1. Article › Research › Peer-reviewed
  2. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In : secure Magazine. 1, 9

    Research output: Contribution to journalArticle

  3. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In : Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticle

  4. Published

    Efficient Attack Graph Analysis through Approximate Inference

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E., 11 Aug 2017, In : ACM Transactions on Information and System Security. 20, 3, p. 1-30 30 p., 10.

    Research output: Contribution to journalArticle

  5. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In : Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticle

  6. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticle

  7. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In : IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticle

  8. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticle

  9. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In : Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticle

  10. Submitted

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Robinson, N. & Butler-Rees, A., 1 Jul 2019, (Submitted) In : Emotion, Space and Society.

    Research output: Contribution to journalArticle

  11. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In : ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticle

  12. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In : Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticle

  13. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In : Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticle

  14. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In : Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticle

  15. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In : Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticle

  16. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P., 2009, In : Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticle

  17. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In : Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticle

  18. Published

    Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

    Sgandurra, D. & Lupu, E., 8 Feb 2016, In : ACM Computing Surveys. 48, 3, p. 1-38 38 p., 46.

    Research output: Contribution to journalArticle

  19. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 23 Mar 2017, In : IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  20. Published

    Explicit product ensembles for separable quantum states

    Schack, R. & Caves, C. M., 2000, In : J. Mod. Opt.. 47, p. 387-399 13 p.

    Research output: Contribution to journalArticle

  21. Published

    Exponentiation Using Division Chains

    Walter, C. D., 1998, In : IEEE Transactions on Computers. 47, 7, p. 757-765 9 p.

    Research output: Contribution to journalArticle

  22. Published

    Fast Fourier Transforms using the Complex Logarithmic Number System

    Arnold, M. G., Bailey, T. A., Cowles, J. R. & Walter, C. D., 2003, In : VLSI Signal Processing. 33, 3, p. 325-335 11 p.

    Research output: Contribution to journalArticle

  23. Published

    Fast Modular Multiplication using 2-Power Radix

    Walter, C. D., 1991, In : International J. of Computer Mathematics. 3, p. 21-28 8 p.

    Research output: Contribution to journalArticle

  24. Published

    Fast Rational Interpolation, Reed--Solomon Decoding and the Linear Complexity Profiles of Sequences

    Blackburn, S. R., 1997, In : IEEE Transactions on Information Theory. 43, 2, p. 537-548 12 p.

    Research output: Contribution to journalArticle

  25. Published

    Fixing a problem in the Helsinki protocol

    Mitchell, C. J. & Yeun, C. Y., 1998, In : Operating Systems Review. 32, 4, p. 21-24 4 p.

    Research output: Contribution to journalArticle

  26. Published

    Flaws in an e-mail protocol of Sun, Hsieh and Hwang

    Dent, A. W., 2005, In : IEEE Communications Letters. 9, 8, p. 718-719 2 p.

    Research output: Contribution to journalArticle

  27. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2014, In : SAIEE Africa Research Journal. 105, 2, p. 21 28 p.

    Research output: Contribution to journalArticle

  28. Published

    Forensic smartphone analysis using adhesives: Transplantation of Package on Package components

    Heckmann, T., Markantonakis, K., Naccache, D. & Souvignet, T., Sep 2018, In : digital investigation. 26, p. 29-39 11 p.

    Research output: Contribution to journalArticle

  29. Published

    Frameproof Codes

    Blackburn, S. R., 2003, In : SIAM Journal on Discrete Mathematics. 16, p. 499-510 12 p.

    Research output: Contribution to journalArticle

  30. Published

    Functional repair codes: a view from projective geometry

    Ng, S. & Paterson, M., Nov 2019, In : Designs, Codes and Cryptography. 87, 11, p. 2701-2722 22 p.

    Research output: Contribution to journalArticle

  31. Published

    Fundamental problems in provable security and cryptography

    Dent, A. W., 2006, In : Phil Trans R Soc A. 364, 1849, p. 3215-3230 16 p.

    Research output: Contribution to journalArticle

  32. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study

    Ibrahim, S., Rush, M., Edwards, E. T. & Monks, C. P., 31 Dec 2017, In : Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 16 p.

    Research output: Contribution to journalArticle

  33. Published

    Generalised Reed-Muller Codes and Power Control in OFDM

    Paterson, K. G., 2000, In : IEEE Transactions on Information Theory. 46, 1, p. 104-120 17 p.

    Research output: Contribution to journalArticle

  34. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In : Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticle

  35. Published

    Geometric Secret Sharing Schemes and their Duals

    Martin, K. M. & Jackson, W-A., 1994, In : Designs, Codes and Cryptography. 4, p. 83-95 13 p.

    Research output: Contribution to journalArticle

  36. Published

    Geometrical contributions to secret sharing theory

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 2004, In : Journal of Geometry. 79, 1-2, p. 102-133 32 p.

    Research output: Contribution to journalArticle

  37. Published

    Grammar-based transformations: Attack and Defence

    Repel, D. & Stengel, I., 25 Jun 2014, In : Information and Computer Security . 22, 2, p. 141-154

    Research output: Contribution to journalArticle

  38. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K., Oct 2016, In : Designs, Codes and Cryptography. 81, 1, p. 11-34 24 p.

    Research output: Contribution to journalArticle

  39. Published

    Group divisible designs with dual properties

    Mitchell, C. J., 1984, In : Mitteilungen aus dem Mathematischen Seminar Giessen. 165, p. 105-117 13 p.

    Research output: Contribution to journalArticle

  40. Published

    Groups of prime power order with derived subgroup of prime order

    Blackburn, S. R., 1999, In : Journal of Algebra. 219, p. 625-657 33 p.

    Research output: Contribution to journalArticle

  41. Published

    Hardware Implementation of Montgomery's Modular Multiplication Algorithm

    Eldridge, S. E. & Walter, C. D., 1993, In : IEEE Transactions on Computers. 42, 6, p. 693-699 7 p.

    Research output: Contribution to journalArticle

  42. Published

    HB-MP+ Protocol: An Improvement on the HB-MP Protocol

    Leng, X., Mayes, K. & Markantonakis, K., 1 Apr 2008, In : IEEE International Conference on RFID -- IEEE RFID 2008. p. 118-124 7 p.

    Research output: Contribution to journalArticle

  43. Published

    Hearing attacks in network data: An effectiveness study

    Axon, L., Happa, J., Goldsmith, M. & Creese, S., Jun 2019, In : Computers and Security. 83, p. 367-388 22 p.

    Research output: Contribution to journalArticle

  44. Published

    Hierarchical, model-based risk management of critical infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, In : Reliability Engineering & System Safety. 94, 9, p. 1403 - 1415

    Research output: Contribution to journalArticle

  45. Published

    High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology

    Happa, J., Artusi, A., Czanner, S. & Chalmers, A., 2010, In : Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Intelligent Cultural Heritage. p. 17-24 8 p.

    Research output: Contribution to journalArticle

  46. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In : Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticle

  47. Published

    Honeycomb arrays

    Blackburn, S. R., Panoui, A., Paterson, M. B. & Stinson, D. R., 2010, In : The Electronic Journal of Combinatorics. 17, R172, p. 1 1 p.

    Research output: Contribution to journalArticle

  48. Published

    Honeyc-the low-interaction client honeypot

    Seifert, C., Welch, I. & Komisarczuk, P., 2007, In : Proceedings of the 2007 NZCSRCS, Waikato University, Hamilton, New Zealand.

    Research output: Contribution to journalArticle

  49. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K., Nov 2018, In : Wireless Networks. 24, 8, p. 3009–3027 19 p.

    Research output: Contribution to journalArticle

  50. Published

    Hybrid cryptography

    Dent, A. W., 2004, In : Cryptology ePrint Archive: Report. 2004/210

    Research output: Contribution to journalArticle

  51. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In : Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticle

  52. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticle

  53. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In : Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticle

  54. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In : Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticle

  55. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In : Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticle

  56. Published

    Ideal secret sharing schemes with multipartite access structures.

    Ng, S-L., 2006, In : IEE Proceedings on Communications. 153, 2, p. 165-168 4 p.

    Research output: Contribution to journalArticle

  57. Published

    Ideal Secret Sharing Schemes with Multiple Secrets

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Journal of Cryptology. 9, 6, p. 233-250 18 p.

    Research output: Contribution to journalArticle

  58. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H., 2010, In : Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticle

  59. Published

    Identity theft and reconstruction

    Ciechanowicz, C., 1 May 2010, In : Information Security Technical Report. 15, 2, p. 41

    Research output: Contribution to journalArticle

  60. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K., 2011, In : International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticle

  61. Published

    Illuminating the Past: State of the Art

    Happa, J., Mudge, M., Debattista, K., Artusi, A., Gonçalves, A. & Chalmers, A., 2010, In : Virtual Reality. 14, 3, p. 155-182 28 p.

    Research output: Contribution to journalArticle

  62. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In : IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticle

  63. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In : Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticle

  64. Published

    Improving Average Delay for On-Line Algorithms

    Walter, C. D., 1994, In : Electronics Letters. 30, 23, p. 1925-6 1 p.

    Research output: Contribution to journalArticle

  65. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In : EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticle

  66. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M., 1998, In : Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticle

  67. Published

    Increasing the Rate of Output of m-Sequences

    Blackburn, S. R., 1994, In : Information Processing Letters. 51, p. 73-77 5 p.

    Research output: Contribution to journalArticle

  68. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In : Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticle

  69. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In : Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticle

  70. Published

    Information dynamics in cavity QED

    Soklakov, A. N. & Schack, R., 2003, In : Physical Review A. 67, p. 033804 1 p.

    Research output: Contribution to journalArticle

  71. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2000, In : Information Security Technical Report. 5, 2, p. 1

    Research output: Contribution to journalArticle

  72. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jun 2003, In : Information Security Technical Report. 8, 2, p. 5

    Research output: Contribution to journalArticle

  73. Published

    Information Security Technical Report: Editorial

    Ciechanowicz, C., 1 Jan 2006, In : Information Security Technical Report. 11, 1

    Research output: Contribution to journalArticle

  74. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Apr 2003, In : Information Security Technical Report. 8, 4, p. 5

    Research output: Contribution to journalArticle

  75. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2002, In : Information Security Technical Report. 7, 2, p. 1

    Research output: Contribution to journalArticle

  76. Published

    Information security technical report - prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)

    Markantonakis, K., 1 Jan 1999, In : Information Security Technical Report. 4, p. 7-8 2 p.

    Research output: Contribution to journalArticle

  77. Published

    Information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1996, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3257 1 p.

    Research output: Contribution to journalArticle

  78. Published

    Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles

    Al Tabash, K. & Happa, J., Aug 2018, In : Computers and Security. 77, p. 838-859 22 p.

    Research output: Contribution to journalArticle

  79. Published

    Intersection numbers for coherent configurations and the spectrum of a graph

    Walter, C. D., 1983, In : Journal of Combinatorial Theory, Series B. 35, 2, p. 201-204 4 p.

    Research output: Contribution to journalArticle

  80. Forthcoming

    Introduction to Industrial Control Networks

    Galloway, B. & Hancke, G., 2012, (Accepted/In press) In : IEEE Communications Surveys and Tutorials.

    Research output: Contribution to journalArticle

  81. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 21 Nov 2014, In : Journal of Artificial Intelligence Research. 51, p. 555-577 23 p.

    Research output: Contribution to journalArticle

  82. Published

    Java card technology and security

    Markantonakis, K., 1998, In : Information Security Technical Report. 3, 2, p. 82 - 89

    Research output: Contribution to journalArticle

  83. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In : Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticle

  84. Published

    Key predistribution for homogeneous wireless sensor networks with group deployment of nodes

    Martin, K. M., Paterson, M. B. & Stinson, D. R., Aug 2010, In : ACM Transactions on Sensor Networks. 7, 2, 11.

    Research output: Contribution to journalArticle

  85. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In : Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticle

  86. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In : Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticle

  87. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In : Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  88. Published

    Kuroda's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 41-51 11 p.

    Research output: Contribution to journalArticle

  89. Published

    Language Redux

    Thornton, P., 2018, In : A Peer Review Journal About. 7, 1, p. 1-8 8 p.

    Research output: Contribution to journalArticle

  90. Published

    libInterMAC: Beyond Confidentiality and Integrity in Practice

    Albrecht, M., Hansen, T. & Paterson, K., 8 Mar 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 1, p. 46-83 38 p.

    Research output: Contribution to journalArticle

  91. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In : Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticle

  92. Published

    Localised multisecret sharing

    Laing, T., Martin, K., Paterson, M. & Stinson, D., Sep 2017, In : Cryptography and Communications. 9, 5, p. 581–597 17 p.

    Research output: Contribution to journalArticle

  93. Published

    Locating Subverted Processes using Random Packet Comparison in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2013, In : International Journal of Critical Infrastructures. 9, 1/2, p. 32-51

    Research output: Contribution to journalArticle

  94. Published

    Logarithmic Speed Modular Multiplication

    Walter, C. D., 1994, In : Electronics Letters. 30, 17, p. 1397-1398 2 p.

    Research output: Contribution to journalArticle

  95. Published

    Logical LEGO: Co-constructed perspectives on service design.

    Heath, C. P., Coles-Kemp, L. & Hall, P. A., 2014, In : NordDesign 2014, Proceedings.

    Research output: Contribution to journalArticle

  96. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H., 2011, In : Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticle

  97. Published

    Lost in translation: theory and practice in cryptography

    Paterson, K. G. & Yau, A. K. L., 2006, In : IEEE Security and Privacy Magazine. 4, 3, p. 69-72 4 p.

    Research output: Contribution to journalArticle

  98. Published

    MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

    Saracino, A., Sgandurra, D., Dini, G. & Martinelli, F., 1 Mar 2016, In : IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  99. Published

    Majority vote ensembles of conformal predictors

    Cherubin, G., Mar 2019, In : Machine Learning. 108, 3, p. 475–488 14 p.

    Research output: Contribution to journalArticle

  100. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In : Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticle

  101. Published

    Making serial number based authentication robust against loss of state

    Mitchell, C. J., Jul 2000, In : Operating Systems Review. 34, 3, p. 56-59 4 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...20 Next