1. 2020
  2. E-pub ahead of print
  3. Published

    Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements

    Gómez-Cabrera, A., Escamilla-Ambrosio, P. J., Rodríguez-Mota, A. & Happa, J., 12 Oct 2020, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  4. Published

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., Oct 2020, p. 471-480. 10 p.

    Research output: Contribution to conferencePaper

  5. Forthcoming

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 30 Sep 2020, (Accepted/In press).

    Research output: Contribution to conferencePaper

  6. Published

    An insecure noninteractive group key establishment scheme

    Mitchell, C. J., 19 Sep 2020, arXiv.

    Research output: Working paper

  7. E-pub ahead of print

    Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Sep 2020, p. 3-16. 14 p.

    Research output: Contribution to conferencePaper

  8. E-pub ahead of print

    Evaluating the Effectiveness of Heuristic Worst-Case Noise Analysis in FHE

    Costache, A., Laine, K. & Player, R., 13 Sep 2020, Computer Security – ESORICS 2020: 25th European Symposium on Research in Computer Security, ESORICS 2020, Guildford, UK, September 14–18, 2020, Proceedings, Part II. Springer, p. 546-565 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor

    Mayes, K., 10 Sep 2020, p. 1-8. 8 p.

    Research output: Contribution to conferencePaper

  11. E-pub ahead of print

    Anonymity and Rewards in Peer Rating Systems

    Garms, L., Ng, S-L., Quaglia, E. & Traverso, G., 7 Sep 2020, Security and Cryptography for Networks: 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 277-297 21 p. (Lecture Notes in Computer Science; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...206 Next