1. Published

    Application of Grid Security to Personal Distributed Environments

    Tomlinson, A. & Schwiderski-Grosche, S., 1 Oct 2004, p. 68-78. 11 p.

    Research output: Contribution to conferencePaper

  2. Unpublished

    Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers

    Gallery, E., Tomlinson, A. & Delicata, R., 1 Jun 2005, (Unpublished).

    Research output: Working paper

  3. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  5. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  9. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In : Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticle

  12. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In : Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticle

  14. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In : International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticle

  15. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In : Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticle

  16. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  17. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In : Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticle

  18. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Are we smart about security?

    Mayes, K. & Markantonakis, K., 2003, In : Information Security Technical Report. 8, 1, p. 6 - 16

    Research output: Contribution to journalArticle

  20. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In : International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticle

  23. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In : Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticle

  25. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In : IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticle

  28. Published

    Attacking a Trusted Computing Platform [Improving the Security of TCG Specification

    Bruschi, D., Cavallaro, L., Lanzi, A. & Monga, M., 2005, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  29. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In : Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticle

  30. Published

    Attacking the IPsec Standards in Encryption-only Configurations

    Degabriele, J. P. & Paterson, K. G., 2007, IEEE Symposium on Privacy and Security. IEEE Computer Society Press, p. 335-349 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published

    Attacks against GSMA’s M2M Remote Provisioning

    Quaglia, E., Smyth, B. & Meyer, M., 2018.

    Research output: Contribution to conferencePaper

  32. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticle

  33. Published

    Attacks on time-of-flight distance bounding channels

    Hancke, G. P. & Kuhn, M. G., 2008, Proceedings of the first ACM conference on Wireless network security. New York, NY, USA: ACM, p. 194-202 9 p. (WiSec '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Jul 2015, USENIX Security 2015. USENIX Association, p. 113-128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In : Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticle

  36. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis

    Balfe, S. & Paterson, K. G., 2008, Financial Cryptography. Tsudik, G. (ed.). Springer, p. 171-175 5 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. Unpublished

    Authenticated Encryption in Theory and in Practice

    Degabriele, J., 2014, (Unpublished) 182 p.

    Research output: ThesisDoctoral Thesis

  40. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In : IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticle

  42. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 22 May 2015, The 8th IAPR International Conference on Biometrics (ICB) 2015. Phuket : IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Unpublished

    Authentication by Gesture Recognition: a Dynamic Biometric Application

    Ducray, B., 2017, (Unpublished) 146 p.

    Research output: ThesisDoctoral Thesis

  44. Unpublished

    Authentication Issues in Near Field Communication and RFID

    Saeed, Q., 2014, (Unpublished) 137 p.

    Research output: ThesisDoctoral Thesis

  45. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In : IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticle

  46. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In : Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticle

  47. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In : Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticle

  48. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In : Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticle

  49. Published

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B., 2018, p. 322-343. 22 p.

    Research output: Contribution to conferencePaper

  50. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In : Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticle

  51. Unpublished

    Authorization and antichains

    Crampton, J., 2002, (Unpublished)

    Research output: ThesisDoctoral Thesis

  52. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In : ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticle

  54. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In : International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticle

  56. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  58. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In : Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticle

  59. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In : Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticle

  61. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., Apr 2014, 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  63. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Baby-step giant-step algorithms for non-uniform distributions

    Blackburn, S. R. & Teske, E., 2000, Proceedings of ANTS IV. Bosma, W. (ed.). Berlin: Springer, p. 153-168 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  66. E-pub ahead of print

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  67. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In : IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  68. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In : Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticle

  69. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In : Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticle

  70. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  71. Published

    Bayesian probability in quantum mechanics

    Schack, R., 2007, Bayesian Statistics 8: Proceedings of the Eighth Valencia International Meeting. Bernardo, J. M., Bayarri, M. J., Berger, J. O., Dawid, A. P., Heckerman, D., Smith, A. F. M. & West, M. (eds.). Oxford: Oxford University Press, p. 453-464

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticle

  73. Published

    Bayesian versus frequentist predictions in quantum tomography

    Schack, R., 2007, Foundations of Probability and Physics 4: AIP Conference Proceedings Vol.~889. Adenier, G., Fuchs, C. A. & Khrennikov, A. (eds.). Melville, New York: American Institute of Physics, p. 230-234

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Belief and Trust in Fault Tolerance

    Price, G., 2003, Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Dimitrakos, T. & Martinelli, F. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Al-Fannah, N. M., Li, W. & Mitchell, C. J., 9 Sep 2018, Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Springer-Verlag, p. 481-501 21 p. (Lecture Notes in Computer Science; vol. 11060).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  76. Published

    Bias in the Mifare DESFire EV1 TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., 2016, International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2016). Hancke, G. P. & Markantonakis, K. (eds.). Springer, p. 123-133 11 p. (Lecture Notes in Computer Science; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In : Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticle

  78. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, p. 398-419 22 p. (Lecture Notes in Computer Science; vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticle

  80. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Forthcoming

    Biometric Technology

    Thornton, P. & Adey, P., 2015, (Accepted/In press) Dictionary of International Migration. Brasilia Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  82. Published

    B-ISDN implementation via satellite: the catalyst project

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F. & Smythe, C., 1993, Teletraffic Symposium, 10th. Performance Engineering in Telecommunications Network, Tenth UK. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In : Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticle

  84. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  85. Published

    Block Ciphers: Algebraic Cryptanalysis and Gröbner Bases

    Cid, C. & Weinmann, R-P., 2009, Gröbner Bases, Coding, and Cryptography. Springer, p. 307-327 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 2018, Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Boundary Conditions that Influence Decisions about Log File Formats in Multi-Application Smart Cards

    Markantonakis, K., 1999, Proceedings of the Second International Conference on Information and Communication Security. Springer-Verlag, p. 230-243 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Bounded and Approximate Strong Satisfiability in Workflows

    Crampton, J., Gutin, G. & Majumdar, D., 28 May 2019, Proceedings of ACM SACMAT 2019. ACM, p. 179-184 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In : Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticle

  90. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In : The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticle

  91. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticle

  92. Published

    Bow ties are cool: an evening at the IISS with Toomas Hendrik Ilves

    Robinson, N. & Haggman, A., 3 Dec 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  93. Published

    Brauer's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticle

  94. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In : International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  97. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    Broadcast-Enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D., 7 Nov 2014, In : ACM Transactions on Sensor Networks. 11, 1, 33 p., 6.

    Research output: Contribution to journalArticle

  99. Published

    Broadening the scope of Fault Tolerance within Secure services

    Price, G., 2000, Security Protocols, 8th International Workshop, Cambridge, UK. 3-5 April, 2000. Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  100. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

Previous 1 2 3 4 5 6 7 8 ...20 Next