1. Doctoral Thesis › Research
  2. Unpublished

    Public-Key Cryptography with Joint and Related-Key Security

    Thomson, S., 2014, (Unpublished) 192 p.

    Research output: ThesisDoctoral Thesis

  3. Unpublished

    Randomness in Cryptography: Theory Meets Practice

    Hutchinson, D., 23 Feb 2019, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  4. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  5. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  6. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  7. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  8. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis

  9. Unpublished

    Security and Privacy in Emerging Communication Standards

    Khan, H., 2020, (Unpublished) 175 p.

    Research output: ThesisDoctoral Thesis

  10. Unpublished

    Some Algorithms for Learning with Errors

    Fitzpatrick, R., 21 Aug 2014, (Unpublished) 167 p.

    Research output: ThesisDoctoral Thesis

  11. Published

    Strengthening Password-Based Authentication

    Al Maqbali, F., 2019, 207 p.

    Research output: ThesisDoctoral Thesis

  12. Unpublished
  13. Unpublished

    Techniques for the Automation of the Heap Exploit Synthesis Pipeline

    Repel, D., 2020, (Unpublished) 241 p.

    Research output: ThesisDoctoral Thesis

  14. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  15. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S., 2018, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  16. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  17. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  18. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  19. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  20. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  21. Published
  22. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  23. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  24. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  25. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  26. Other contribution › Research
  27. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution