle

  70. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In : South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticle

  71. Published

    Adjacency Matrices

    Walter, C. D., 1986, In : SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticle

  72. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In : ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticle

  73. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In : International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticle

  74. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In : Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticle

  75. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In : IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticle

  76. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In : Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticle

  77. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In : International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticle

  78. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In : Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticle

  79. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In : International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticle

  80. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In : IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticle

  81. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H., 2018, In : International Journal of Sensor Networks. 26, 1, p. 54-68 15 p.

    Research output: Contribution to journalArticle

  82. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In : Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticle

  83. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Sgandurra, D. & Wang, R., 1 May 2018, In : International Journal of Grid and Utility Computing. 9, 2, p. 170-178 9 p.

    Research output: Contribution to journalArticle

  84. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In : Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticle

  85. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In : Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticle

  86. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In : International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticle

  87. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In : Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticle

  88. Published

    Analysing and exploiting the Mantin biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T., Apr 2018, In : Designs, Codes and Cryptography. 86, 4, p. 743–770 28 p.

    Research output: Contribution to journalArticle

  89. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In : Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticle

  90. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In : Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticle

  91. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In : IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticle

  92. Forthcoming

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 2019, (Accepted/In press) In : IEEE Access.

    Research output: Contribution to journalArticle

  93. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L., 16 Aug 2018, In : IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticle

  94. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In : The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticle

  95. Published

    AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

    Di Pietro, R., Lombardi, F., Martinelli, F. & Sgandurra, D., 2015, In : Future Generation Computer Systems. 48, p. 28-38 11 p.

    Research output: Contribution to journalArticle

  96. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In : IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticle

  97. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In : Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticle

  98. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In : Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticle

  99. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In : International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticle

  100. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In : Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticle

  101. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In : Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticle

  102. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In : Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...20 Next