1. Chapter (peer-reviewed) › Research › Peer-reviewed
  2. Published

    On the Success Probability of Solving Unique SVP via BKZ

    Postlethwaite, E. & Virdia, F., 1 May 2021, Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key CryptographyVirtual Event, May 10–13, 2021 Proceedings, Part I. Springer, p. 68-98 31 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  3. Published

    Password Generators: Old Ideas and New

    AL Maqbali, F. & Mitchell, C., 17 Sep 2016, Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  4. E-pub ahead of print

    Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S., 22 Apr 2016, (E-pub ahead of print) International Journal of Human Rights and Constitutional Studies. 1 ed. Inderscience, Vol. 4. p. 54-74 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  5. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  6. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  7. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  8. Chapter (peer-reviewed) › Research › Not peer-reviewed
  9. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  10. Published

    RFID and Contactless Technology

    Hancke, G., Jan 2008, Smart Cards, Tokens, Security and Applications. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  11. Published

    Secure Proximity Identification for RFID

    Hancke, G. & Drimer, S., 2009, Security in RFID and Sensor Networks: Zhang and Kitsos (Eds). Auerbach Publications, (Wireless Networks and Mobile Communications).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  12. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

Previous 1 2 3 4 5 6 7 8 ...213 Next