1. Doctoral Thesis › Research
  2. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  4. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  5. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  6. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  7. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  8. Published
  9. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  10. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  11. Master's Thesis › Research
  12. Published

    Securing Financially Sensitive Environments with OpenBSD

    Humphrey, N. C. P., 18 Jan 2008

    Research output: ThesisMaster's Thesis

  13. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  14. Book › Research
  15. Published

    A First Course in Formal Logic and its Applications in Computer Science

    Dowsing, R., Rayward-Smith, V. J. & Walter, C. D., 1986, Blackwell Scientific Publications, Oxford.

    Research output: Book/ReportBook

  16. Published

    Achieving context awareness and intelligence in cognitive radio networks using reinforcement learning for stateful applications

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, School of Engineering and Computer Science, Victoria University of Wellington.

    Research output: Book/ReportBook

  17. Forthcoming


    Adey, P., 2013, (Accepted/In press) London: Reaktion Books.

    Research output: Book/ReportBook

  18. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M., 2006, Springer.

    Research output: Book/ReportBook

  19. Published

    Crime, Regulation and Control During the Blitz: Protecting the Population of Bombed Cities

    Adey, P., Cox, D. J. & Godfrey, B., Mar 2016, Bloomsbury Academic. 272 p. (History of Crime Deviance and Punishment)

    Research output: Book/ReportBook

  20. Published

    Enumeration of Finite Groups

    Blackburn, S. R., Neumann, P. M. & Venkataraman, G., 2007, Cambridge: Cambridge University Press.

    Research output: Book/ReportBook

  21. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  22. Published

    Everyday Cryptography: Fundamental Principles & Applications

    Martin, K., 8 Jun 2017, 2nd ed. Oxford University Press. 720 p.

    Research output: Book/ReportBook

  23. Published
  24. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.), 8 May 2018, Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  25. Published

    Levitation: the science, myth and magic of suspension

    Adey, P., 2017, London: Reaktion Books.

    Research output: Book/ReportBook

  26. Published

    Mobility (Second edition)

    Adey, P., 2017, 2nd ed. Routledge. 386 p.

    Research output: Book/ReportBook

  27. Published

    Pairing 2008

    Galbraith, S. D. (ed.) & Paterson, K. G. (ed.), 2008, Springer. (Lecture Notes in Computer Science)

    Research output: Book/ReportBook

  28. Published

    PKI revisited - current issues and future trends

    Price, G. (ed.), Piper, F. (ed.) & Paterson, K. G. (ed.), 2003, Unkown Publisher. (Information Security Technical Report)

    Research output: Book/ReportBook

Previous 1...3 4 5 6 7 8 9 10 ...82 Next