1. Article › Research › Peer-reviewed
  2. Published

    Pairings for Cryptographers

    Galbraith, S. D., Paterson, K. G. & Smart, N. P., 2008, In : Discrete Applied Mathematics. 156, p. 3113-3121.

    Research output: Contribution to journalArticle

  3. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  4. Published

    Parsing ambiguities in authentication and key establishment protocols

    Chen, L. & Mitchell, C. J., 2010, In : International Journal of Electronic Security and Digital Forensics. 3, 1, p. 82-94 13 p.

    Research output: Contribution to journalArticle

  5. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In : Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticle

  6. Published

    Perfect binary arrays and difference sets

    Jedwab, J., Mitchell, C. J., Piper, F. C. & Wild, P., 1994, In : Discrete Mathematics. 125, p. 241-254 14 p.

    Research output: Contribution to journalArticle

  7. Published

    Perfect Factors from Cyclic Codes and Interleaving

    Mitchell, C. J. & Paterson, K. G., 1998, In : SIAM Journal on Discrete Mathematics. 11, p. 241-264 24 p.

    Research output: Contribution to journalArticle

  8. Published

    Perfect Factors in the de Bruijn Graph

    Paterson, K. G., 1995, In : Designs, Codes and Cryptography. 5, p. 115-138 24 p.

    Research output: Contribution to journalArticle

  9. Published

    Perfect hash families: probabilistic methods and explicit constructions

    Blackburn, S. R., 2000, In : Journal of Combinatorial Theory, Series A. 92, p. 54-60 7 p.

    Research output: Contribution to journalArticle

  10. Published

    Perfect Maps

    Paterson, K. G., 1994, In : IEEE Transactions on Information Theory. IT-40, p. 743-753 11 p.

    Research output: Contribution to journalArticle

  11. Published

    Perfect Secret Sharing Schemes on Five Participants

    Martin, K. M. & Jackson, W-A., 1996, In : Designs, Codes and Cryptography. 9, p. 267-286 20 p.

    Research output: Contribution to journalArticle

  12. Published

    Permutation Polynomials, de Bruijn Sequences and Linear Complexity

    Blackburn, S. R., Etzion, T. & Paterson, K. G., 1996, In : Journal of Combinatorial Theory, Series A. 76, p. 55-82 28 p.

    Research output: Contribution to journalArticle

  13. Published

    Permutations with restricted displacement

    Beker, H. J. & Mitchell, C. J., 1987, In : SIAM Journal on Algebraic and Discrete Methods. 8, p. 338-363 26 p.

    Research output: Contribution to journalArticle

  14. Published

    PKI standards

    Mitchell, C. J., Dec 2000, In : Information Security Technical Report. 5, 4, p. 17-32 16 p.

    Research output: Contribution to journalArticle

  15. Published

    Point-weight designs with design conditions on t points

    Dent, A. W., 2008, In : Discrete Mathematics. 308, 11, p. 2080-2093 14 p.

    Research output: Contribution to journalArticle

  16. Published

    Policy enforcement system for secure interoperable control in distributed Smart Grid systems

    Alcaraz, C., Lopez, J. & Wolthusen, S., 1 Jan 2016, In : Journal of Network and Computer Applications. 59, p. 301-314 14 p.

    Research output: Contribution to journalArticle

  17. Published

    Polly Cracker, revisited

    Albrecht, M., Faugere, J-C., Farshim, P., Herold, G. & Perret, L., May 2016, In : Designs, Codes and Cryptography. 79, 2, p. 261-302 42 p.

    Research output: Contribution to journalArticle

  18. Published

    Posets and protocols - picking the right three-party protocol.

    Ng, S-L., 2003, In : IEEE Journal on Selected Areas in Communications. 21, 1, p. 55-61 6 p.

    Research output: Contribution to journalArticle

  19. Published

    Positive P representation

    Schack, R. & Schenzle, A., 1991, In : Physical Review A. 44, p. 682-687 6 p.

    Research output: Contribution to journalArticle

  20. Published

    'Pour votre tranquillité': Ambiance, atmosphere, and surveillance

    Adey, P., Brayer, L., Masson, D., Murphy, P., Simpson, P. & Tixier, N., Oct 2013, In : Geoforum. 49, p. 299-309 11 p.

    Research output: Contribution to journalArticle

  21. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In : ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticle

  22. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In : Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticle

  23. Published

    Practical eavesdropping and skimming attacks on high-frequency RFID tokens

    Hancke, G., 2011, In : Journal of Computer Security. p. 259 288 p.

    Research output: Contribution to journalArticle

  24. Published

    Predicting nonlinear pseudorandom number generators

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2005, In : Math. Comp.. 74, p. 1471-1494 24 p.

    Research output: Contribution to journalArticle

  25. E-pub ahead of print

    Prenatal and perinatal risk and protective factors for psychosis: a systematic review and meta-analysis

    Davies, C., Segre, G., Estradé, A., Radua, J., De Micheli, A., Provenzani, U., Oliver, D., Salazar de Pablo, G., Ramella-Cravaro, V., Besozzi, M., Dazzan, P., Miele, M., Caputo, G., Spallarossa, C., Crossland, G., Ilyas, A., Spada, G., Politi, P., Murray, R., McGuire, P. & 1 others, Fusar-Poli, P., 24 Mar 2020, In : The Lancet Psychiatry. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  26. Published

    Preparation information and optimal decompositions for mixed quantum states

    Soklakov, A. N. & Schack, R., 2000, In : J. Mod. Opt.. 47, p. 2265-2276 12 p.

    Research output: Contribution to journalArticle

  27. Published

    Privacy and Consent in Pervasive Networks

    Malik, N. A. & Tomlinson, A., 1 Aug 2009, In : Information Security Technical Report. 14, 3, p. 138 - 142

    Research output: Contribution to journalArticle

  28. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 2018, In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

  29. Published

    Privacy Threats in a Mobile Enterprise Social Network

    Tomlinson, A., Yau, P-W. & MacDonald, J. A., 1 May 2010, In : Information Security Technical Report. 15, 2, p. 57 - 66

    Research output: Contribution to journalArticle

  30. Published

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. & Ng, S., Jul 2017, In : IET Information Security . 11, 4, p. 204-210 7 p.

    Research output: Contribution to journalArticle

  31. Published

    Problems and prospects of multi application smart cards in the UK financial industry

    Markantonakis, K. & Mayes, K., 2007, In : Icebe 2007: ieee international conference on e-Business engineering, proceedings. p. 447-452 6 p.

    Research output: Contribution to journalArticle

  32. Published

    Products of subsets in an abelian group

    Blackburn, S. R. & Spencer, A. J., 2003, In : Journal of Combinatorial Theory, Series A. 103, p. 53-68 16 p.

    Research output: Contribution to journalArticle

  33. Published

    Prolific codes with the identifiable parent property

    Blackburn, S. R., Etzion, T. & Ng, S-L., 2008, In : SIAM Journal on Discrete Mathematics. 22, 4, p. 1393-1410 18 p.

    Research output: Contribution to journalArticle

  34. Published

    Properties of the Error Linear Complexity Spectrum

    Etzion, T., Kalouptsidis, N., Kolokotronis, N., Limniotis, K. & Paterson, K. G., 2009, In : IEEE Transactions on Information Theory. 55, 10, p. 4681-4686 6 p.

    Research output: Contribution to journalArticle

  35. Published

    Properties of the frequency operator do not imply the quantum probability postulate

    Caves, C. M. & Schack, R., 2005, In : Ann. Phys.. 315, p. 123-146 24 p.

    Research output: Contribution to journalArticle

  36. Published

    Protocols and cryptography

    Ciechanowicz, C., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 1

    Research output: Contribution to journalArticle

  37. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G., 2011, In : IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticle

  38. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In : ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticle

  39. Published

    Providing anonymity in unconditionally secure secret sharing schemes

    Guillermo, M., Martin, K. M. & O'Keefe, C. M., 2003, In : Designs, Codes and Cryptography. 28, p. 227-245 19 p.

    Research output: Contribution to journalArticle

  40. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In : Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticle

  41. Published

    Pure fields of degree 9 with class number prime to 3

    Walter, C. D., 1980, In : Annales de l'Institut Fourier, Grenoble. 30, p. 1-16 16 p.

    Research output: Contribution to journalArticle

  42. Published

    Putting dots in triangles

    Blackburn, S., Paterson, M. & Stinson, D. R., 2011, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 78, p. 23-32

    Research output: Contribution to journalArticle

  43. Published

    Quantum Bayes rule

    Schack, R., Brun, T. A. & Caves, C. M., 2001, In : Physical Review A. 64, p. 014305 1 p.

    Research output: Contribution to journalArticle

  44. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In : Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticle

  45. Published

    Quantum chaos in open systems: a quantum state diffusion analysis

    Brun, T. A., Percival, I. C. & Schack, R., 1996, In : Journal of Physics A: Mathematical and General. 29, p. 2077-2090 14 p.

    Research output: Contribution to journalArticle

  46. Published

    Quantum Leap and Crash: Searching and Finding Bias in Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., Jun 2020, In : ACM Transactions on Privacy and Security. 23, 3, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  47. Published

    Quantum probabilities as Bayesian probabilities

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 65, p. 022305 1 p.

    Research output: Contribution to journalArticle

  48. Published

    Quantum probability from decision theory?

    Barnum, H., Caves, C. M., Finkelstein, J., Fuchs, C. A. & Schack, R., 2000, In : Proc. R. Soc. Lond. A. 456, p. 1175-1182 8 p.

    Research output: Contribution to journalArticle

  49. Published

    Quantum state diffusion with a moving basis: computing quantum-optical spectra

    Schack, R., Brun, T. A. & Percival, I. C., 1996, In : Physical Review A. 53, p. 2694 1 p.

    Research output: Contribution to journalArticle

  50. Published

    Quantum state diffusion, localization and computation

    Schack, R., Brun, T. A. & Percival, I. C., 1995, In : Journal of Physics A: Mathematical and General. 28, p. 5401-5413 13 p.

    Research output: Contribution to journalArticle

  51. Published

    Quantum theory from four of Hardy's axioms

    Schack, R., 2003, In : Foundations of Physics. 33, p. 1461-1468 8 p.

    Research output: Contribution to journalArticle

Previous 1...9 10 11 12 13 14 15 16 ...42 Next