1. Article › Research › Peer-reviewed
  2. Published

    Malicious attacks on ad hoc network routing protocols

    Yau, P-W., Hu, S. & Mitchell, C. J., 2007, In : International Journal of Computer Research. 15, 1, p. 73-100 38 p.

    Research output: Contribution to journalArticle

  3. Published

    Manual authentication for wireless devices

    Gehrmann, C., Mitchell, C. J. & Nyberg, K., Apr 2004, In : Cryptobytes. 7, 1, p. 29-37

    Research output: Contribution to journalArticle

  4. Published

    Matching key recovery mechanisms to business requirements

    Rantos, K. & Mitchell, C. J., 2005, In : Computers and Security. 24, 3, p. 232-245 14 p.

    Research output: Contribution to journalArticle

  5. Published

    Minimum weight modified signed-digit representations and fast exponentiation

    Jedwab, J. & Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1171-1172 2 p.

    Research output: Contribution to journalArticle

  6. Published

    Mobile communication security controllers an evaluation paper

    Mayes, K. E. & Markantonakis, K., 1 Aug 2008, In : Information Security Technical Report. 13, p. 173-192 20 p.

    Research output: Contribution to journalArticle

  7. Published

    Mobile security and trusted computing

    Mitchell, C. J., 2006, In : Information Technology. 48, p. 321-326

    Research output: Contribution to journalArticle

  8. Published

    Modified forms of cipher block chaining

    Mitchell, C. J. & Varadharajan, V., Feb 1991, In : Computers and Security. 10, 1, p. 37-40

    Research output: Contribution to journalArticle

  9. Published

    Modulating a noisy carrier signal for eavesdropping-resistant HF RFID

    Hancke, G. P., 2007, In : Elektrotechnik und Informationstechnik. 124, 11, p. 404-408 5 p.

    Research output: Contribution to journalArticle

  10. Published

    Modulo Multiplier to enhance encryption rates

    Tomlinson, A., 1 Apr 1990, In : Electronic Engineering. 62, 760, p. 25 1 p.

    Research output: Contribution to journalArticle

  11. Published

    Moment hierarchies and cumulants in quantum optics

    Schack, R. & Schenzle, A., 1990, In : Physical Review A. 41, p. 3847-3852 6 p.

    Research output: Contribution to journalArticle

  12. Forthcoming

    Monoidal Computer I: Basic Computability by String Diagrams

    Pavlovic, D., 2013, (Accepted/In press) In : Information and Computation. 38 p.

    Research output: Contribution to journalArticle

  13. Published

    Montgomery Exponentiation Needs No Final Subtractions

    Walter, C. D., 1 Oct 1999, In : Electronics Letters. 35, 21, p. 1831-1832 2 p.

    Research output: Contribution to journalArticle

  14. Published

    Multi-destination secure electronic mail

    Mitchell, C. J., 1989, In : The Computer Journal. 32, 1, p. 13-15 3 p.

    Research output: Contribution to journalArticle

  15. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., Dec 2016, In : International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p.

    Research output: Contribution to journalArticle

  16. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In : International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticle

  17. Published

    Multiple Attacks on Authentication Protocols for Low-Cost RFID Tags

    Bilal, Z., Martin, K. M. & Saeed, Q., 1 Mar 2015, In : Applied Mathematics and Information Sciences. 9, 2, p. 561-569 9 p.

    Research output: Contribution to journalArticle

  18. Published

    Mutually Trusted Authority free Secret Sharing Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1997, In : Journal of Cryptology. 10, p. 261-289 29 p.

    Research output: Contribution to journalArticle

  19. Published

    Near Optimal Single-Track Gray Codes

    Etzion, T. & Paterson, K. G., 1996, In : IEEE Transactions on Information Theory. 42, p. 779-789 11 p.

    Research output: Contribution to journalArticle

  20. Published

    New Classes of Perfect Maps I

    Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 73, p. 302-334 33 p.

    Research output: Contribution to journalArticle

  21. Published

    New Classes of Perfect Maps II

    Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 73, p. 335-345 11 p.

    Research output: Contribution to journalArticle

  22. Published

    New Secret Sharing Schemes from Old

    Martin, K. M., 1993, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 14, p. 65-77 13 p.

    Research output: Contribution to journalArticle

  23. Submitted

    Nigerian Society and Culture

    Ibrahim, S., 2017, (Submitted) In : The Journal of Intercultural Studies. special issue

    Research output: Contribution to journalArticle

  24. Published

    Node Bisectors of Cayley Graphs

    Blackburn, S. R., 1996, In : Mathematical Systems Theory. 29, p. 589-598 10 p.

    Research output: Contribution to journalArticle

  25. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, In : International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticle

  26. Published

    OCPP Protocol: Security Threats and Challenges

    Alcaraz, C., Lopez, J. & Wolthusen, S., Sep 2017, In : IEEE Transactions on Smart Grid. 8, 5, p. 2452-2459 8 p.

    Research output: Contribution to journalArticle

  27. Published

    On Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMA

    Paterson, K. G., 2004, In : IEEE Transactions on Information Theory. 50, 3, p. 550-559 10 p.

    Research output: Contribution to journalArticle

  28. Published

    On integer-valued rational polynomials and depth distributions of binary codes

    Mitchell, C. J., 1998, In : IEEE Transactions on Information Theory. 44, p. 3146-3150 5 p.

    Research output: Contribution to journalArticle

  29. Published

    On k-arcs Covering a Line in Finite Projective Planes.

    Ng, S-L. & Wild, P., 2001, In : Ars Combinatoria. 58, p. 289-300

    Research output: Contribution to journalArticle

  30. Published

    On parameter selection for server-aided RSA computation schemes

    Burns, J. & Mitchell, C. J., 1994, In : IEEE Transactions on Computers. 43, 2, p. 163-174 12 p.

    Research output: Contribution to journalArticle

  31. Published

    On Recovering Affine Encodings in White-Box Implementations

    Derbez, P., Fouque, P-A., Lambin, B. & Minaud, B., 14 Aug 2018, In : TCHES. 2018, 3, p. 121-149 29 p.

    Research output: Contribution to journalArticle

  32. Published

    On the average energy of circulant graphs

    Blackburn, S. R. & Shparlinski, I. E., 2008, In : Linear Algebra and Its Applications. 428, p. 1956-1963 8 p.

    Research output: Contribution to journalArticle

  33. Published

    On the complexity of the BKW algorithm on LWE

    Albrecht, M., Cid, C., Faugere, J-C., Fitzpatrick, R. & Perret, L., Feb 2015, In : Designs, Codes and Cryptography. 74, 2, p. 325-354 30 p.

    Research output: Contribution to journalArticle

  34. Published

    On the composition of matroids and ideal secret sharing schemes.

    Ng, S-L. & Walker, M., 2001, In : Designs, Codes and Cryptography. 24, p. 49-67

    Research output: Contribution to journalArticle

  35. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In : Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticle

  36. Published

    ON THE DISTRIBUTION OF THE SUBSET SUM PSEUDORANDOM NUMBER GENERATOR ON ELLIPTIC CURVES

    Blackburn, S. R., Ostafe, A. & Shparlinski, I. E., 2011, In : Uniform Distribution Theory. 6, 1, p. 127-142 16 p.

    Research output: Contribution to journalArticle

  37. Published

    On the existence and construction of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2000, In : IEEE Transactions on Information Theory. 46, 6, p. 1974-1987 14 p.

    Research output: Contribution to journalArticle

  38. Published

    On the Existence of de Bruijn Tori with Two by Two Windows

    Hurlbert, G., Mitchell, C. J. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 213-230 18 p.

    Research output: Contribution to journalArticle

  39. Published

    On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification

    Blasco, J. & Peris-Lopez, P., 24 Aug 2018, In : Sensors (Switzerland). 18, 9, p. 1-20 20 p., 2782.

    Research output: Contribution to journalArticle

  40. Published

    On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Yeo, A., Jun 2013, In : ACM Transactions on Information and System Security. 16, 1, 4.

    Research output: Contribution to journalArticle

  41. Published

    On the potential of high density smart cards

    Mayes, K. E. & Markantonakis, K., 2006, In : Information Security Technical Report. 11, 3, p. 147 - 153

    Research output: Contribution to journalArticle

  42. Published

    On the relation between the MXL family of algorithms and Groebner basis algorithms

    Albrecht, M., Cid, C., Faugere, J-C. & Perret, L., Aug 2012, In : Journal of Symbolic Computation. 47, 8, p. 926-941 16 p.

    Research output: Contribution to journalArticle

  43. Published

    On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups.

    Paterson, K. G. & Srinivasan, S., 2009, In : Designs, Codes and Cryptography. 52, p. 219-241 23 p.

    Research output: Contribution to journalArticle

  44. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 1 Dec 2010, In : International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticle

  45. Published

    On the Security of 2-Key Triple DES

    Mitchell, C. J., Nov 2016, In : IEEE Transactions on Information Theory. 62, 11, p. 6260-6267 8 p.

    Research output: Contribution to journalArticle

  46. Published

    On the value of threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Oct 2002, In : Operating Systems Review. 36, 4, p. 30-35 6 p.

    Research output: Contribution to journalArticle

  47. Published

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M., 12 Dec 2016, In : ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p.

    Research output: Contribution to journalArticle

  48. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C., Oct 2015, In : Journal of Cryptology. 28, 4, p. 769–795 27 p.

    Research output: Contribution to journalArticle

  49. Published

    One-round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2009, In : International Journal of Applied Cryptography. 1, 3, p. 181-199 19 p.

    Research output: Contribution to journalArticle

  50. Published

    One-stage one-sided rearrangeable switching networks

    Mitchell, C. J. & Wild, P. R., Jan 1989, In : IEEE Transactions on Communications. 37, 1, p. 52-56 5 p.

    Research output: Contribution to journalArticle

  51. Published

    One-to-one correspondence between slowly decaying interfacial profiles and reflectivity

    Dietrich, S. & Schack, R., 1987, In : Physical Review Letters. 58, p. 140-143 4 p.

    Research output: Contribution to journalArticle

  52. Published

    Optimal linear perfect hash families

    Blackburn, S. R. & Wild, P. R., 1998, In : Journal of Combinatorial Theory, Series A. 83, p. 233-250 18 p.

    Research output: Contribution to journalArticle

  53. Published

    Optimal Parameters for Fully On-Line Arithmetic

    Walter, C. D., 1995, In : International J. of Computer Mathematics. 56, p. 11-18 8 p.

    Research output: Contribution to journalArticle

  54. Published

    Optimal updating of ideal threshold schemes

    Martin, K. M., Barwick, S. G., Jackson, W-A. & O'Keefe, C. M., 2006, In : Australasian Journal of Combinatorics. 36, p. 123-132 10 p.

    Research output: Contribution to journalArticle

  55. Published

    Orbit-homogeneity in permutation groups

    Cameron, P. J. & Dent, A. W., 2006, In : Bulletin of the London Mathematical Society. 38, 4, p. 587-596 10 p.

    Research output: Contribution to journalArticle

  56. Published

    Orthogonal Sequences of Polynomials over Arbitrary Fields

    Blackburn, S. R., 1998, In : Journal of Number Theory. 68, 1, p. 99-111 13 p.

    Research output: Contribution to journalArticle

  57. Published

    Pairings for Cryptographers

    Galbraith, S. D., Paterson, K. G. & Smart, N. P., 2008, In : Discrete Applied Mathematics. 156, p. 3113-3121.

    Research output: Contribution to journalArticle

  58. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  59. Published

    Parsing ambiguities in authentication and key establishment protocols

    Chen, L. & Mitchell, C. J., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 1, p. 82-94 13 p.

    Research output: Contribution to journalArticle

  60. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In : Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticle

  61. Published

    Perfect binary arrays and difference sets

    Jedwab, J., Mitchell, C. J., Piper, F. C. & Wild, P., 1994, In : Discrete Mathematics. 125, p. 241-254 14 p.

    Research output: Contribution to journalArticle

  62. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In : SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticle

  63. Published

    Perfect Factors in the de Bruijn Graph

    Paterson, K. G., 1995, In : Designs, Codes and Cryptography. 5, p. 115-138 24 p.

    Research output: Contribution to journalArticle

  64. Published

    Perfect hash families: probabilistic methods and explicit constructions

    Blackburn, S. R., 2000, In : Journal of Combinatorial Theory, Series A. 92, p. 54-60 7 p.

    Research output: Contribution to journalArticle

  65. Published

    Perfect Maps

    Paterson, K. G., 1994, In : IEEE Transactions on Information Theory. IT-40, p. 743-753 11 p.

    Research output: Contribution to journalArticle

  66. Published

    Perfect Secret Sharing Schemes on Five Participants

    Martin, K. M. & Jackson, W-A., 1996, In : Designs, Codes and Cryptography. 9, p. 267-286 20 p.

    Research output: Contribution to journalArticle

  67. Published

    Permutation Polynomials, de Bruijn Sequences and Linear Complexity

    Blackburn, S. R., Etzion, T. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 55-82 28 p.

    Research output: Contribution to journalArticle

  68. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In : SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticle

  69. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In : Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticle

  70. Published

    Point-weight designs with design conditions on t points

    Dent, A. W., 2008, In : Discrete Mathematics. 308, 11, p. 2080-2093 14 p.

    Research output: Contribution to journalArticle

  71. Published

    Policy enforcement system for secure interoperable control in distributed Smart Grid systems

    Alcaraz, C., Lopez, J. & Wolthusen, S., 1 Jan 2016, In : Journal of Network and Computer Applications. 59, p. 301-314 14 p.

    Research output: Contribution to journalArticle

  72. Published

    Polly Cracker, revisited

    Albrecht, M., Faugere, J-C., Farshim, P., Herold, G. & Perret, L., May 2016, In : Designs, Codes and Cryptography. 79, 2, p. 261-302 42 p.

    Research output: Contribution to journalArticle

  73. Published

    Posets and protocols - picking the right three-party protocol.

    Ng, S-L., 2003, In : IEEE Journal on Selected Areas in Communications. 21, 1, p. 55-61 6 p.

    Research output: Contribution to journalArticle

  74. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In : Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticle

  75. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In : ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticle

  76. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In : Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticle

  77. Published

    Practical eavesdropping and skimming attacks on high-frequency RFID tokens

    Hancke, G., 2011, In : Journal of Computer Security. p. 259 288 p.

    Research output: Contribution to journalArticle

  78. Published

    Predicting nonlinear pseudorandom number generators

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2005, In : Math. Comp.. 74, p. 1471-1494 24 p.

    Research output: Contribution to journalArticle

  79. Published

    Preparation information and optimal decompositions for mixed quantum states

    Soklakov, A. N. & Schack, R., 2000, In : J. Mod. Opt.. 47, p. 2265-2276 12 p.

    Research output: Contribution to journalArticle

  80. Published

    Privacy and Consent in Pervasive Networks

    Malik, N. A. & Tomlinson, A., 1 Aug 2009, In : Information Security Technical Report. 14, 3, p. 138 - 142

    Research output: Contribution to journalArticle

  81. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 2018, In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

  82. Published

    Privacy Threats in a Mobile Enterprise Social Network

    Tomlinson, A., Yau, P-W. & MacDonald, J. A., 1 May 2010, In : Information Security Technical Report. 15, 2, p. 57 - 66

    Research output: Contribution to journalArticle

  83. Published

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. & Ng, S., Jul 2017, In : IET Information Security . 11, 4, p. 204-210 7 p.

    Research output: Contribution to journalArticle

  84. Published

    Problems and prospects of multi application smart cards in the UK financial industry

    Markantonakis, K. & Mayes, K., 2007, In : Icebe 2007: ieee international conference on e-Business engineering, proceedings. p. 447-452 6 p.

    Research output: Contribution to journalArticle

  85. Published

    Products of subsets in an abelian group

    Blackburn, S. R. & Spencer, A. J., 2003, In : Journal of Combinatorial Theory, Series A. 103, p. 53-68 16 p.

    Research output: Contribution to journalArticle

  86. Published

    Prolific codes with the identifiable parent property

    Blackburn, S. R., Etzion, T. & Ng, S-L., 2008, In : SIAM Journal on Discrete Mathematics. 22, 4, p. 1393-1410 18 p.

    Research output: Contribution to journalArticle

  87. Published

    Properties of the Error Linear Complexity Spectrum

    Etzion, T., Kalouptsidis, N., Kolokotronis, N., Limniotis, K. & Paterson, K. G., 2009, In : IEEE Transactions on Information Theory. 55, 10, p. 4681-4686 6 p.

    Research output: Contribution to journalArticle

  88. Published

    Properties of the frequency operator do not imply the quantum probability postulate

    Caves, C. M. & Schack, R., 2005, In : Ann. Phys.. 315, p. 123-146 24 p.

    Research output: Contribution to journalArticle

  89. Published

    Protocols and cryptography

    Ciechanowicz, C., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 1

    Research output: Contribution to journalArticle

  90. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G., 2011, In : IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticle

  91. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In : ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticle

  92. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In : Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticle

  93. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In : Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticle

  94. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In : Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  95. Published

    Putting dots in triangles

    Blackburn, S., Paterson, M. & Stinson, D. R., 2011, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 78, p. 23-32

    Research output: Contribution to journalArticle

  96. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In : Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticle

  97. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In : Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticle

  98. Published

    Quantum chaos in open systems: a quantum state diffusion analysis

    Brun, T. A., Percival, I. C. & Schack, R., 1996, In : Journal of Physics A: Mathematical and General. 29, p. 2077-2090 14 p.

    Research output: Contribution to journalArticle

  99. Published

    Quantum probabilities as Bayesian probabilities

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 65, p. 022305 1 p.

    Research output: Contribution to journalArticle

  100. Published

    Quantum probability from decision theory?

    Barnum, H., Caves, C. M., Finkelstein, J., Fuchs, C. A. & Schack, R., 2000, In : Proc. R. Soc. Lond. A. 456, p. 1175-1182 8 p.

    Research output: Contribution to journalArticle

  101. Published

    Quantum state diffusion with a moving basis: computing quantum-optical spectra

    Schack, R., Brun, T. A. & Percival, I. C., 1996, In : Physical Review A. 53, p. 2694 1 p.

    Research output: Contribution to journalArticle

Previous 12 3 4 5 6 7 8 9 ...20 Next