1. Article › Research › Peer-reviewed
  2. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In: Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D., 1 Mar 2018, In: Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In: International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future

    Khan, H. & Martin, K. M., Aug 2020, In: Journal of Information Security and Applications. 53, p. 1-17 17 p., 102537.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In: ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    A Survey on Security for Mobile Devices

    Polla, M. L., Martinelli, F. & Sgandurra, D., 2013, In: IEEE Communications Surveys and Tutorials. 15, 1, p. 446-471 26 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In: Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In: Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    A WEB-BASED BOARD GAME FOR TEACHING ASPECTS OF INTERNET ENGINEERING

    Komisarczuk, P. & Welch, I., 2007, In: Advanced Technology for Learning. 4, 4, p. 194-199 6 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In: South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 1 Sep 2021, In: Media, War & Conflict. 14, 3, p. 263-267 5 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Adjacency Matrices

    Walter, C. D., 1986, In: SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In: ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Air/Atmospheres of the Megacity

    Adey, P., Dec 2013, In: Theory, Culture and Society. 30, 7-8, p. 291-308 18 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Air’s affinities: Geopolitics, chemical affect and the force of the elemental

    Adey, P., 1 Mar 2015, In: Dialogues in Human Geography. 5, 1, p. 54-75 22 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In: Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In: IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In: Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In: International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In: Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  25. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H., 2018, In: International Journal of Sensor Networks. 26, 1, p. 54-68 15 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  28. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Sgandurra, D. & Wang, R., 1 May 2018, (E-pub ahead of print) In: International Journal of Grid and Utility Computing. 9, 2, p. 170-178 9 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In: Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In: Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticlepeer-review

  31. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Analysing and exploiting the Mantin biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T., Apr 2018, In: Designs, Codes and Cryptography. 86, 4, p. 743–770 28 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In: Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In: Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In: IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticlepeer-review

  37. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, (E-pub ahead of print) In: IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L., 16 Aug 2018, In: IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

    Di Pietro, R., Lombardi, F., Martinelli, F. & Sgandurra, D., 2015, In: Future Generation Computer Systems. 48, p. 28-38 11 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In: IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In: Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In: Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In: International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In: Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In: Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In: Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticlepeer-review

  48. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In: International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In: Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In: IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In: Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In: Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In: IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In: IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In: Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In: Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In: Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In: International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticlepeer-review

  63. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In: Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In: Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In: IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In: Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In: Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In: Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Blurred lines: intimacy, mobility, and the social military

    Adey, P., Denney, D., Jensen, R. & Pinkerton, A., 2016, In: Critical Military Studies. 2, 1-2, p. 7-24 18 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In: Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In: The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticlepeer-review

  76. Published

    Brauer's class number relation

    Walter, C. D., 1979, In: Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In: International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Broadcast-Enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D., Sep 2014, In: ACM Transactions on Sensor Networks. 11, 1, p. 1-33 33 p., 6.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P., Nov 2018, In: Schizophrenia bulletin. 44, 6, p. 1362–1372 11 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Capture--A behavioral analysis tool for applications and documents

    Seifert, C., Steenson, R., Welch, I., Komisarczuk, P. & Endicott-Popovsky, B., 2007, In: digital investigation. 4, p. 23-30 8 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Capturing Tacit Knowledge in Security Operation Centres

    Cho, S., Happa, J. & Creese, S., 24 Feb 2020, In: IEEE Access. 8, p. 42021 - 42041 21 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In: IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., Apr 2018, In: IEEE Transactions on Information Forensics and Security . 13, 4, p. 1031-1041 11 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In: Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Challenges for Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, In: IEEE Security and Privacy Magazine. Nov./Dec., p. 60-66 7 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Challenges in standardising cryptography

    Mitchell, C. J., 1 Jul 2016, In: International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In: Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Character sums and nonlinear recurrence sequences

    Blackburn, S. R. & Shparlinski, I. E., 2006, In: Discrete Mathematics. 306, p. 1132-1138 7 p.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In: Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Classical predictability and coarse-grained evolution of the quantum baker's map

    Scherer, A., Soklakov, A. N. & Schack, R., 2006, In: Physical Review D . 73, p. 125009 1 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Deo, A. & Paterson, K., 14 Aug 2018, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In: Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In: Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...22 Next