1. Article › Research › Peer-reviewed
  2. Published

    Hybrid cryptography

    Dent, A. W., 2004, In: Cryptology ePrint Archive: Report. 2004/210

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In: Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Hypersensitivity to perturbation in the quantum kicked top

    Schack, R., D'Ariano, G. M. & Caves, C. M., 1 Aug 1994, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 50, p. 972-987 16 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Hypersensitivity to perturbations in the quantum baker's map

    Schack, R. & Caves, C. M., 1993, In: Physical Review Letters. 71, p. 525-528 4 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    ID-based cryptography using symmetric primitives

    Mitchell, C. J., Piper, F. C. & Wild, P. R., 3 Jul 2007, In: Designs, Codes and Cryptography. 44, p. 249-262 14 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    ID-based signatures from pairings on elliptic curves

    Paterson, K. G., 2002, In: Electronics Letters. 38, 18, p. 1025-1028 4 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Ideal secret sharing schemes with multipartite access structures.

    Ng, S-L., 2006, In: IEE Proceedings on Communications. 153, 2, p. 165-168 4 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Ideal Secret Sharing Schemes with Multiple Secrets

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Journal of Cryptology. 9, 6, p. 233-250 18 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H., 2010, In: Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Identity theft and reconstruction

    Ciechanowicz, C., 1 May 2010, In: Information Security Technical Report. 15, 2, p. 41

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K., 2011, In: International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Illuminating the Past: State of the Art

    Happa, J., Mudge, M., Debattista, K., Artusi, A., Gonçalves, A. & Chalmers, A., 2010, In: Virtual Reality. 14, 3, p. 155-182 28 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Improved Linear Systolic Array for Fast Modular Exponentiation

    Walter, C. D., 1 Sep 2000, In: IEE Proc. Computers and Digital Techniques. 147, 5, p. 323-328 6 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Improvement of modified authenticated key agreement protocol

    Hsu, C-L., Wu, T-S., Wu, T-C. & Mitchell, C. J., 2003, In: Applied Mathematics and Computation. 142, p. 305-308

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Improving Average Delay for On-Line Algorithms

    Walter, C. D., 1994, In: Electronics Letters. 30, 23, p. 1925-6 1 p.

    Research output: Contribution to journalArticlepeer-review

  17. Submitted

    Improving Convergence and Practicality of Slide-type Reductions

    Li, J. & Walter, M., 9 Mar 2021, (Submitted) In: Submitted.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In: EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    In Search of Multiple Domain Key Recovery

    Knudsen, L. R. & Martin, K. M., 1998, In: Journal of Computer Security. 6, 4, p. 219-236 18 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Increasing the Rate of Output of m-Sequences

    Blackburn, S. R., 1994, In: Information Processing Letters. 51, p. 73-77 5 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Infinite families of quasiperfect and doubly quasiperfect binary arrays

    Jedwab, J. & Mitchell, C. J., 1990, In: Electronics Letters. 26, p. 294-295 2 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Information and entropy in the baker's map

    Schack, R. & Caves, C. M., 1992, In: Physical Review Letters. 69, p. 3413-3416 4 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Information dynamics in cavity QED

    Soklakov, A. N. & Schack, R., 2003, In: Physical Review A. 67, p. 033804 1 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2000, In: Information Security Technical Report. 5, 2, p. 1

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jun 2003, In: Information Security Technical Report. 8, 2, p. 5

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Information Security Technical Report: Editorial

    Ciechanowicz, C., 1 Jan 2006, In: Information Security Technical Report. 11, 1

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Apr 2003, In: Information Security Technical Report. 8, 4, p. 5

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Information Security Technical Report: Introduction

    Ciechanowicz, C., 1 Jan 2002, In: Information Security Technical Report. 7, 2, p. 1

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Information security technical report - prospectus: Interfacing with smartcard applications. (The OpenCard Framework and PC/SC)

    Markantonakis, K., 1 Jan 1999, In: Information Security Technical Report. 4, p. 7-8 2 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Information-theoretic characterization of quantum chaos

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3257 1 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles

    Al Tabash, K. & Happa, J., Aug 2018, In: Computers and Security. 77, p. 838-859 22 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Intersection numbers for coherent configurations and the spectrum of a graph

    Walter, C. D., 1983, In: Journal of Combinatorial Theory, Series B. 35, 2, p. 201-204 4 p.

    Research output: Contribution to journalArticlepeer-review

  33. Forthcoming

    Introduction to Industrial Control Networks

    Galloway, B. & Hancke, G., 2012, (Accepted/In press) In: IEEE Communications Surveys and Tutorials.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 21 Nov 2014, In: Journal of Artificial Intelligence Research. 51, p. 555-577 23 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Java card technology and security

    Markantonakis, K., 1998, In: Information Security Technical Report. 3, 2, p. 82 - 89

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Key assignment schemes with authenticated encryption, revisited

    Pijnenburg, J. & Poettering, B., 24 Jul 2020, In: IACR Transactions on Symmetric Cryptology. 2020, 2, p. 40-67 28 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Key control in key agreement protocols

    Mitchell, C. J., Ward, M. & Wilson, P., 1998, In: Electronics Letters. 34, p. 980-981 2 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Key predistribution for homogeneous wireless sensor networks with group deployment of nodes

    Martin, K. M., Paterson, M. B. & Stinson, D. R., Aug 2010, In: ACM Transactions on Sensor Networks. 7, 2, 11.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Key recovery attack on ANSI retail MAC

    Mitchell, C. J., Feb 2003, In: Electronics Letters. 39, 4, p. 361-362

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Key storage in secure networks

    Mitchell, C. J. & Piper, F. C., 1988, In: Discrete Applied Mathematics. 21, 3, p. 215-228 14 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Key-minimal cryptosystems for unconditional secrecy

    Mitchell, C. J. & Godlewski, P., 1990, In: Journal of Cryptology. 3, 1, p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Kuroda's class number relation

    Walter, C. D., 1979, In: Acta Arithmetica. 35, p. 41-51 11 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Language Redux

    Thornton, P., 2018, In: A Peer Review Journal About. 7, 1, p. 1-8 8 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Legislation-Driven Development of a Gift Aid system using Event-B

    Williams, D. M., Darwish, S., Schneider, S. & Michael, D. R., 25 May 2020, In: Formal Aspects of Computing. 32, 2, p. 251-273 23 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    libInterMAC: Beyond Confidentiality and Integrity in Practice

    Albrecht, M., Hansen, T. & Paterson, K., 8 Mar 2019, In: IACR Transactions on Symmetric Cryptology. 2019, 1, p. 46-83 38 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Limitations of challenge-response entity authentication

    Mitchell, C. J., Aug 1989, In: Electronics Letters. 25, 17, p. 1195-1196 2 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Localised multisecret sharing

    Laing, T., Martin, K., Paterson, M. & Stinson, D., Sep 2017, In: Cryptography and Communications. 9, p. 581–597 17 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Locating Subverted Processes using Random Packet Comparison in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2013, In: International Journal of Critical Infrastructures. 9, 1/2, p. 32-51

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Logarithmic Speed Modular Multiplication

    Walter, C. D., 1994, In: Electronics Letters. 30, 17, p. 1397-1398 2 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Logical LEGO: Co-constructed perspectives on service design.

    Heath, C. P., Coles-Kemp, L. & Hall, P. A., 2014, In: NordDesign 2014, Proceedings.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H., 2011, In: Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticlepeer-review

Previous 1...7 8 9 10 11 12 13 14 ...43 Next