1. Anthology › Research
  2. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  3. Forthcoming

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, (Accepted/In press) Palgrave Macmillan.

    Research output: Book/ReportAnthology

  4. Published
  5. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  6. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  7. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  8. Commissioned report › Research
  9. Published

    Class Number Relations in Algebraic Number Fields

    Walter, C. D., 1 Apr 1976, University of Cambridge.

    Research output: Book/ReportCommissioned report

  10. Published

    Measurement Study on Malicious Web Servers in the. nz Domain: Final Report September 2009

    Seifert, C., Delwadia, V., Komisarczuk, P., Stirling, D. & Welch, I., 2009, InternetNZ. 1 p.

    Research output: Book/ReportCommissioned report

  11. Other report › Research
  12. Published

    AES Security Report: ECRYPT Report D.STVL.2

    Cid, C. & Gilbert, H., 30 Jan 2006, ECRYPT. 73 p.

    Research output: Book/ReportOther report

  13. Published

    Algebraic Cryptanalysis of Symmetric Primitives: ECRYPT report D.STVL.7

    Cid, C., 18 Jul 2008, ECRYPT. 42 p.

    Research output: Book/ReportOther report

  14. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  15. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  16. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  17. Published
  18. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  19. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  20. Published

    The eSTREAM Portfolio - 2009 Annual Update: ECRYPT II report D.SYM.3

    Cid, C. & Robshaw, M. J. B., 1 Oct 2009, ECRYPT II. 10 p.

    Research output: Book/ReportOther report

  21. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  22. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  23. Patent › Research
  24. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  25. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2004

    Research output: Patent

  26. Article › Research › Not peer-reviewed
  27. Published

    A Bit-fixing PRF with O(1) Collusion-Resistance from LWE

    Davidson, A. & Nishimaki, R., 21 Sep 2018, In : IACR Cryptology ePrint Archive. 2018, 890, p. 1-25 25 p.

    Research output: Contribution to journalArticle

  28. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In : NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  29. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  30. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P., 14 Dec 2016, In : IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  31. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T., 1 Jun 2018, In : Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  32. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In : Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  33. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In : IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  34. Published

    Driverless Vehicle Security for Military Applications

    Bates, N. & Akram, R. N., 10 Jul 2020, In : Computer Weekly.

    Research output: Contribution to journalArticle

  35. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  36. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  37. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S., 6 Aug 2018, (Submitted) In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  38. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In : Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  39. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In : Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  40. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A., Jan 2017, In : Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  41. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  42. Published

    Quam Bene Non Quantum: Bias in a Family of Quantum Random Number Generators

    Hurley-Smith, D. & Hernandez-Castro, J., 2017, In : IACR Cryptology ePrint Archive. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  43. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  44. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 Nov 2019, In : IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  45. Published

    Technological advances drive development of new cryptographic mechanisms

    Martin, K., 2018, In : Jane's Intelligence Review. 30, 11, p. 52-55

    Research output: Contribution to journalArticle

  46. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In : Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  47. Article › Research › Peer-reviewed
  48. Published

    (De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking

    Moeckel, C., 28 Jul 2020, In : Journal of Universal Computer Science. 26, 7, p. 783-804 22 p.

    Research output: Contribution to journalArticle

  49. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    RUSH, M. & Ibrahim, S., 1 Mar 2018, In : Sociological Research Online. 23, 1, p. 177-196 20 p.

    Research output: Contribution to journalArticle

  50. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In : Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticle

  51. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In : Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticle

  52. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In : Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticle

  53. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In : Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticle

  54. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In : Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticle

  55. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticle

  56. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In : Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...42 Next