1. Other contribution › Research
  2. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  3. Published

    Techniques for the Hardware Implementation of Modular Multiplication

    Walter, C. D., 1998, Recent Advances in Information Science and Technology. Mastorakis, N. (ed.). World Scientific, p. 157-161 5 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  4. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  5. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  6. Paper › Research › Not peer-reviewed
  7. Published

    An Overview of the Formal Verification on the Digital Marketplace Cryptographic Protocols

    Goo, S. K., Irvine, J. & Tomlinson, A., 1 Jun 2006.

    Research output: Contribution to conferencePaper

  8. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  9. Published

    Conditional Access in Mobile Systems: Securing the Application

    Gallery, E. & Tomlinson, A., 1 Feb 2005, p. 190-197. 8 p.

    Research output: Contribution to conferencePaper

  10. Published
  11. Published

    Designing and Verifying Secure Protocols of the Digital Marketplace

    Goo, S. K., Irvine, J. M., Tomlinson, A. & Schwiderski-Grosche, S., 2005.

    Research output: Contribution to conferencePaper

  12. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A. (ed.), D., S. (ed.), S., C. (ed.), D., G. (ed.) & Markantonakis, K. (ed.), 2008.

    Research output: Contribution to conferencePaper