1. Conference contribution › Research
  2. E-pub ahead of print

    Faster Enumeration-based Lattice Reduction: Root Hermite Factor k1/(2k) Time kk/8+o(k)

    Albrecht, M., Bai, S., Fouque, P-A., Kirchner, P., Stehlé, D. & Wen, W., 10 Aug 2020, CRYPTO 2020. Springer, p. 186-212 27 p. (Lecture Notes in Computer Science; vol. 12171).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Faster Modular Multiplication by Operand Scaling

    Walter, C. D., 1992, CRYPTO '91. Feigenbaum, J. (ed.). Springer, Vol. 576. p. 313-323 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Feature Correlation Attack on Biometric Privacy Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 12 Sep 2009, Proc. Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009). IEEE Computer Society Press, p. 1061-1065

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Fine Grained Resource Reservation and Management in Grid Economics

    Chard, K., Komisarczuk, P., Bubendorfer, K. & Desai, A., 2005, Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005. p. 31-38 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Fingerprinting Seismic Activity across an Internet of Things

    Moore, J. P. T., Bagale, J. N., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    FlowWatcher: Defending against Data Disclosure Vulnerabilities in Web Applications

    Muthukumaran, D., O'Keeffe, D., Priebe, C., Eyers, D. M., Shand, B. & Pietzuch, P. R., 12 Oct 2015, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015. p. 603-615 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Food Aid Technology: The Experience of a Syrian Refugee Community in Coping with Food Insecurity

    Talhouk, R., Coles-Kemp, L., Jensen, R. B., Balaam, M., Garbett, A., Ghattas, H., Araujo-Soares, V., Ahmad, B. & Montague, K., Oct 2020, ACM Conference on Computer-Supported Cooperative Work and Social Computing. ACM, Vol. 4. p. 1-25 25 p. 134

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Formal derivation of concurrent garbage collectors

    Pavlovic, D., Pepper, P. & Smith, D. R., 2010, Proceedings of MPC 2010. Desharnais, J. (ed.). Springer-Verlag, Vol. 6120. p. 353-376 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks

    Oussena, S., Essien, J. & Komisarczuk, P., 2014, ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems, Volume 3, Lisbon, Portugal, 27-30 April, 2014. p. 427-434 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    From user-centred design to security: building attacker personas for digital banking

    Moeckel, C., 29 Sep 2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), p. 892-897 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Gaming security by obscurity

    Pavlovic, D., 2011, NSPW '11 Proceedings of the 2011 workshop on New security paradigms workshop. Gates, C. & Hearley, C. (eds.). New York, NY, USA: ACM, p. 125-140 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    GARMDROID: IoT Potential Security Threats Analysis through the Inference of Android Applications Hardware Features Requirements

    Rodriguez-Mota, A., Escamilla-Ambrosio, P. J., Happa, J. & Aguirre-Anaya, E., 2017, AFI 360 Conference Track on Future Internet and Internet of Things Applications. p. 63-74 12 p. (Lecture Notes of the Institute for Computer Sciences; vol. 179).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Geometry of abstraction in quantum computation

    Pavlovic, D., 19 Jul 2012, Proceedings of Symposia in Applied Mathematics. Abramsky, S. & Mislove, M. (eds.). AMS, Vol. 71. p. 233-267 (Proceedings of Symposia in Applied Mathematics; vol. 71).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Glamdring: Automatic Application Partitioning for Intel SGX

    Lind, J., Priebe, C., Muthukumaran, D., O'Keeffe, D., Aublin, P-L., Kelbert, F., Reiher, T., Goltzsche, D., Eyers, D. M., Kapitza, R., Fetzer, C. & Pietzuch, P. R., 2017, Proceedings of the 2017 USENIX Annual Technical Conference (USENIX ATC ’17). USENIX, p. 285-298 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Graphical user interfaces in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, 4th International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2013, San Francisco, CA, USA, May 20, 2013. p. 25-28 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Great Expectations: A Critique of Current Approaches to Random Number Generation Testing & Certification

    Hurley-Smith, D. & Hernandez-Castro, J., 21 Nov 2018, 4th International Conference on Research in Security Standardisation: SSR 2018. Cremers, C. & Lehmann, A. (eds.). Springer, p. 143-163 21 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Grid Enabled Internet Instruments

    Komisarczuk, P., Seifert, C. & Pemberton, D., 2007, Proceedings of the Global Communications Conference, 2007. GLOBECOM '07, Washington, DC, USA, 26-30 November 2007. p. 1906-1911 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Heterogeneous Internet access via PANA/UMTS

    Pagliusi, P. S. & Mitchell, C. J., 2004, Proceedings of the 3rd International Conference on Information Security, Hardware/Software Codesign and Computer Networks - ISCOCO 2004, Rio De Janeiro, Brazil, October 2004. World Scientific, 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...7 8 9 10 11 12 13 14 ...42 Next