1. Article › Research › Peer-reviewed
  2. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In: Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Commoning mobility: Towards a new politics of mobility transitions

    Nikolaeva, A., Adey, P., Cresswell, T., Jeonjae Lee, J., Novoa, A. & Temenos, C., Jun 2019, In: Transactions of the Institute of British Geographers. 44, 2, p. 346-360 15 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In: EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In: IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In: Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 105–123 19 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  15. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, (E-pub ahead of print) In: Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 21-46 26 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Criteria to evaluate Automated Personal Identification Mechanisms

    Palmer, A., 1 Dec 2008, In: Computers and Security. 27, 7-8, p. 260-284 25 p., Palmer:2008:CEA2639520.2639609.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In: Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In: IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In: Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In: Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Cryptanalysis of a hybrid authentication protocol for large mobile networks

    Tang, Q. & Mitchell, C. J., Apr 2006, In: Journal of Systems and Software. 79, 4, p. 496-501 6 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In: IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In: Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In: Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In: IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Cryptographic enforcement of information flow policies without public information via tree partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 24 Aug 2017, In: Journal of Computer Security. 25, 6, p. 511-535 25 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In: Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In: Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Cultural Heritage Predictive Rendering

    Happa, J., Bashford-Rogers, T., Wilkie, A., Artusi, A., Debattista, K. & Chalmers, A., 2012, In: Computer Graphics Forum.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Cyber Security Threats and Challenges in Collaborative Mixed-Reality

    Happa, J., Glencross, M. & Steed, A., 9 Apr 2019, In: Frontiers in ICT. 6, p. 1-20 20 p., 5.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In: Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2008, In: International Journal of Information Security. 7, 2, p. 123-136 14 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

    Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P. & Blasco, J., Mar 2014, In: Expert Systems with Applications. 41, 4, Part 1, p. 1104-1117 14 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S., 2009, In: International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Design of a secure distance-bounding channel for RFID

    Hancke, G., 2012, In: Journal of Network and Computer Applications. 34, 3, p. 877-887

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In: Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Detection of repackaged mobile applications through a collaborative approach

    Aldini, A., Martinelli, F., Saracino, A. & Sgandurra, D., 10 Aug 2015, In: Concurrency Computation. 27, 11, p. 2818-2838 21 p.

    Research output: Contribution to journalArticlepeer-review

  45. E-pub ahead of print

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 17 Nov 2020, (E-pub ahead of print) In: Journal of Mathematical Cryptology. 15, 1, p. 45-59 15 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Disjoint difference families and their applications

    Ng, S-L. & Paterson, M. B., Jan 2016, In: Designs, Codes and Cryptography. 78, p. 103-127 25 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Distance Bounding: A Practical Security Solution for Industrial Real-Time Location Systems?

    Abu-Mahfouz, A. & Hancke, G., Feb 2013, In: IEEE Transactions on Industrial Informatics. 9, 1, p. 16 27 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In: IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P., 2005, In: Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Distributing trust amongst multiple authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, In: Journal of Computer Security. 3, 4, p. 255-267 13 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...5 6 7 8 9 10 11 12 ...43 Next