1. 2006
  2. Published

    A service discovery threat model for ad hoc networks

    Leung, A. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 167-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Access control and authorization constraints for WS-BPEL

    Bertino, E., Crampton, J. & Paci, F., 2006, Proceedings of IEEE International Conference on Web Services. IEEE Computer Society Press, p. 275-284 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M., 2006, Springer.

    Research output: Book/ReportBook

  5. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In : IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticle

  6. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In : Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticle

  7. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In : IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticle

  8. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticle

  9. Published

    Building better signcryption schemes with Tag-KEMs

    Bjørstad, T. E. & Dent, A. W., 2006, Public Key Cryptography -- PKC 2006. Yung, M., Dodis, Y., Kiayias, A. & Malkin, T. (eds.). Springer-Verlag, p. 491-507 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Character sums and nonlinear recurrence sequences

    Blackburn, S. R. & Shparlinski, I. E., 2006, In : Discrete Mathematics. 306, p. 1132-1138 7 p.

    Research output: Contribution to journalArticle

  11. Published

    Classical predictability and coarse-grained evolution of the quantum baker's map

    Scherer, A., Soklakov, A. N. & Schack, R., 2006, In : Physical Review D . 73, p. 125009 1 p.

    Research output: Contribution to journalArticle

  12. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In : IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticle

  13. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In : IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticle

  14. Published

    Cryptography in theory and practice: The case of encryption in IPsec

    Paterson, K. G. & Yau, A. K. L., 2006, Eurocrypt 2006. Vaudenay, S. (ed.). Springer, p. 12-29 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2006, Proceedings of 11th European Symposium on Research in Computer Security. Springer, p. 174-191 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Design, Installation and Execution of a Security Agent for Mobile Stations.

    Sirett, W. G., MacDonald, J. A., Mayes, K. & Markantonakis, K., 2006, CARDIS. Domingo-Ferrer, J., Posegga, J. & Schreckling, D. (eds.). Springer, Vol. 3928. p. 1-15 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Discretionary and Mandatory Control for Role-Based Administration

    Crampton, J., 2006, Data Applications and Security XX. Damiani, E. & Liu, P. (eds.). Springer, p. 194-208 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Distributed Certificate Authority in cluster-based ad hoc networks

    Martin, K. M. & Chaddoud, G., 2006, Proceedings of 3rd International Conference on Mobile Computing and Ubiquitous Networking. p. 278-283

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Diversified Process Replicæ for Defeating Memory Error Exploits

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006.

    Research output: Working paper

  20. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In : secure Magazine. 1, 9

    Research output: Contribution to journalArticle

  21. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N., 2006, ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticle

  23. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H., 2006, Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Fundamental problems in provable security and cryptography

    Dent, A. W., 2006, In : Phil Trans R Soc A. 364, 1849, p. 3215-3230 16 p.

    Research output: Contribution to journalArticle

  25. Published

    Hidden pairings and trapdoor DDH groups

    Dent, A. W. & Galbraith, S. D., 2006, Algorithmic Number Theory: 7th International Symposium (ANTS VII). Hess, F., Pauli, S. & Pohst, M. (eds.). Springer-Verlag, p. 436-451 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Hypersensitivity and chaos signatures in the quantum baker's maps

    Scott, A. J., Brun, T. A., Caves, C. M. & Schack, R., 2006, In : Journal of Physics A: Mathematical and General. 39, p. 13405 1 p.

    Research output: Contribution to journalArticle

  27. Published

    Ideal secret sharing schemes with multipartite access structures.

    Ng, S-L., 2006, In : IEE Proceedings on Communications. 153, 2, p. 165-168 4 p.

    Research output: Contribution to journalArticle

  28. Published

    Identity-based encryption gone wild

    Abdalla, M., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G. & Smart, N. P., 2006, Automata, Languages and Programming (2) -- ICALP 2006. Bugliesi, M., Preneel, B., Sassone, V. & Wegener, I. (eds.). Springer-Verlag, p. 300-311 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    Information Security

    Crampton, J., Paterson, K. G., Piper, F. & Robshaw, M. J. B., 2006, Handbook of Security. Gill, M. (ed.). Palgrave Macmillan, p. 358-379 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    Inhibiting Card Sharing Attacks

    Tunstall, M., Markantonakis, K. & Mayes, K., 2006, Advances in Information and Computer Security. Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y. & Kawamura, S. (eds.). Springer Berlin / Heidelberg, Vol. 4266. p. 239-251 13 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Limits to anonymity when using credentials

    Pashalidis, A. & Mitchell, C. J., 2006, Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004, Revised Selected Papers. Springer-Verlag, Vol. 3957. p. 4-12 9 p. (Lecture Notes in Computer Science; vol. 3957).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Lost in translation: theory and practice in cryptography

    Paterson, K. G. & Yau, A. K. L., 2006, In : IEEE Security and Privacy Magazine. 4, 3, p. 69-72 4 p.

    Research output: Contribution to journalArticle

  33. Published

    Mobile security and trusted computing

    Mitchell, C. J., 2006, In : Information Technology. 48, p. 321-326

    Research output: Contribution to journalArticle

  34. Published

    Modelling e-business security using business processes

    Nachtigal, S. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 459-464 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Near and yet So Far: Distance-Bounding Attacks in Wireless Networks

    Clulow, J., Hancke, G., Kuhn, M. G. & Moore, T., 2006, European Workshop on Security and Privacy in Ad-Hoc and Sensor Networks (ESAS). Springer-Verlag, Vol. 4357. p. 83-97

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    On Key Assignment for Hierarchical Access Control

    Crampton, J., Martin, K. M. & Wild, P., 2006, Proceedings of 19th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, p. 98-111 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    On the potential of high density smart cards

    Mayes, K. E. & Markantonakis, K., 2006, In : Information Security Technical Report. 11, 3, p. 147 - 153

    Research output: Contribution to journalArticle

  38. Published

    Optimal updating of ideal threshold schemes

    Martin, K. M., Barwick, S. G., Jackson, W-A. & O'Keefe, C. M., 2006, In : Australasian Journal of Combinatorics. 36, p. 123-132 10 p.

    Research output: Contribution to journalArticle

  39. Published

    Orbit-homogeneity in permutation groups

    Cameron, P. J. & Dent, A. W., 2006, In : Bulletin of the London Mathematical Society. 38, 4, p. 587-596 10 p.

    Research output: Contribution to journalArticle

  40. Published

    Practical attacks on proximity identification systems

    Hancke, G., 2006, IEEE Symposium on Security and Privacy . p. 328-333

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Preventing phishing attacks using trusted computing technology

    Alsaid, A. & Mitchell, C. J., 2006, Proceedings of INC 2006, Sixth International Network Conference, Plymouth, UK, July 2006. p. 221-228

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Public Key Infrastructures: A Research Agenda

    Price, G., 2006, In : Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticle

  43. Published

    Recent developments in cryptographic hash functions: Security implications and future directions

    Cid, C., 2006, In : Information Security Technical Report. 11, 2, p. 100 - 107 8 p.

    Research output: Contribution to journalArticle

  44. Published

    Reconstructing noisy polynomial evaluation in residue rings

    Blackburn, S. R., Gomez-Perez, D., Gutierrez, J. & Shparlinski, I. E., 2006, In : J. Algorithms. 61, p. 47-59 13 p.

    Research output: Contribution to journalArticle

  45. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Security Evaluation and Certification Process

    Sauveron, D., Dusart, P., Trotin, A., Markantonakis, K. & Mayes, K., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    Sets of permutations that generate the symmetric group pairwise

    Blackburn, S. R., 2006, In : Journal of Combinatorial Theory, Series A. 113, p. 1572-1581 10 p.

    Research output: Contribution to journalArticle

  48. Published

    Simulation on a quantum computer

    Schack, R., 2006, In : Informatik Forsch. Entw.. 21, p. 21 1 p.

    Research output: Contribution to journalArticle

  49. Published

    Smart card Security

    Markantonakis, K., Mayes, K., Piper, F. & Tunstall, M., 2006, Computational Intelligence in Information Assurance and Security. Nedjah, N., Abraham, A. & Luiza de Macedo, M. (eds.). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  51. Published

    Taxonomy of honeypots

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, Citeseer.

    Research output: Book/ReportOther report

  52. Published

    The Cramer-Shoup encryption scheme is plaintext aware in the standard model

    Dent, A. W., 2006, Advances in Cryptology -- Eurocrypt 2006. Vaudenay, S. (ed.). Springer-Verlag, p. 289-307 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  53. Published

    The hardness of the DHK problem in the generic group model

    Dent, A. W., 2006, In : Cryptology ePrint Archive: Report. 2006/156

    Research output: Contribution to journalArticle

  54. Published

    The interpretation and utility of three cohesion metrics for object-oriented design

    Counsell, S., Swift, S. & Crampton, J., 2006, In : ACM Transactions on Software Engineering and Methodology. 15, 2, p. 123-149 27 p.

    Research output: Contribution to journalArticle

  55. Published

    The secondary and approximate authorization model and its application to Bell-LaPadula policies

    Crampton, J., Leung, W. & Beznosov, K., 2006, Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 111-120 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Two Dimensional Runlength Constrained Arrays with Equal Horizontal and Vertical Constraints

    Blackburn, S. R., 2006, In : IEEE Transactions on Information Theory. 52, p. 3305-3309 5 p.

    Research output: Contribution to journalArticle

  58. 2005
  59. Published

    An Analysis of the XSL Algorithm

    Cid, C. & Gaetan, L., Dec 2005, Advances in Cryptology - ASIACRYPT 2005. Springer, Vol. 3788. p. 333-352 20 p. (Lecture Notes in Computer Science - LNCS; vol. 3788).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A user-centric m-payment solution

    Zhang, Q., Mayes, K. & Markantonakis, K., 1 Nov 2005, Mobile Technology, Applications and Systems, 2005 2nd International Conference on. p. 8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Protection of Downloadable Software on SDR Devices

    Gallery, E. & Tomlinson, A., 1 Nov 2005.

    Research output: Contribution to conferencePaper

  62. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In : Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticle

  63. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In : IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticle

  64. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  65. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  66. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  67. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  68. Published

    Conditional Access in Mobile Systems: Securing the Application

    Gallery, E. & Tomlinson, A., 1 Feb 2005, p. 190-197. 8 p.

    Research output: Contribution to conferencePaper

  69. Published

    Controlling Transmission of Broadcast Content

    Dent, A. W. & Tomlinson, A., 1 Feb 2005

    Research output: Patent

  70. Published

    Partial key recovery attack against RMAC

    Knudsen, L. R. & Mitchell, C. J., Feb 2005, In : Journal of Cryptology. 18, 4, p. 375-389 15 p.

    Research output: Contribution to journalArticle

  71. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In : Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticle

  73. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A User-Centric Solution To Realise M-Payment

    Zhang, Q. & Mayes, K., 2005, A User-Centric Solution To Realise M-Payment. Belgium

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    An Algebraic Framework for Cipher Embeddings

    Cid, C., Murphy, S. & Robshaw, M. J. B., 2005, Proceedings of Cryptography and Coding, 10th IMA International Conference, 2005. Smart, N. (ed.). Springer, Vol. 3796. p. 278-289 12 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    An RFID distance bounding protocol

    Hancke, G. & Kuhn, M. G., 2005, Conference on Security and Privacy for Emerging Areas in Communication Networks (Securecomm). p. 67-73

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Analysis of the Bit-Search Generator and sequence compression techniques

    Gouget, A., Sibert, H., Berbain, C., Courtois, N., Debraize, B. & Mitchell, C. J., 2005, Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. Gilbert, H. & Handschuh, H. (eds.). Springer-Verlag, Vol. 3557. p. 196-214 19 p. (Lecture Notes in Computer Science; vol. 3557).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  81. Published

    CBE from CL-PKE: a generic construction and efficient schemes

    Al-Riyami, S. S. & Paterson, K. G., 2005, PKC 2005. Vaudenay, S. (ed.). Springer, p. 398-415 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In : Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticle

  84. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaper

  85. Published

    Cryptanalysis of two variants of PCBC mode when used for message integrity

    Mitchell, C. J., 2005, Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings. Boyd, C. & Gonzalez-Nieto, J. (eds.). Springer-Verlag, Vol. 3574. p. 560-571 12 p. (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Cryptography from Pairings

    Paterson, K. G., 2005, Advances in Elliptic Curve Cryptography. Blake, I. F., Seroussi, G. & Smart, N. P. (eds.). Cambridge University Press, p. 215-251 37 p. (London Mathematical Society Lecture Note Series).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Deniable authenticated key establishment for Internet protocols

    Boyd, C., Mao, W. & Paterson, K. G., 2005, Security Protocols, 11th International Workshop, Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer, p. 255-271 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Published

    Designing and Verifying Secure Protocols of the Digital Marketplace

    Goo, S. K., Irvine, J. M., Tomlinson, A. & Schwiderski-Grosche, S., 2005.

    Research output: Contribution to conferencePaper

  91. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P., 2005, In : Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticle

  92. Published

    Dynamic access policies for unconditionally secure secret sharing schemes

    Martin, K. M., 2005, Proceedings of IEEE Information Theory Workshop (ITW 05), Awaji Island, Japan. IEEE Computer Society Press, p. 61-66

    Research output: Chapter in Book/Report/Conference proceedingChapter

  93. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In : Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticle

  94. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Fine Grained Resource Reservation and Management in Grid Economics

    Chard, K., Komisarczuk, P., Bubendorfer, K. & Desai, A., 2005, Proceedings of The 2005 International Conference on Grid Computing and Applications, GCA 2005, Las Vegas, Nevada, USA, June 20-23, 2005. p. 31-38 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Flaws in an e-mail protocol of Sun, Hsieh and Hwang

    Dent, A. W., 2005, In : IEEE Communications Letters. 9, 8, p. 718-719 2 p.

    Research output: Contribution to journalArticle

  100. Published

    Group communication: Design challenges in the development of key management frameworks in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2005, Proceedings of Security & Management (SAM '05), Las Vegas. p. 385-391 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  101. Published

    Hybrid signcryption schemes with insider security

    Dent, A. W., 2005, Information Security and Privacy: 10th Australasian Conference -- ACISP 2005. Boyd, C. & Nieto, J. M. G. (eds.). Springer-Verlag, p. 253-266 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. Published

    Hybrid signcryption schemes with outsider security

    Dent, A. W., 2005, Information Security: 8th International Conference -- ISC 2005. Zhou, J., Lopez, J., Deng, R. H. & Bao, F. (eds.). Springer-Verlag, p. 203-217 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter