1. Abstract › Research › Peer-reviewed
  2. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstract

  3. Other › Research › Not peer-reviewed
  4. Published

    1st Workshop on Cyber-Security Arms Race (CYSARM 2019)

    Giannetsos, T. & Sgandurra, D., 6 Nov 2019, p. 2711-2712. 2 p.

    Research output: Contribution to conferenceOther

  5. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A., Sauveron, D., Chaumette, S., Gollmann, D. & Markantonakis, K., 2008.

    Research output: Contribution to conferenceOther

  6. Chapter (peer-reviewed) › Research › Not peer-reviewed
  7. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  8. Published

    RFID and Contactless Technology

    Hancke, G., Jan 2008, Smart Cards, Tokens, Security and Applications. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  9. Published

    Secure Proximity Identification for RFID

    Hancke, G. & Drimer, S., 2009, Security in RFID and Sensor Networks: Zhang and Kitsos (Eds). Auerbach Publications, (Wireless Networks and Mobile Communications).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  10. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  11. Chapter (peer-reviewed) › Research › Peer-reviewed
  12. Published

    A Binary Model of Broken Home: Parental Death-Divorce Hypothesis of Male Juvenile Delinquency in Nigeria and Ghana

    Ibrahim, S., 3 Sep 2015, Contemporary Perspectives in Family Research. Blair, S. L. & Maxwell, S. R. (eds.). New York: Emerald Publishing, Vol. 9. p. 311-340 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  13. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., Apr 2014, 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  14. Published

    Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Al-Fannah, N. M., Li, W. & Mitchell, C. J., 9 Sep 2018, Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Springer-Verlag, p. 481-501 21 p. (Lecture Notes in Computer Science; vol. 11060).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  15. Published

    Causes of socioeconomic cybercrime in Nigeria

    Ibrahim, S., 18 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE Xplore, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  16. Published

    Connectivity, Communications and Technology

    Haggman, A., 7 Dec 2016, International Relations. McGlinchey, S. (ed.). E-International Relations, p. 135-143 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  17. Published

    Cyber Deterrence Theory and Practise

    Haggman, A., 5 May 2018, Cyber Security: Power and Technology. Lehto, M. & Neittaanmäki, P. (eds.). 1 ed. Springer International Publishing, Vol. 93. p. 63-81 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  18. E-pub ahead of print

    Identity Confidentiality in 5G Mobile Telephony Systems

    Khan, H., Dowling, B. & Martin, K., 21 Nov 2018, Security Standardisation Research: 4th International Conference, SSR 2018. Cremer, C. & Lehmann, A. (eds.). Switzerland: Springer, [Cham], p. 120-142 23 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  19. Published

    Implementing RLWE-based Schemes Using an RSA Co-Processor

    Albrecht, M., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F. & Wallner, A., 14 Oct 2018, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Ruhr University of Bochum, Vol. 2019, Issue 1.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  20. Published

    Password Generators: Old Ideas and New

    AL Maqbali, F. & Mitchell, C., 17 Sep 2016, Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  21. E-pub ahead of print

    Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S., 22 Apr 2016, International Journal of Human Rights and Constitutional Studies. 1 ed. Inderscience, Vol. 4. p. 54-74 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  22. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  23. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  24. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  25. Review article › Research › Peer-reviewed
  26. Published

    A survey on Reinforcement learning models and algorithms for traffic signal control

    Yau, K. L. A., Qadir, J., Khoo, H. L., Ling, M. H. & Komisarczuk, P., 1 Jun 2017, In : ACM Computing Surveys. 50, 3, 3068287.

    Research output: Contribution to journalReview article

Previous 1...74 75 76 77 78 Next