1. Chapter (peer-reviewed) › Research › Peer-reviewed
  2. E-pub ahead of print

    Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S., 22 Apr 2016, International Journal of Human Rights and Constitutional Studies. 1 ed. Inderscience, Vol. 4. p. 54-74 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  3. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  4. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  5. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  6. Chapter (peer-reviewed) › Research › Not peer-reviewed
  7. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  8. Published

    RFID and Contactless Technology

    Hancke, G., Jan 2008, Smart Cards, Tokens, Security and Applications. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  9. Published

    Secure Proximity Identification for RFID

    Hancke, G. & Drimer, S., 2009, Security in RFID and Sensor Networks: Zhang and Kitsos (Eds). Auerbach Publications, (Wireless Networks and Mobile Communications).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  10. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  11. Other › Research › Not peer-reviewed
  12. Published

    1st Workshop on Cyber-Security Arms Race (CYSARM 2019)

    Giannetsos, T. & Sgandurra, D., 6 Nov 2019, p. 2711-2712. 2 p.

    Research output: Contribution to conferenceOther

  13. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K., 2008.

    Research output: Contribution to conferenceOther

Previous 1 2 3 4 5 6 7 8 ...207 Next