1. Other contribution › Research
  2. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  3. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  4. Published
  5. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  6. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K., 21 Mar 2018, The Conversation.

    Research output: Other contribution

  7. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  8. Published
  9. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  10. Published
  11. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  12. Published
  13. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  14. Published

    The Evolution of Mobile Security: The Silicon Trust Report

    Mayes, K. & Markantonakis, K., Feb 2007, 8 p. The Silicon Trust.

    Research output: Other contribution

  15. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  16. Published
  17. Published

    Tweet-Deck Diplomacy

    Robinson, N., 12 Jan 2017, RHUL Geopolitics & Security.

    Research output: Other contribution

  18. Published

    Virtual Private Networks: Police Digital Security Centre

    Agha, D., Apr 2020

    Research output: Other contribution

  19. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  20. Published

    Will smart cards outsmart the criminals?

    Mayes, K. & Markantonakis, K., 29 Jan 2007, The Times Newspaper.

    Research output: Other contribution

  21. Exhibition › Research
  22. Published
  23. Published
  24. Working paper › Research
  25. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2020, (Submitted).

    Research output: Working paper

  26. E-pub ahead of print

    A note on the optimality of frequency analysis vs. l_p-optimization

    Paterson, K. & Lacharite, M-S., 2015, (E-pub ahead of print) 3 p.

    Research output: Working paper

  27. Published

    Anomalous Taint Detection

    Cavallaro, L. & Sekar, R., 1 Jun 2008.

    Research output: Working paper

  28. Published