1. Conference contribution › Research
  2. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 22 Oct 2020, Proceedings of 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Press, p. 664-672 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Forthcoming

    WearFlow: Expanding Information Flow Analysis To Companion Apps in Wear OS

    Tileria, M., Blasco, J. & Suarez-Tangil, G., 27 May 2020, (Accepted/In press) 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., Dec 2012, Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    When the Civic Turn turns Digital: Designing Safe and Secure Refugee Resettlement

    Jensen, R. B., Coles-Kemp, L. & Talhouk, R., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, (E-pub ahead of print) CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, (E-pub ahead of print) ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Entry for encyclopedia/dictionary › Research
  57. Forthcoming

    Biometric Technology

    Thornton, P. & Adey, P., 2015, (Accepted/In press) Dictionary of International Migration. Brasilia Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  58. Published

    Encyclopedia of Cyber Warfare

    Springer, P. J. (ed.) & Repel, D., 2017, Encyclopedia of Cyber Warfare. 1 ed. ABC-Clio, p. 51-52 2 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  59. Chapter › Research
  60. Forthcoming

    "Computer Says No": Exploring social justice in digital services

    Crivellaro, C., Coles-Kemp, L. & Wood, K., 26 Apr 2021, (Accepted/In press) Hope Under Neoliberal Austerity: Responses from Civil Society and Civic Universities. Steer, M., Davoudi, S., Shucksmith, M. & Todd, L. (eds.). Policy Press, p. 89-104 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  61. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  62. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  65. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  66. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  67. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  68. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  69. Published

    A generic group key management framework for group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2006, Proceedings of the 6th International Network Conference (INC2006).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    A model to facilitate discussions about cyber attacks

    Happa, J. & Fairclough, G., 2017, Ethics and policies for cyber operations. Springer, p. 169-185 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  71. Published

    A Multi-criteria-Based Evaluation of Android Applications

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 2012, Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Mitchell, C. J. & Tomlinson, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 67-82 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016. Springer-Verlag, p. 173-184 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  73. Published

    A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T., 2017, CRYPTO 2017: Advances in Cryptology – CRYPTO 2017. Springer, p. 682-710 29 p. (Lecture Notes in Computer Science; vol. 10403).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  74. Published

    A Review on Attacks and Their Countermeasures in Power System State Estimation

    Gul, A. & Wolthusen, S. D., 2018, Smart Micro-Grid Systems Security and Privacy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  76. Published

    Adaptive online/offline RFID scheme for supply chain management systems

    Bilal, Z. & Martin, K. M., 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) . IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Forthcoming

    Airports

    Adey, P., 2013, (Accepted/In press) Globalization in Practice. Thrift, N., Tickell, A. & Woolgar, S. (eds.). Oxford University Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J., 2009, Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  79. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. E-pub ahead of print

    An Analysis of NIST SP 800-90A

    Woodage, J. & Shumow, D., 24 Apr 2019, (E-pub ahead of print) Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D., 5 Oct 2017, Custard, Culverts and Cake: Academics on Life in The Archers. Courage, C. & Headlam, N. (eds.). Emerald Publishing, p. 249-267

    Research output: Chapter in Book/Report/Conference proceedingChapter

  84. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  85. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2009, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  91. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  92. Published

    Attacking the IPsec Standards in Encryption-only Configurations

    Degabriele, J. P. & Paterson, K. G., 2007, IEEE Symposium on Privacy and Security. IEEE Computer Society Press, p. 335-349 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  93. Published

    Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis

    Balfe, S. & Paterson, K. G., 2008, Financial Cryptography. Tsudik, G. (ed.). Springer, p. 171-175 5 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  94. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2 Jul 2015, 2015 International Conference on Biometrics (ICB). IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  96. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., Aug 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    Belief and Trust in Fault Tolerance

    Price, G., 2003, Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Dimitrakos, T. & Martinelli, F. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  99. Published

    Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases

    Cid, C. & Weinmann, R-P., 2009, Gröbner Bases, Coding, and Cryptography. Springer, p. 307-327 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  100. Published

    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards

    Markantonakis, K., 1999, Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, p. 230-243 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  101. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. Published

    Broadening the scope of Fault Tolerance within Secure services

    Price, G., 2000, Security Protocols, 8th International Workshop, Cambridge, UK. 3-5 April, 2000. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  103. Published

    Building better signcryption schemes with Tag-KEMs

    Bjørstad, T. E. & Dent, A. W., 2006, Public Key Cryptography -- PKC 2006. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Springer-Verlag, p. 491-507 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  104. Published

    Building general purpose security services on trusted computing

    Chen, C., Mitchell, C. J. & Tang, S., 2012, Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Chen, L., Yung, M. & Zhu, L. (eds.). Springer-Verlag, Vol. 7222. p. 16-31 16 p. (Lecture Notes in Computer Science; no. 7222).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  105. Published

    Building key-private, public-key encryption schemes

    Paterson, K. G. & Srinivasan, S., 2009, ACISP. Boyd, C. & Neito, J. (eds.). Springer, p. 276-292 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  106. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G., 2005, PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  107. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  108. Published

    Certificateless Encryption Schemes Strongly Secure in the Standard Model

    Dent, A. W., Libert, B. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  109. Published

    Certificateless public key cryptography

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. Asiacrypt 2003. Laih, C. S. (ed.). p. 452-473 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  110. Published

    Challenging the adversary model in secret sharing schemes

    Martin, K. M., 2008, Coding and Cryptography II. Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts. p. 45-63 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  111. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, Information Security and Privacy, 4th Australasian Conference, ACISP99. Springer, Vol. 1587. p. 177-191 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  112. Published

    Classification framework for fair content tracing protocols

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 8th International Workshop (IWDW 2009). Springer, Vol. 5703. p. 252-267 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  113. Published

    Client v. Server side Protocols, Interfaces and Storage

    Price, G., 2003, Security Protocols, 11th International Workshop, Cambridge, UK. 2-4 April, 2003. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  114. Published

    Clock-controlled Pseudorandom Generators on Finite Groups

    Baum, U. & Blackburn, S. R., 1995, Fast Software Encryption, 2nd International Workshop, Leuven, Belgium. Preneel, B. (ed.). Berlin: Springer, p. 6-21 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  115. Published

    Codes, Correlations and Power Control in OFDM

    Davis, J. A., Jedwab, J. & Paterson, K. G., 1999, Difference Sets, Sequences and their Correlation Properties. Pott, A. (ed.). Dordrecht: Kluwer Academic Publishers, p. 113-132 20 p. (NATO Science Series C).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  116. Published

    Coding Techniques for Power Controlled OFDM

    Paterson, K. G., 1998, Proceedings of 9th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '98). IEEE Computer Society Press, Vol. 2. p. 801-805 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  117. Published

    Combinatorial schemes for protecting digital content

    Blackburn, S. R., 2003, Surveys in Combinatorics 2003. Wensley, C. D. (ed.). Cambridge: Cambridge University Press, p. 43-78 36 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  118. Published

    Combinatorics and Threshold Cryptography

    Blackburn, S. R., 1999, Combinatorial Designs and their Applications. Holroyd, F. C., Quinn, K. A. S., Rowley, C. & Web, B. S. (eds.). London: CRC Press, p. 49-70 22 p. (Chapman and Hall/CRC Research Notes in Mathematics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  119. Published

    Coming up for air: Comfort, conflict and the air of the megacity

    Adey, P., 2013, Urban Interstices: The Aesthetics and the Politics of the In-between. Ashgate Publishing Ltd, p. 103-118 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  120. Published

    Communicating Afghanistan: Strategic Narratives and the Case of UK Public Opinion

    Jensen, R., 2015, Strategic Narratives, Public Opinion and War: Winning Domestic Support for the Afghan War. de Graaf, B., Dimitriu, G. & Ringsmose, J. (eds.). London: Routledge, p. 300-317 (Contemporary Security Studies).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  121. Published

    Concurrent Signatures

    Chen, L., Kudla, C. J. & Paterson, K. G., 2004, Proc. Eurocrypt 2004. Cachin, C. & Camenisch, J. (eds.). Springer, p. 287-305 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  122. Published

    Confidential Signatures and Deterministic Signcryption

    Dent, A. W., Fischlin, M., Maulis, M., Stam, M. & Schroder, D., 2010, Public Key Cryptography -- PKC 2010. Nguyen, P. & Pointcheval, D. (eds.). p. 462-479 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  123. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  124. Published

    Cryptanalysis of a message authentication code due to Cary and Venkatesan

    Blackburn, S. R. & Paterson, K. G., 2004, Fast Software Encryption 2004. Roy, B. & Meier, W. (eds.). Berlin: Springer, p. 446-453 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  125. Published

    Cryptanalysis of two cryptosystems based on group actions

    Blackburn, S. R. & Galbraith, S. D., 1999, Advances in Cryptology -- ASIACRYPT '99. Lam, K. Y., Xing, C. & Okamoto, E. (eds.). Berlin: Springer, p. 52-61 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  126. Forthcoming

    Cryptographic controls: the heart of cyber security

    Martin, K., 2018, (Accepted/In press) Handbook of Security Science. Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  127. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K., 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing. p. 15-30 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  128. Published

    Cryptography and Cryptanalysis

    Mitchell, C. J. & Piper, F. C., 1990, Handbook of Applicable Mathematics: Supplement. Ledermann, W., Lloyd, E., Vajda, S. & Alexander, C. (eds.). John Wiley & Sons, p. 53-92 40 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  129. Published

    Cryptography for mobile security

    Mitchell, C. J., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 3-10 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  130. Published

    Cryptography from Pairings

    Paterson, K. G., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge University Press, p. 215-251 37 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  131. Published

    Cryptography in theory and practice: The case of encryption in IPsec

    Paterson, K. G. & Yau, A. K. L., 2006, Eurocrypt 2006. Vaudenay, S. (ed.). Springer, p. 12-29 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  132. Published

    Cumulative Arrays and Geometric Secret Sharing Schemes

    Jackson, W-A. & Martin, K. M., 1993, Advances in Cryptology: Auscrypt '92. Springer, Vol. 718. p. 48-55 8 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  133. E-pub ahead of print

    Cyber 9/11 Will Not Take Place: A User Perspective of Bitcoin and Cryptocurrencies from Underground and Dark Net Forums

    Butler, S., 22 Jun 2021, (E-pub ahead of print) Socio-Technical Aspects in Security and Trust: 10th International Workshop, STAST 2020, Virtual Event, September 14, 2020, Revised Selected Papers. Springer, p. 135-153 19 p. (Lecture Notes in Computer Science; vol. 12812).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  134. Published

    Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns

    Amorim, R. C. & Komisarczuk, P., 2014, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  135. Published

    Deniable authenticated key establishment for Internet protocols

    Boyd, C., Mao, W. & Paterson, K. G., 2005, Security Protocols, 11th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer, p. 255-271 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  136. E-pub ahead of print

    Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case

    Blasco Alis, J., 2 Aug 2017, (E-pub ahead of print) Data Analytics and Decision Support for Cybersecurity. Springer, p. 55-97 43 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  137. Published

    Developments in security mechanism standards

    Mitchell, C. J., 2000, Internet and Intranet Security Management: Risks and Solutions. Janczewski, L. J. (ed.). Idea Group Publishing, p. 185-246 62 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  138. Published

    Diary of a plastic soldier (extracts)

    Thornton, P., 12 Jul 2017, Embodying militarism: exploring the spaces and bodies in-between. Dyvik, S. L. & Greenwood, L. (eds.). Routledge, Chapter 12

    Research output: Chapter in Book/Report/Conference proceedingChapter

  139. Published

    Digital signatures

    Mitchell, C. J., Piper, F. C. & Wild, P., 1992, Contemporary cryptology: The science of information integrity . Simmons, G. J. (ed.). IEEE, p. 325-378 54 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  140. Published

    Distributed Certificate Authority in cluster-based ad hoc networks

    Martin, K. M. & Chaddoud, G., 2006, Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking. p. 278-283

    Research output: Chapter in Book/Report/Conference proceedingChapter

  141. Published

    Documenting Greenland: Popular Geopolitics on Film

    Dodds, K-J. & Jensen, R. B., 4 Jan 2019, Arctic Cinemas and the Documentary Ethos. Kaganovsky, L., MacKenzie, S. & Westerstahl Stenport, A. (eds.). Bloomington: University of Indiana Press, 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  142. Published

    Dynamic access policies for unconditionally secure secret sharing schemes

    Martin, K. M., 2005, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan. IEEE Computer Society Press, p. 61-66

    Research output: Chapter in Book/Report/Conference proceedingChapter

  143. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  144. Published

    e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies

    Balfe, S. & Paterson, K. G., 2008, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008). Xu, S., Nita-Rotaru, C. & Seifert, J. P. (eds.). ACM, p. 81-92 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  145. Published

    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

    Birkett, J., Dent, A. W., Neven, G. & Schuldt, J. C. N., 2007, Information Security and Privacy: 12th Australasian Conference -- ACISP 2007. Pieprzyk, J., Ghodosi, H. & Dawson, E. (eds.). Springer-Verlag, p. 274-292 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  146. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N., 2006, ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  147. Published

    Efficient KEMs with Partial Message Recovery

    Bjørstad, T. E., Dent, A. W. & Smart, N. P., 2007, Cryptography and Coding -- 11th IMA International Conference. Galbraith, S. D. (ed.). Springer-Verlag, p. 233-256 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  148. Published

    Efficient key predistribution for grid-based wireless sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., 2008, Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  149. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  150. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2008, ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  151. Published

    Efficient Secret Sharing without a Mutually Trusted Authority

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Eurocrypt '95. Springer, Vol. 921. p. 183-193 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  152. E-pub ahead of print

    Efficient, XOR-Based, Ideal (t,n)− threshold Schemes

    Chen, L., Laing, T. & Martin, K., 28 Oct 2016, (E-pub ahead of print) Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052. p. 467-483 17 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  153. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  154. Published

    Enumerating Perfect Maps

    Paterson, K. G. & Hoare, P. R., 1995, Cryptography and Coding IV. Farrell, P. G. (ed.). Southend-On-Sea, Essex: Formara Ltd.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  155. Forthcoming

    Estonia: a curious and cautious approach to artificial intelligence and national security

    Robinson, N., Hardy, A. & Ertan, A., 2022, (Accepted/In press) Routledge Companion to Artificial Intelligence and National Security Policy.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  156. Published

    Estonia: From the Bronze Night to Cybersecurity Pioneers

    Hardy, A. & Robinson, N., 2021, The Routledge Companion to Global Cyber Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  157. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H., 2006, Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  158. Published

    Existence of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2002, Codes, Graphs, and Systems: A Celebration of the Life and Career of G. David Forney. Blahut, R. E. & Koetter, R. (eds.). Kluwer Academic Publishers, p. 187-197 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  159. Published

    Experiences of SOLO 1000 in research at the University of Edinburgh

    McGregor, M. S., Tomlinson, A. & Tan, O. K., 1989, Electronics Computer Aided Design. Jones, P. L. & Buckley, A. (eds.). Manchester University Press, p. 182-184 3 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  160. E-pub ahead of print

    Fast Message Franking: From Invisible Salamanders to Encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., 25 Jul 2018, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I. Shacham, H. & Boldyreva, A. (eds.). Springer, p. 155-186 32 p. (Lecture Notes in Computer Science; vol. 10991).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  161. Published

    Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-Marketplaces

    Li, Q., Zhang, J. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012) . IEEE Computer Society Press, p. 334-341

    Research output: Chapter in Book/Report/Conference proceedingChapter

  162. Published

    Flexible and Secure Communications in an Identity-Based, Coalition Environment.

    Boklan, K. D., Klagsbrun, Z., Paterson, K. G. & Srinivasan., S., 2008, IEEE Milcom, 2008..

    Research output: Chapter in Book/Report/Conference proceedingChapter

  163. Published

    Golay Complementary Sequences

    Parker, M. G., Tellambura, C. & Paterson, K. G., 2003, Wiley Encyclopedia of Telecommunications. Proakis, J. G. (ed.). Wiley-Interscience

    Research output: Chapter in Book/Report/Conference proceedingChapter

  164. Published

    Group communication: Design challenges in the development of key management frameworks in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2005, Proceedings of Security & Management (SAM '05), Las Vegas. p. 385-391 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  165. Published

    Hidden pairings and trapdoor DDH groups

    Dent, A. W. & Galbraith, S. D., 2006, Algorithmic Number Theory: 7th International Symposium (ANTS VII). Hess, F., Pauli, S. & Pohst, M. (eds.). Springer-Verlag, p. 436-451 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  166. Published

    Host mobility protocol for secure group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2007, Proceedings of 2007 International Conference on Future Generation Communication and Networking (FGCN 2007). IEEE Computer Society Press, p. 100-107

    Research output: Chapter in Book/Report/Conference proceedingChapter

  167. Published

    Hybrid signcryption schemes with insider security

    Dent, A. W., 2005, Information Security and Privacy: 10th Australasian Conference -- ACISP 2005. Boyd, C. & Nieto, J. M. G. (eds.). Springer-Verlag, p. 253-266 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  168. Published

    Hybrid signcryption schemes with outsider security

    Dent, A. W., 2005, Information Security: 8th International Conference -- ISC 2005. Zhou, J., Lopez, J., Deng, R. H. & Bao, F. (eds.). Springer-Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  169. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K. G., 2005, Proceedings of the 1st IEEE International Conference on e-Science and Grid Computing (e-Science 2005). Stockinger, H., Buyya, R. & Perrott, R. (eds.). IEEE Computer Society Press, p. 395-404 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  170. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G. & Smart, N. P., 2006, Automata, Languages and Programming (2) -- ICALP 2006. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I. (eds.). Springer-Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  171. Published

    Identity-based traitor tracing

    Abdalla, M., Dent, A. W., Malone-Lee, J., Neven, G., Phan, D. H. & Smart, N. P., 2007, Public Key Cryptography -- PKC 2007. Okamoto, T. & Wang, X. (eds.). Springer-Verlag, p. 458-476 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  172. Published

    Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2008, SCN. Ostrovsky, R., Prisco, R. D. & Visconti, I. (eds.). Springer, Vol. 5229. p. 340-357 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  173. Published

    Implementing a Secure Log File Download Manager for the Java Card

    Markantonakis, K. & Xenitellis, S., 1999, Proceedings of the IFIP TC6/TC11 Joint Working Conference on Secure Information Networks: Communications and Multimedia Security. Kluwer, B.V., p. 143-162 20 p. (CMS '99).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  174. Published

    Imprimitive permutation groups and trapdoors in iterated block ciphers

    Paterson, K. G., 1999, Proceedings, Fast Software Encryption Workshop. Knudsen, L. R. (ed.). Springer, p. 201-214 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  175. Published

    Increasing Awareness of Smart card System Security Issues: Smart Card Technology International Journal

    Mayes, K., Al Hussein, M. & Markantonakis, K., 2004, Smart Card Technology International Journal. Locke, M. (ed.). Smart Card Technology International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  176. Published

    Increasing Efficiency of International Key Escrow in Mutually Mistrusting Domains

    Martin, K. M., 1997, Cryptography and Coding. Springer, Vol. 1355. p. 221-232 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  177. Published

    Information Security

    Crampton, J., Paterson, K. G., Piper, F. & Robshaw, M. J. B., 2006, Handbook of Security. Gill, M. (ed.). Palgrave Macmillan, p. 358-379 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  178. Published

    Insider Threat and Information Security Management

    Coles-Kemp, L. & Theoharidou, M., 2010, Insider Threats in Cyber Security: Advances in Information Security. Springer, Vol. 49. p. 45-71 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  179. Published

    Interconnection Networks Based on Two-dimensional de Bruijn Graphs

    Paterson, K. G., 1997, Applications of Combinatorial Mathematics. Mithcell, C. J. (ed.). Oxford: Clarendon Press, (The Institute of Mathematics and Its Applications Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  180. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J., 2005, Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  181. Published

    Introduction to the TPM

    Tomlinson, A., 2008, Smart Cards, Tokens, Security and Applications. Springer, p. 155-172 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  182. Published

    Is the Performance of Smart Card Cryptographic Functions the Real Bottleneck?

    Markantonakis, K., 2001, Proceedings of the IFIP TC11 Sixteenth Annual Working Conference on Information Security: Trusted Information: The New Decade Challenge. Kluwer, B.V., p. 77-92 16 p. (IFIP/Sec '01).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  183. Published

    Key agreement using statically keyed authenticators

    Boyd, C., Mao, W. & Paterson, K. G., 2004, ACNS 2004. Jakobsson, M., Yung, M. & Zhou, J. (eds.). Springer, p. 248-262 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  184. Published

    Key establishment using signcryption techniques

    Dent, A. W., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 217-240

    Research output: Chapter in Book/Report/Conference proceedingChapter

  185. Published

    Key Refreshing in Identity-based Cryptography and its Applications in MANETs

    Balfe, S., Boklan, K., Klagsbrun, Z. & Paterson, K. G., 2007, IEEE Milcom 2007.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  186. Published

    Key refreshing in wireless sensor networks

    Blackburn, S. R., Martin, K. M., Paterson, M. B. & Stinson, D. R., 2008, Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008: Proceedings . Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 156-170 15 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  187. Published

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 16 Sep 2019, 2019 IEEE Symposium on Security and Privacy (SP). IEEE Press, p. 1067-1083 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  188. Published

    MADAM: A Multi-level Anomaly Detector for Android Malware

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 2012, Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings. Kotenko, I. & Skormin, V. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 240-253 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  189. Published

    Management of secure systems and security within OSI

    Mitchell, C. J., 1993, Information Security. Ettinger, J. E. (ed.). Chapman & Hall, p. 47-60 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  190. Published

    Managing Critical Infrastructures through Virtual Network Communities

    Baiardi, F., Sala, G. & Sgandurra, D., 2008, Critical Information Infrastructures Security: Second International Workshop, CRITIS 2007, Málaga, Spain, October 3-5, 2007. Revised Papers. Lopez, J. & Hämmerli, B. M. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  191. Published

    Managing Perceptions: Strategic Communication and the Story of Success in Libya

    Jensen, R., 2014, Lessons from Libya: NATO’s 2011 Military Campaign in Context. Engelbrekt, K., Mohlin, M. & Wagnsson, C. (eds.). London: Routledge, p. 171-194

    Research output: Chapter in Book/Report/Conference proceedingChapter

  192. Published

    Measuring Semantic Integrity for Remote Attestation

    Baiardi, F., Cilea, D., Sgandurra, D. & Ceccarelli, F., 2009, Trusted Computing: Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings.. Chen, L., Mitchell, C. J. & Martin, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 81-100 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  193. Published

    Mobilities

    Adey, P. & Squire, R., 1 Jan 2017, Routledge Handbook of International Political Sociology. Guillaume, X. & Bilgin, P. (eds.). Routledge, Chapter 20

    Research output: Chapter in Book/Report/Conference proceedingChapter

  194. Forthcoming

    Mobilities: politics, practices, places

    Adey, P., 2013, (Accepted/In press) Introducing Human Geographies 3rd Edition. Cloke, P., Crang, P. & Goodwin, M. (eds.). Routledge

    Research output: Chapter in Book/Report/Conference proceedingChapter

  195. Published

    Modeling and Managing Risk in Billing Infrastructures

    Baiardi, F., Telmon, C. & Sgandurra, D., 2009, Critical Infrastructure Protection III: Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers. Palmer, C. & Shenoi, S. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 51-64 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  196. E-pub ahead of print

    Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 14 May 2019, (E-pub ahead of print) Security and Privacy Trends in the Industrial Internet of Things. p. 223-243 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  197. Published

    Modular security proofs for key agreement protocols

    Kudla, C. J. & Paterson, K. G., 2005, Proc. Asiacrypt 2005. Roy, B. (ed.). Springer, p. 549-565 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  198. Published

    Multi-Application Smart Card Platforms and Operating Systems

    Markantonakis, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 59-92 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  199. Published

    Multi-key Hierarchical Identity-based Signatures

    Lim, H. W. & Paterson, K. G., 2007, Eleventh IMA International Conference on Cryptography and Coding. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 384-402 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  200. Published

    Multisecret Threshold Schemes

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1994, Advances in Cryptology: Crypto '93. Springer, Vol. 773. p. 126-135 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  201. Published

    Multisender authentication systems with unconditional security

    Martin, K. M. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 130-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  202. Published

    Non-interactive designated verifier proofs and undeniable signatures

    Kudla, C. J. & Paterson, K. G., 2005, Proc. IMA Conference on Cryptography and Coding. Smart, N. P. (ed.). Springer, p. 136-154 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  203. Published

    Not So Liminal Now: The Importance of Designing Privacy Features Across a Spectrum of Use

    Coles-Kemp, L. & Reddington, J., 2013, Digital Enlightenment Yearbook 2013. Hildebrandt, M., O'Hara, K. & Waidnder, M. (eds.). IOS Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  204. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  205. Published

    On Sharing Many Secrets

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Asiacrypt '94, Lecture Notes in Computer Science. Springer, Vol. 917. p. 42-54 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  206. Published

    On the (In)security of Two Buyer-Seller Watermarking Protocols

    Martin, K. M. & Poh, G. S., 2008, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29. INSTICC Press, p. 253-260 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  207. Published

    On the applicability of combinatorial designs to key predistribution for wireless sensor networks

    Martin, K. M., 2009, Coding and Cryptology (IWCC2009). Springer, Vol. 5557. p. 124-145 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  208. Published

    On the Security of RC4 in TLS

    Alfardan, N., Bernstein, D. J., Paterson, K., Poettering, B. & Schuldt, J., Aug 2013, USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter

  209. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints

    Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2015, (Accepted/In press) 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  210. Published

    One-time-password-authenticated key exchange

    Paterson, K. G. & Stebila, D., 2010, ACISP. Steinfeld, R. & Hawkes, P. (eds.). Springer, p. 264-281 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  211. Forthcoming

    Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

    Crampton, J., Farley, N., Gutin, G. & Jones, M., 2015, (Accepted/In press) 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy: DBSec 2015. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  212. Published

    Orientable Sequences

    Martin, K. M., Dai, Z. D., Robshaw, M. J. B. & Wild, P. R., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 97-115 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  213. Published

    Padding oracle attacks on CBC-mode encryption with random and secret IVs

    Yau, A. K. L., Paterson, K. G. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer, p. 299-319 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  214. Published

    Padding Oracle Attacks on the ISO CBC Mode Encryption Standard

    Paterson, K. G. & Yau, A., 2004, Proc. CT-RSA04. Okamoto, T. (ed.). Springer, p. 305-323 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  215. Published

    Parameterized Complexity of the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gutin, Z. & Wahlstrom, M., 2017, Combinatorial Optimization and Graph Algorithms. Fukunaga, T. & Kawarabayashi, K. (eds.). Springer-Verlag, p. 101-120 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  216. Published

    Perceptions of War: Afghanistan, Military, Influence’

    Jensen, R., 2014, Media Discourses about Crisis. Bucharest: University of Bucharest Publishing House, p. 189-211

    Research output: Chapter in Book/Report/Conference proceedingChapter

  217. Published

    Pioneering advanced mobile privacy and security

    Hulsebosch, R. J., Gunther, C., Horn, G., Holtmanns, S., Howker, K., Paterson, K. G., Claessens, J. & Schuba., M., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 383-432 50 p. (IEE Telecommunications Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  218. Published

    PKI Challenges: An industry analysis

    Price, G., 2005, Applied Public Key Infrastructure 4th International Workshop: IWAP 2005, Singapore. 21-23 Sept 2005. Zhou, J., Kang, M-C., Bao, F. & Pang, H-H. (eds.). IOS Press, (FAIA).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  219. Published

    Predicting the inversive generator

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2003, Cryptography and Coding. Proc. 9th IMA Intern. Conf on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer, p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  220. Published

    Privacy in identity and access management systems

    Pashalidis, A. & Mitchell, C. J., 2012, Digital Identity and Access Management: Technologies and Frameworks. Sharman, R., Smith, S. D. & Gupta, M. (eds.). IGI Global, p. 316-328

    Research output: Chapter in Book/Report/Conference proceedingChapter

  221. Published

    Privacy, compliance and the cloud

    Mitchell, C. J., 9 Mar 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, p. 3-14 12 p. (» Computer Communications and Networks).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  222. Published

    Privacy-aware location database service for granular queries

    Kiyomoto, S., Martin, K. M. & Fukushima, K., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 28-37 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  223. Published

    Proofs of security for ECIES

    Dent, A. W., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge: Cambridge University Press, p. 41-66 26 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  224. Published

    Proxy Signatures Secure Against Proxy Key Exposure

    Schdult, J. C. N., Matsuura, K. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer, Vol. 4939. p. 344-359 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  225. Published

    Public-key Cryptography on Smart Cards

    Fuchsberger, A., Gollmann, D., Lothian, P., Paterson, K. G. & Sidiropoulos, A., 1996, Cryptography: Policy and Algorithms, Proceedings. Springer, p. 250-269 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  226. Published

    Quality of Service (QoS) Provisioning in Cognitive Wireless Ad Hoc Networks: Architecture, Open Issues and Design Approaches

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Quality of Service Architectures for Wireless Networks: Performance Metrics and Management. IGI Global, p. 575-594 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  227. Published

    Quantum Cryptography: A Practical Information Security Perspective

    Paterson, K. G., Piper, F. C. & Schack, R., 2007, Quantum Communication and Security. Zukowski, M., Kilin, S. & Kowalik, J. (eds.). IOS Press, p. 175-180 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  228. Published

    Relations Among Notions of Plaintext Awareness

    Birkett, J. & Dent, A. W., 2008, Public Key Cryptography -- PKC 2008. Cramer, R. (ed.). Springer-Verlag, p. 47-64 18 p. (Lecture Notes in Computer Science; vol. 4939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  229. Published

    Remote Policy Enforcement for Trusted Application Execution in Mobile Environments

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2013, Trusted Systems: 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Bloem, R. & Lipp, P. (eds.). Cham: Springer International Publishing, p. 70-84 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  230. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R., 2016, (Accepted/In press) Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  231. Published

    Revisiting the Security Model for Timed-Release Encryption with Pre-open Capability

    Dent, A. W. & Tang, Q., 2007, Information Security -- ISC 2007. Garay, J. A., Lenstra, A. K., Mambo, M. & Peralta, R. (eds.). Springer-Verlag, p. 158-174 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  232. Published

    RSA-based undeniable signatures for general moduli

    Galbraith, S., Mao, W. & Paterson, K. G., 2002, Topics in Cryptology - CT-RSA 2002. Preneel, B. (ed.). Springer, p. 200-217 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  233. Published

    Run-Time Monitoring of Data-Handling Violations

    Happa, J., Moffat, N., Goldsmith, M. & Creese, S., 2018, Computer Security. Springer, p. 213-232 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  234. Published

    Secret Public Key Protocols Revisited

    Lim, H. W. & Paterson, K. G., 2009, Security Protocols. Christianson, B. (ed.). Springer, p. 237-256 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  235. Published

    Secret Sharing in Hierarchical Groups

    Charnes, C., Martin, K. M., Pieprzyk, J. & Safavi-Naini, R., 1997, Information and Communications Security. Springer, Vol. 1334. p. 81-86 6 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  236. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p. (Lecture Notes in Computer Science ; vol. 9100)(Security and Cryptology - sub series ).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  237. Published

    Secure Billing for Mobile Information Services in UMTS

    Martin, K. M., Preneel, B., Mitchell, C. J., Hitz, H. J., Horn, G., Poliakova, A. & Howard, P., 1998, Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services, (Proceedings of the Fifth International Conference, IS&N 98, Antwerp, Belgium, 25-28 May 1998) . Trigila, S., Mullery, A., Campolargo, M. & Mampaey, M. (eds.). Springer-Verlag, Vol. 1430. p. 535-548 14 p. (Lecture Notes in Computer Science; no. 1430).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  238. Published

    Secure Delivery of Conditional Access Applications to Mobile Receivers

    Gallery, E. & Tomlinson, A., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE

    Research output: Chapter in Book/Report/Conference proceedingChapter

  239. Published

    Secure Sharing of an ICT Infrastructure through Vinci

    Baiardi, F. & Sgandurra, D., 2008, Resilient Networks and Services: Second International Conference on Autonomous Infrastructure, Management and Security, AIMS 2008 Bremen, Germany, July 1-3, 2008 Proceedings. Hausheer, D. & Schönwälder, J. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 65-78 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  240. Published

    Securing Peer-to-Peer networks using Trusted Computing

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 271-298 28 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  241. Published

    Security

    Martin, K. M., 2003, E-Commerce Handbook. Thomson-Gee

    Research output: Chapter in Book/Report/Conference proceedingChapter

  242. Published

    Security and Anonymity of Identity-based Encryption with Multiple Trusted Authorities

    Paterson, K. G. & Srinivasan, S., 2008, Pairing 2008. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 354-375 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  243. Published

    Security Evaluation and Certification Process

    Sauveron, D., Dusart, P., Trotin, A., Markantonakis, K. & Mayes, K., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  244. Published

    Security for distributed systems: Foundations of access control

    Bertino, E. & Crampton, J., 2007, Information Assurance: Survivability and Security in Networked Systems. Qian, Y., Tipper, D., Krishnamurthy, P. & Joshi, J. (eds.). Morgan Kaufman, p. 39-80 42 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  245. Published

    Security For Video Broadcasting

    Tomlinson, A., 2008, Smart Cards, Tokens, Security and Applications. Springer, p. 139-154 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  246. Published

    Security in future mobile multimedia networks

    Mitchell, C. J. & Chen, LI., 1999, Insights into Mobile Multimedia Communications. Bull, D. R., Canagarajah, C. N. & Nix, A. R. (eds.). Academic Press, p. 177-190 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  247. Published

    Security in Swarm Robotics

    Laing, T., Martin, K., Ng, S. & Tomlinson, A., Dec 2015, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. Tan, Y. (ed.). IGI Global, p. 42-66 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  248. Published

    Security: a technical approach

    Piper, F. C. & Mitchell, C. J., 2000, E-commerce Handbook. Clapperton, G. (ed.). Gee Publishing, p. 9/11-9/20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  249. Published

    Semantic Attestation of Node Integrity in Overlays

    Baiardi, F. & Sgandurra, D., 2010, On the Move to Meaningful Internet Systems: OTM 2010: Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part I. Meersman, R., Dillon, T. & Herrero, P. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 656-671 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  250. Published

    Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory

    Paterson, K. G., 2002, Proceedings of Sequences and Their Applications - SETA01. Helleseth, T., Kumar, P. V. & Yang, K. (eds.). Springer, p. 46-71 26 p. (Discrete Mathematics and Theoretical Computer Science Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  251. Published

    Signcryption schemes based on the RSA problem

    Dent, A. W. & Malone-Lee, J., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 99-120

    Research output: Chapter in Book/Report/Conference proceedingChapter

  252. Published

    Single sign-on using TCG-conformant platforms

    Pashalidis, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 175-193 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  253. Published

    Size of broadcast in threshold schemes with disenrollment

    Martin, K. M., Barwick, S. G., Jackson, W-A. & Wild, P. R., 2002, Information Security and Privacy, 7th Australasian Conference, ACISP02. Springer, Vol. 2384. p. 71-88 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  254. Published

    Smart card Platform-Fingerprinting: Smart Card Technology International

    Mayes, K., Markantonakis, K. & Chen, C., Oct 2006, Smart Card Technology International: The Global Journal of Advanced Card Technology. Locke, M. (ed.). Smart Card Technology International, p. 78 82 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  255. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  256. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Piper, F. & Tunstall, M., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  257. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Mobile Robots: The Evolutionary Approach. Nadia, N., Leandro dos Santos, C. & Luiza de Macedo, M. (eds.). Vol. 50. p. 205 237 p. (Studies in Computational Intelligence; vol. 50).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  258. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 1 Jan 2011, Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  259. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  260. Published

    Smart Cards

    Tunstall, M., Markantonakis, K., Sauveron, D. & Mayes, K., 2009, Handbook of Technology Management. Bidgoli, H. (ed.). John Wiley & Sons

    Research output: Chapter in Book/Report/Conference proceedingChapter

  261. Published

    Smart Cards for Security and Assurance

    Markantonakis, K., Piper, F. & Mayes, K., 2007, Managing Information Assurance in Financial Services. Information Science Publishing

    Research output: Chapter in Book/Report/Conference proceedingChapter

  262. Published

    Smart Cards: Communication Protocols and Applications

    Markantonakis, K., Mayes, K., Tunstall, M. & Sauveron, D., 2007, Smart Cards: Communication Protocols and Applications.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  263. Published

    Social and Cultural Geographies of Air Transport

    Adey, P. & Lin, W., Jul 2014, The Geographies of Air Transport. Goetz, A. & Budd, L. (eds.). p. 61-72 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  264. Published

    Some Remarks on Authentication Systems

    Anthony, M. H. G., Martin, K. M., Seberry, J. & Wild, P. R., 1990, Advances in Cryptology -Auscrypt'90. Springer-Verlag, Vol. 453. p. 122-139 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  265. Published

    Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

    Rupp, A., Leander, G., Bangerter, E., Dent, A. W. & Sadeghi, A-R., 2008, Advances in Cryptology -- Asiacrypt 2008. Pieprzyk, J. (ed.). Springer-Verlag, p. 489-505 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  266. E-pub ahead of print

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 27 Apr 2019, (E-pub ahead of print) Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV. p. 108-128 21 p. (Lecture Notes in Computer Science; vol. XV).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  267. Published

    Ten years of information security Masters programmes: reflections and new challenges

    Martin, K. M., Ciechanowicz, C., Piper, F. C. & Robshaw, M. J. B., 2003, Security Education and Critical Infrastructures: Proceedings of WISE03. Kluwer, p. 215-230 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  268. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, D. K. (eds.). Springer, p. 369-381 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  269. Published

    The combinatorics of cryptographic key establishment

    Martin, K. M., 2007, Surveys in Combinatorics. Cambridge University Press, Vol. 346. p. 223-273 51 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  270. Published

    The Cramer-Shoup encryption scheme is plaintext aware in the standard model

    Dent, A. W., 2006, Advances in Cryptology -- Eurocrypt 2006. Vaudenay, S. (ed.). Springer-Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  271. Published

    The personal PKI

    Mitchell, C. J. & Schaffelhofer, R., 2004, Security for Mobility. Mitchell, C. J. (ed.). IEE Press, p. 35-61 27 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  272. Published

    The physically observable security of signature schemes

    Dent, A. W. & Malone-Lee, J., 2005, Cryptography and Coding: 10th IMA International Conference. Smart, N. P. (ed.). Springer-Verlag, p. 220-232 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  273. Published

    The Principal Principle and Probability in the Many-Worlds interpretation

    Schack, R., 2010, Many Worlds? Everett, Quantum Theory, and Reality. S., S., J., B., A., K. & D., W. (eds.). Oxford: Oxford University Press, p. 467-475

    Research output: Chapter in Book/Report/Conference proceedingChapter

  274. Published

    The TypTop System: Personalized Typo-Tolerant Password Checking

    Chatterjee, R., Woodage, J., Pnueli, Y., Chowdhury, A. & Ristenpart, T., 30 Oct 2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 329-346 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  275. Published

    Threshold MACs

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R., Wang, H. & Wild, P. R., 2003, Information Security and Cryptology - ICISC 2002. Springer, Vol. 2587. p. 237-252 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  276. Published

    Thwarting timing attacks using ATM networks

    Price, G., 2001, Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  277. Published

    Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

    de Amorim, R. C. & Komisarczuk, P., 2014, Case Studies in Secure Computing: Achievements and Trends. 1st ed. CRC Press, p. 295 1 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  278. Published

    Towards an Access-Control Framework for Countering Insider Threats

    Crampton, J. & Huth, M., 2010, Insider Threats in Cyber Security and Beyond. Bishop, M., Gollmann, D., Hunker, J. & Probst, C. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  279. Published

    Trialling Secure Billing with Trusted Third Party Support for UMTS Applications

    Horn, G., Howard, P., Martin, K. M., Mitchell, C. J., Preneel, B. & Rantos, K., 1998, Proceedings of 3rd ACTS Mobile Communications Summit, Rhodes, Greece, 9-11 June 1998. p. 574-579 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  280. Published

    Tripartite authenticated key agreement protocols from pairings

    Al-Riyami, S. S. & Paterson, K. G., 2003, Proc. IMA Conference on Cryptography and Coding. Paterson, K. G. (ed.). Springer, p. 332-359 28 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  281. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  282. Published

    Trusted Computing: Providing security for Peer-to-Peer Networks

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Proc. Fifth International Conference on Peer-to-Peer Computing. Caronni, G. (ed.). IEEE Computer Society Press, p. 117-124 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  283. Published

    Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure

    Martin, K. M. & Paterson, M. B., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 143-152 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  284. Published

    Universal Mobile Telecommunications System (UMTS); LTE; Performance evaluation of the Tuak algorithm set

    Mayes, K., Jan 2016, ETSI TR 135 935: Technical Report.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  285. Published

    Untrustworthy Participants in Secret Sharing Schemes

    Martin, K. M., 1993, Proceedings of the 3rd IMA Conference on Cryptography and Coding. p. 255-264 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  286. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  287. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D., 2015, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  288. Published

    Watching You Watching Me: The Art of Playing the Panopticon

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., 2014, Digital Enlightenment Yearbook 2014: Social Networks and Social Machines, Surveillance and Empowerment. O'Hara, K., Nguyen, C. & Haynes, P. (eds.). IOS Press, p. 147-162 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  289. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  290. Published

    What Can Identity-Based Cryptography Offer to Web Services?

    Crampton, J., Lim, H. W. & Paterson, K. G., 2007, Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA.. ACM Press, p. 26-36 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  291. Published

    What is trusted computing?

    Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  292. Internet publication › Research
  293. Published

    Business risks of software vulnerabilities: Four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses

    Kramer, H. & Walter, C., Mar 2015, Computer Weekly, p. 1-11 11 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  294. Published

    Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists

    Bell, S., Paterson, K. & Cavallaro, L., 5 Dec 2019, arXiv.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  295. Published

    CDT students take on the Cyber 9/12 Challenge in Geneva

    Haggman, A., 30 May 2017, RHUL Geopolitics and Security.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  296. Published

    Crypto Wars 2.0: RHUL Students head to the 3rd inter-CDT workshop in Oxford

    Haggman, A., 29 Jun 2017, RHUL Geopolitics and Security.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  297. Published

    MINIX 3: Status Report and Current Research

    Tanenbaum, A. S., Appuswamy, R., Bos, H. J., Cavallaro, L., Giuffrida, C., Hruby, T., Herder, J., van der Kouwe, E. & van Moolenbroek, D., Jun 2010, ;login: The USENIX Magazine, 35, 3.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  298. Published

    What Should You Pay to Protect Your Data? The Economics of Cyber Security

    Ertan, A., 9 Mar 2018, Cyber World , March 2018 edition, p. 50-55 6 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  299. Newspaper article › Research
  300. Published

    End-to-end Cryptographic Security Systems for Payments

    Cid, C., Jan 2011, E-finance & Payments Law & Policy newsletter, 5, 01.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  301. Published

    Overpromised or Underdelivered?: Evaluating the Performance of Australia's National Cyber Security Strategy

    Haggman, A., 9 Nov 2017, Asia Pacific Security Magazine, November/December 2017, p. 10 11 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  302. Published

    Why so serious? Introducing a fun take on cyber war

    Haggman, A., 5 May 2018, New Statesman, 2018, 4-10 May, p. 16-18 3 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  303. Special issue › Research › Peer-reviewed
  304. E-pub ahead of print

    Diary of a Plastic Soldier (extracts)

    Thornton, P., 10 Mar 2016, (E-pub ahead of print) In: Critical Military Studies. 2, 1-2, p. 137-138 2 p.

    Research output: Contribution to journalSpecial issuepeer-review

  305. E-pub ahead of print

    Effective maritime cybersecurity regulation – the case for a cyber code

    Hopcraft, R. & Martin, K., 11 Sep 2018, (E-pub ahead of print) In: Journal of the Indian Ocean Region. 14, 3, p. 354-366 13 p.

    Research output: Contribution to journalSpecial issuepeer-review

  306. Published

    Geographies of (con)text: language and structure in a digital age

    Thornton, P., 28 Nov 2017, In: Computational Culture: A Journal of Software Studies. Autumn 2017, Issue 6, p. 1-11 11 p.

    Research output: Contribution to journalSpecial issuepeer-review

  307. Published

    Holding on to dissensus: Participatory interactions in security design

    Heath, C., Hall, P. & Coles-Kemp, L., 2018, In: Strategic Design Research Journal. 11, 2, p. 65-78 14 p.

    Research output: Contribution to journalSpecial issuepeer-review

  308. Published

    Security and Resilience for Smart Devices and Applications

    Sauveron, D. (Guest ed.), Markantonakis, K. (Guest ed.), Mayes, K. (Guest ed.) & Verikoukis, C. (Guest ed.), 2011, In: EURASIP Journal on Wireless Communications and Networking. 2011

    Research output: Contribution to journalSpecial issuepeer-review

  309. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In: Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issuepeer-review

  310. Special issue › Research › Not peer-reviewed
  311. E-pub ahead of print

    Distributed denial of government: the Estonian Data Embassy Initiative

    Robinson, N. & Martin, K., 1 Dec 2017, (E-pub ahead of print) In: Network Security. 2017, 9, p. 13-16 4 p.

    Research output: Contribution to journalSpecial issue

  312. Editorial › Research › Peer-reviewed
  313. Published

    Developments in mobile communications security

    Tomlinson, A., 2008, In: Information Security Technical Report. 13, 3, p. 111 - 111

    Research output: Contribution to journalEditorialpeer-review

  314. Published

    Editorial

    Tomlinson, A., 2007, In: Information Security Technical Report. 12, 3, p. 111-112 2 p.

    Research output: Contribution to journalEditorialpeer-review

  315. Published

    Governing Emergencies: Beyond Exceptionality

    Adey, P., Anderson, B. & Graham, S., 1 Mar 2015, In: Theory, Culture and Society. 32, 2, p. 3-17 15 p.

    Research output: Contribution to journalEditorialpeer-review

  316. Editorial › Research › Not peer-reviewed
  317. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L., Mar 2018, In: Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  318. Book/Film/Article review › Research › Peer-reviewed
  319. E-pub ahead of print

    Digital welfare: designing for more nuanced forms of access

    Coles-Kemp, L., Ashenden, D., Morris, A. & Yuille, J., 7 May 2020, (E-pub ahead of print) In: Policy Design and Practice. p. 1-12 12 p.

    Research output: Contribution to journalBook/Film/Article reviewpeer-review

  320. Comment/debate › Research › Peer-reviewed
  321. Published

    Comment: Horng's identification scheme based on Shamir's 'RSA for paranoids'

    Mitchell, C. J. & Ng, S-L., 2000, In: Electronics Letters. 36, 5, p. 422-422 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  322. Published

    Comment: Signature scheme based on discrete logarithm without using one-way hash-function.

    Yeun, C. Y., Mitchell, C. J. & Ng, S-L., 1998, In: Electronics Letters. 34, 24, p. 2329-2330 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  323. Published

    Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al.

    Chen, L. & Ng, S-L., 2010, In: IEEE Transaction on Vehicular Technology. 59, 3, p. 1503-1505 3 p.

    Research output: Contribution to journalComment/debatepeer-review

  324. Published

    Comments on ``Dynamic Participation in a Secure Conference Scheme for Mobile Communications''.

    Ng, S-L., 2001, In: IEEE Transaction on Vehicular Technology. 50, 1, p. 334-335

    Research output: Contribution to journalComment/debatepeer-review

  325. Published

    Comments on mutual authentication and key exchange protocols for low power wireless communications

    Ng, S-L. & Mitchell, C. J., 2004, In: IEEE Communications Letters. 8, 4, p. 262-263 2 p.

    Research output: Contribution to journalComment/debatepeer-review

  326. Published

    Technical Perspective: On heartbleed: A Hard Beginnyng Makth a Good Endyng

    Paterson, K., 21 Feb 2018, In: Communications of the ACM. 61, 3, p. 108-108 1 p.

    Research output: Contribution to journalComment/debatepeer-review

  327. Comment/debate › Research › Not peer-reviewed
  328. Published

    Comments on "On the Security of Three-Party Cryptographic Protocols" by Xu, Zhang and Zhu.

    Ng, S-L., 1999, In: Operating Systems Review. 33, 3, p. 5-6

    Research output: Contribution to journalComment/debate

  329. Article › Research › Peer-reviewed
  330. Published

    (De-)Constructing Attacker Categorisations: A Typology Iteration for the Case of Digital Banking

    Moeckel, C., 28 Jul 2020, In: Journal of Universal Computer Science. 26, 7, p. 783-804 22 p.

    Research output: Contribution to journalArticlepeer-review

  331. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    RUSH, M. & Ibrahim, S., 1 Mar 2018, In: Sociological Research Online. 23, 1, p. 177-196 20 p.

    Research output: Contribution to journalArticlepeer-review

  332. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  333. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  334. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticlepeer-review

  335. Published

    A class number relation in Frobenius extensions of number fields

    Walter, C. D., 1977, In: Mathematika. 24, p. 216-225 10 p.

    Research output: Contribution to journalArticlepeer-review

  336. Published

    A classification of time element speech scramblers

    Mitchell, C. J. & Piper, F. C., Nov 1985, In: Journal of the Institution of Electronic and Radio Engineers. 55, 11/12, p. 391-396 6 p.

    Research output: Contribution to journalArticlepeer-review

  337. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticlepeer-review

  338. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticlepeer-review

  339. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In: Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticlepeer-review

  340. Published

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P., 2018, In: GeoHumanities. 4, 2, p. 417-437 21 p.

    Research output: Contribution to journalArticlepeer-review

  341. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In: Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticlepeer-review

  342. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In: Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticlepeer-review

  343. Published

    A fair certification protocol

    Mitchell, C. J. & Rantos, K., 1999, In: Computer Communication Review. 29, 3, p. 47-49 3 p.

    Research output: Contribution to journalArticlepeer-review

  344. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In: International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticlepeer-review

  345. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In: Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticlepeer-review

  346. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticlepeer-review

  347. Published

    A Future Health Information Provider Architecture

    Komisarczuk, P., 2006, In: HIC 2006 and HINZ 2006: Proceedings. p. 471 1 p.

    Research output: Contribution to journalArticlepeer-review

  348. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  349. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In: Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticlepeer-review

  350. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

  351. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In: Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticlepeer-review

  352. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In: Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticlepeer-review

  353. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In: The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticlepeer-review

  354. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In: BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticlepeer-review

  355. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In: IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticlepeer-review

  356. Published

    A Mutual Authentication Enabled Fair-Exchange and Anonymous E-Payment Protocol

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, In: E-Commerce Technology, IEEE International Conference on, and Enterprise Computing, E-Commerce, and E-Services, IEEE International Conference on. 0, p. 20 1 p.

    Research output: Contribution to journalArticlepeer-review

  357. E-pub ahead of print

    A new description of orthogonal bases

    Coecke, B., Vicary, J. & Pavlovic, D., 9 Nov 2012, (E-pub ahead of print) In: Mathematical Structures in Computer Science.

    Research output: Contribution to journalArticlepeer-review

  358. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In: European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticlepeer-review

  359. Published

    A note on an upper bound of traceability codes

    Owen, S. & Ng, S-L., 2 Apr 2015, In: Australasian Journal of Combinatorics. 62, 1, p. 140-146 7 p.

    Research output: Contribution to journalArticlepeer-review

  360. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In: Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticlepeer-review

  361. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticlepeer-review

  362. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In: Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticlepeer-review

  363. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In: Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticlepeer-review

  364. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K., Mar 2013, In: International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticlepeer-review

  365. Published

    A pragmatic alternative to undetectable signatures

    Borselius, N., Mitchell, C. J. & Wilson, A., Apr 2002, In: Operating Systems Review. 36, 2, p. 6-11 6 p.

    Research output: Contribution to journalArticlepeer-review

  366. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H., 2006, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticlepeer-review

  367. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  368. Published

    A remark on hash functions for message authentication

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1989, In: Computers and Security. 8, 1, p. 55-58 4 p.

    Research output: Contribution to journalArticlepeer-review

  369. Published

    A Re-painted Amazon

    Earl, G., Beale, G., Happa, J., Williams, M., Turley, G., Martinez, K. & Chalmers, A., 2009, In: Proceedings of EVA: Electronic Information and the Visual Arts.

    Research output: Contribution to journalArticlepeer-review

  370. Published

    A representation of a family of secret sharing matroids.

    Ng, S-L., 2003, In: Designs, Codes and Cryptography. 30, p. 5-19 15 p.

    Research output: Contribution to journalArticlepeer-review

  371. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In: IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticlepeer-review

  372. Published

    A secure messaging architecture implementing the X.400-1988 security features

    Mitchell, C. J., Rush, P. D. C. & Walker, M., 1990, In: The Computer Journal. 33, p. 290-295 6 p.

    Research output: Contribution to journalArticlepeer-review

  373. Published

    A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 19 Sep 2017, In: IACR Transactions on Symmetric Cryptology. 2017, 3, p. 73-107 35 p.

    Research output: Contribution to journalArticlepeer-review

  374. Published

    A security scheme for resource sharing over a network

    Burns, J. & Mitchell, C. J., Feb 1990, In: Computers and Security. 9, 1, p. 67-75 9 p.

    Research output: Contribution to journalArticlepeer-review

  375. Published

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., Jan 2020, In: IEEE Transactions on Industrial Informatics. 16, 1, p. 691-702 12 p.

    Research output: Contribution to journalArticlepeer-review

  376. Published

    A simple necessary decoherence condition for a set of histories

    Scherer, A., Soklakov, A. N. & Schack, R., 2004, In: Physics Letters A. 326, p. 307 1 p.

    Research output: Contribution to journalArticlepeer-review

  377. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In: Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticlepeer-review

  378. Published

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D., 1 Mar 2018, In: Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticlepeer-review

  379. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In: International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticlepeer-review

  380. Published

    A Survey of Subscription Privacy on the 5G Radio Interface - The Past, Present and Future

    Khan, H. & Martin, K. M., Aug 2020, In: Journal of Information Security and Applications. 53, p. 1-17 17 p., 102537.

    Research output: Contribution to journalArticlepeer-review

  381. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In: ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticlepeer-review

  382. Published

    A Survey on Security for Mobile Devices

    Polla, M. L., Martinelli, F. & Sgandurra, D., 2013, In: IEEE Communications Surveys and Tutorials. 15, 1, p. 446-471 26 p.

    Research output: Contribution to journalArticlepeer-review

  383. Published

    A Verification of Brickell's Fast Modular Multiplication Algorithm

    Walter, C. D. & Eldridge, S. E., 1990, In: Internat. J. of Computer Maths. 33, p. 153-169 17 p.

    Research output: Contribution to journalArticlepeer-review

  384. Published

    A Weak Cipher that Generates the Symmetric Group

    Murphy, S., Paterson, K. G. & Wild, P. R., 1994, In: Journal of Cryptology. 7, p. 61-65 5 p.

    Research output: Contribution to journalArticlepeer-review

  385. Published

    A WEB-BASED BOARD GAME FOR TEACHING ASPECTS OF INTERNET ENGINEERING

    Komisarczuk, P. & Welch, I., 2007, In: Advanced Technology for Learning. 4, 4, p. 194-199 6 p.

    Research output: Contribution to journalArticlepeer-review

  386. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In: South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticlepeer-review

  387. Published

    Active Agency, Access and Power

    Salojarvi, V. & Jensen, R. B., 1 Sep 2021, In: Media, War & Conflict. 14, 3, p. 263-267 5 p.

    Research output: Contribution to journalArticlepeer-review

  388. Published

    Adjacency Matrices

    Walter, C. D., 1986, In: SIAM Journal on Algebraic and Discrete Methods. 7, p. 18-29 12 p.

    Research output: Contribution to journalArticlepeer-review

  389. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In: ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticlepeer-review

  390. Published

    Air/Atmospheres of the Megacity

    Adey, P., Dec 2013, In: Theory, Culture and Society. 30, 7-8, p. 291-308 18 p.

    Research output: Contribution to journalArticlepeer-review

  391. Published

    Air’s affinities: Geopolitics, chemical affect and the force of the elemental

    Adey, P., 1 Mar 2015, In: Dialogues in Human Geography. 5, 1, p. 54-75 22 p.

    Research output: Contribution to journalArticlepeer-review

  392. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  393. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In: Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticlepeer-review

  394. Published

    Algorithms for software implementations of RSA

    Selby, A. & Mitchell, C. J., May 1989, In: IEE Proceedings Part E (Computers and Digital Techniques). 136, 3, p. 166-170 5 p.

    Research output: Contribution to journalArticlepeer-review

  395. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  396. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In: Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticlepeer-review

  397. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In: International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticlepeer-review

  398. Published

    An Algorithm for Efficient Geometric Secret Sharing

    Martin, K. M. & Jackson, W-A., 1998, In: Utilitas Mathematica. 54, p. 127-150 24 p.

    Research output: Contribution to journalArticlepeer-review

  399. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  400. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  401. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H., 2018, In: International Journal of Sensor Networks. 26, 1, p. 54-68 15 p.

    Research output: Contribution to journalArticlepeer-review

  402. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  403. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Sgandurra, D. & Wang, R., 1 May 2018, (E-pub ahead of print) In: International Journal of Grid and Utility Computing. 9, 2, p. 170-178 9 p.

    Research output: Contribution to journalArticlepeer-review

  404. Published

    An infinite family of symmetric designs

    Mitchell, C. J., 1979, In: Discrete Mathematics. 26, p. 247-250 4 p.

    Research output: Contribution to journalArticlepeer-review

  405. Published

    An overview of the GlobalPlatform smart card specification

    Markantonakis, K. & Mayes, K., 2003, In: Information Security Technical Report. 8, 1, p. 17 - 29

    Research output: Contribution to journalArticlepeer-review

  406. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  407. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  408. Published

    Analysing and exploiting the Mantin biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T., Apr 2018, In: Designs, Codes and Cryptography. 86, 4, p. 743–770 28 p.

    Research output: Contribution to journalArticlepeer-review

  409. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In: Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticlepeer-review

  410. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In: Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticlepeer-review

  411. Published

    Analysis of Delays in Converting from a Redundant Representation

    Walter, C. D., 1 Jul 1997, In: IEE Proc. Computers and Digital Techniques. 144, 4, p. 219-221 3 p.

    Research output: Contribution to journalArticlepeer-review

  412. E-pub ahead of print

    Anomaly Detection using Pattern-of-Life Visual Metaphors

    Happa, J., Bashford-Rogers, T., Agrafiotis, I., Goldsmith, M. & Creese, S., 21 Oct 2019, (E-pub ahead of print) In: IEEE Access. 7, p. 154018-154034 17 p.

    Research output: Contribution to journalArticlepeer-review

  413. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L., 16 Aug 2018, In: IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticlepeer-review

  414. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  415. Published

    AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

    Di Pietro, R., Lombardi, F., Martinelli, F. & Sgandurra, D., 2015, In: Future Generation Computer Systems. 48, p. 28-38 11 p.

    Research output: Contribution to journalArticlepeer-review

  416. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In: IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticlepeer-review

  417. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In: Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

  418. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In: Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticlepeer-review

  419. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In: International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticlepeer-review

  420. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In: Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticlepeer-review

  421. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In: Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticlepeer-review

  422. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In: Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticlepeer-review

  423. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In: International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticlepeer-review

  424. Published

    Assessing a Decision Support Tool for SOC Analysts

    Happa, J., Agrafiotis, I., Helmhout, M., Bashford-Rogers, T., Goldsmith, M. & Creese, S., 8 Jun 2021, In: Digital Threats: Research and Practice. 2, 3

    Research output: Contribution to journalArticlepeer-review

  425. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In: Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticlepeer-review

  426. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In: IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticlepeer-review

  427. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In: Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticlepeer-review

  428. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In: Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticlepeer-review

  429. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In: Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticlepeer-review

  430. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In: IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticlepeer-review

  431. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In: IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticlepeer-review

  432. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In: Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticlepeer-review

  433. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In: Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticlepeer-review

  434. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In: Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticlepeer-review

  435. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In: Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticlepeer-review

  436. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  437. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In: International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticlepeer-review

  438. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In: Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticlepeer-review

  439. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In: Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticlepeer-review

  440. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In: IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  441. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticlepeer-review

  442. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In: Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticlepeer-review

  443. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In: Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticlepeer-review

  444. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In: Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticlepeer-review

  445. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticlepeer-review

  446. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In: Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticlepeer-review

  447. Published

    Blurred lines: intimacy, mobility, and the social military

    Adey, P., Denney, D., Jensen, R. & Pinkerton, A., 2016, In: Critical Military Studies. 2, 1-2, p. 7-24 18 p.

    Research output: Contribution to journalArticlepeer-review

  448. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In: Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticlepeer-review

  449. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In: The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticlepeer-review

  450. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In: IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticlepeer-review

  451. Published

    Brauer's class number relation

    Walter, C. D., 1979, In: Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticlepeer-review

  452. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In: International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticlepeer-review

  453. Published

    Broadcast-Enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D., Sep 2014, In: ACM Transactions on Sensor Networks. 11, 1, p. 1-33 33 p., 6.

    Research output: Contribution to journalArticlepeer-review

  454. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P., Nov 2018, In: Schizophrenia bulletin. 44, 6, p. 1362–1372 11 p.

    Research output: Contribution to journalArticlepeer-review

  455. Published

    Capture--A behavioral analysis tool for applications and documents

    Seifert, C., Steenson, R., Welch, I., Komisarczuk, P. & Endicott-Popovsky, B., 2007, In: digital investigation. 4, p. 23-30 8 p.

    Research output: Contribution to journalArticlepeer-review

  456. Published

    Capturing Tacit Knowledge in Security Operation Centres

    Cho, S., Happa, J. & Creese, S., 24 Feb 2020, In: IEEE Access. 8, p. 42021 - 42041 21 p.

    Research output: Contribution to journalArticlepeer-review

  457. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In: IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticlepeer-review

  458. Published

    Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., Apr 2018, In: IEEE Transactions on Information Forensics and Security . 13, 4, p. 1031-1041 11 p.

    Research output: Contribution to journalArticlepeer-review

  459. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In: Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticlepeer-review

  460. Published

    Challenges for Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, In: IEEE Security and Privacy Magazine. Nov./Dec., p. 60-66 7 p.

    Research output: Contribution to journalArticlepeer-review

  461. Published

    Challenges in standardising cryptography

    Mitchell, C. J., 1 Jul 2016, In: International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticlepeer-review

  462. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In: Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticlepeer-review

  463. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticlepeer-review

  464. Published

    Character sums and nonlinear recurrence sequences

    Blackburn, S. R. & Shparlinski, I. E., 2006, In: Discrete Mathematics. 306, p. 1132-1138 7 p.

    Research output: Contribution to journalArticlepeer-review

  465. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In: Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticlepeer-review

  466. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In: Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticlepeer-review

  467. Published

    Classical predictability and coarse-grained evolution of the quantum baker's map

    Scherer, A., Soklakov, A. N. & Schack, R., 2006, In: Physical Review D . 73, p. 125009 1 p.

    Research output: Contribution to journalArticlepeer-review

  468. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Deo, A. & Paterson, K., 14 Aug 2018, In: IACR Transactions on Cryptographic Hardware and Embedded Systems. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticlepeer-review

  469. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticlepeer-review

  470. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In: Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticlepeer-review

  471. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In: Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticlepeer-review

  472. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In: Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticlepeer-review

  473. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In: Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticlepeer-review

  474. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticlepeer-review

  475. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In: Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticlepeer-review

  476. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In: Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticlepeer-review

  477. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In: Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticlepeer-review

  478. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In: Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticlepeer-review

  479. Published

    Commoning mobility: Towards a new politics of mobility transitions

    Nikolaeva, A., Adey, P., Cresswell, T., Jeonjae Lee, J., Novoa, A. & Temenos, C., Jun 2019, In: Transactions of the Institute of British Geographers. 44, 2, p. 346-360 15 p.

    Research output: Contribution to journalArticlepeer-review

  480. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In: EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticlepeer-review

  481. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In: IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticlepeer-review

  482. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticlepeer-review

  483. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In: Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticlepeer-review

  484. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In: Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticlepeer-review

  485. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 105–123 19 p.

    Research output: Contribution to journalArticlepeer-review

  486. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  487. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In: J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticlepeer-review

  488. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In: Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticlepeer-review

  489. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In: Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticlepeer-review

  490. E-pub ahead of print

    Criminal use of cryptocurrencies: a great new threat or is cash still king?

    Butler, S., 20 Nov 2019, (E-pub ahead of print) In: Journal of Cyber Policy. p. 1-20 20 p.

    Research output: Contribution to journalArticlepeer-review

  491. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 21-46 26 p.

    Research output: Contribution to journalArticlepeer-review

  492. Published

    Criteria to evaluate Automated Personal Identification Mechanisms

    Palmer, A., 1 Dec 2008, In: Computers and Security. 27, 7-8, p. 260-284 25 p., Palmer:2008:CEA2639520.2639609.

    Research output: Contribution to journalArticlepeer-review

  493. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In: Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticlepeer-review

  494. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  495. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In: IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticlepeer-review

  496. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In: Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticlepeer-review

  497. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In: Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticlepeer-review

  498. Published

    Cryptanalysis of a hybrid authentication protocol for large mobile networks

    Tang, Q. & Mitchell, C. J., Apr 2006, In: Journal of Systems and Software. 79, 4, p. 496-501 6 p.

    Research output: Contribution to journalArticlepeer-review

  499. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In: Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticlepeer-review

  500. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In: IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticlepeer-review

  501. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In: IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticlepeer-review

  502. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In: Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticlepeer-review

  503. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In: Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticlepeer-review

  504. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In: IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticlepeer-review

  505. Published

    Cryptographic enforcement of information flow policies without public information via tree partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 24 Aug 2017, In: Journal of Computer Security. 25, 6, p. 511-535 25 p.

    Research output: Contribution to journalArticlepeer-review

  506. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In: Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticlepeer-review

  507. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In: Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticlepeer-review

  508. Published

    Cultural Heritage Predictive Rendering

    Happa, J., Bashford-Rogers, T., Wilkie, A., Artusi, A., Debattista, K. & Chalmers, A., 2012, In: Computer Graphics Forum.

    Research output: Contribution to journalArticlepeer-review

  509. Published

    Cyber Security Threats and Challenges in Collaborative Mixed-Reality

    Happa, J., Glencross, M. & Steed, A., 9 Apr 2019, In: Frontiers in ICT. 6, p. 1-20 20 p., 5.

    Research output: Contribution to journalArticlepeer-review

  510. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In: SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticlepeer-review

  511. Published

    Deception in Network Defences using Unpredictability

    Happa, J., Bashford-Rogers, T., Janse van Rensburg, A., Goldsmith, M. & Creese, S., 2021, In: Digital Threats: Research and Practice.

    Research output: Contribution to journalArticlepeer-review

  512. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In: Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticlepeer-review

  513. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In: Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticlepeer-review