1. Article › Research › Peer-reviewed
  2. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In : Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticle

  3. Published

    Attack on Shao's key agreement protocol

    Alassiry, T., Ng, S-L. & Wild, P., 2006, In : IEE Proceedings - Information Security. 153, 2, p. 54-57 4 p.

    Research output: Contribution to journalArticle

  4. Published

    Attacking smart card systems: Theory and practice

    Markantonakis, K., Tunstall, M., Hancke, G., Askoxylakis, I. & Mayes, K., 1 May 2009, In : Information Security Technical Report. 14, p. 46-56 11 p.

    Research output: Contribution to journalArticle

  5. Published

    Attacks on MacDES MAC Algorithm

    Coppersmith, D. & Mitchell, C. J., 1999, In : Electronics Letters. 35, p. 1626-1627 2 p.

    Research output: Contribution to journalArticle

  6. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In : Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticle

  7. Published

    Authenticating multicast Internet electronic mail messages using a bidirectional MAC is insecure

    Mitchell, C. J., 1992, In : IEEE Transactions on Computers. 41, p. 505-507 3 p.

    Research output: Contribution to journalArticle

  8. Published

    Authentication protocols for mobile environment value-added services

    Horn, G., Martin, K. M. & Mitchell, C. J., 2002, In : IEEE Transaction on Vehicular Technology. 51, 2, p. 383-392 10 p.

    Research output: Contribution to journalArticle

  9. Published

    Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes

    Mitchell, C. J., Piper, F. C., Walker, M. & Wild, P. R., 1996, In : Designs, Codes and Cryptography. 7, p. 101-110

    Research output: Contribution to journalArticle

  10. Published

    Authentication using cryptography

    Mitchell, C. J., 1997, In : Information Security Technical Report. 2, 2, p. 25-32 8 p.

    Research output: Contribution to journalArticle

  11. Published

    Authentication using minimally trusted servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., Jul 1997, In : Operating Systems Review. 31, 3, p. 16-28 13 p.

    Research output: Contribution to journalArticle

  12. Published

    Authorisation and antichains

    Crampton, J. & Loizou, G., 2001, In : Operating Systems Review. 35, 3, p. 6-15 10 p.

    Research output: Contribution to journalArticle

  13. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In : ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticle

  14. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In : International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticle

  15. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In : Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticle

  16. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In : Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticle

  17. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In : IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  18. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G., 2017, In : Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 215-231 17 p.

    Research output: Contribution to journalArticle

  19. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In : Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticle

  20. Published

    Bayesian updating of a probability distribution encoded on a quantum register

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 74, p. 032315 1 p.

    Research output: Contribution to journalArticle

  21. Published

    Bieberbach groups with finite commutator quotient and point-group C_p^n x C_p^m

    Cid, C., 2000, In : Journal of Group Theory. 3, 2, p. 113-125 13 p.

    Research output: Contribution to journalArticle

  22. Published

    Binary Sequence Sets with Favourable Correlation Properties from Difference Sets and MDS Codes

    Paterson, K. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 172-180 9 p.

    Research output: Contribution to journalArticle

  23. Published

    Bit--Serial Modulo Multiplier

    Tomlinson, A., 1 Nov 1989, In : Electronics Letters. 25, 24, p. 1664 1 p.

    Research output: Contribution to journalArticle

  24. Published

    Bounds and Constructions for Authentication Schemes offering Secrecy

    Martin, K. M., Casse, L. R. A. & Wild, P. R., 1998, In : Designs, Codes and Cryptography. 13, p. 107-129 23 p.

    Research output: Contribution to journalArticle

  25. Published

    Bounds and techniques for efficient redistribution of secret shares to new access structures

    Martin, K. M., Safavi-Naini, R. & Wang, H., 1999, In : The Computer Journal. 42, 8, p. 638-649 12 p.

    Research output: Contribution to journalArticle

  26. Published

    Bounds on Partial Correlations of Sequences

    Paterson, K. G. & Lothian, P. J. G., 1998, In : IEEE Transactions on Information Theory. 44, p. 1164-1175 12 p.

    Research output: Contribution to journalArticle

  27. Published

    Brauer's class number relation

    Walter, C. D., 1979, In : Acta Arithmetica. 35, p. 33-40 8 p.

    Research output: Contribution to journalArticle

  28. Published

    Broadband Island interconnection via satellite?performance analysis for the race II?catalyst project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, In : International journal of satellite communications. 12, 3, p. 223-238 16 p.

    Research output: Contribution to journalArticle

  29. Published

    Broadcast-Enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D., 7 Nov 2014, In : ACM Transactions on Sensor Networks. 11, 1, 33 p., 6.

    Research output: Contribution to journalArticle

  30. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P., Nov 2018, In : Schizophrenia bulletin. 44, 6, p. 1362–1372 11 p.

    Research output: Contribution to journalArticle

  31. Published

    Capture--A behavioral analysis tool for applications and documents

    Seifert, C., Steenson, R., Welch, I., Komisarczuk, P. & Endicott-Popovsky, B., 2007, In : digital investigation. 4, p. 23-30 8 p.

    Research output: Contribution to journalArticle

  32. Published

    CCITT/ISO standards for secure message handling

    Mitchell, C. J., Walker, M. & Rush, P. D. C., May 1989, In : IEEE Journal on Selected Areas in Communications. 7, 4, p. 517-524 8 p.

    Research output: Contribution to journalArticle

  33. Published

    Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., Apr 2018, In : IEEE Transactions on Information Forensics and Security . 13, 4, p. 1031-1041 11 p.

    Research output: Contribution to journalArticle

  34. Published

    Certification of secure RSA keys

    Blackburn, S. R. & Galbraith, S. D., 2000, In : Electronics Letters. 36, 1, p. 29-30 2 p.

    Research output: Contribution to journalArticle

  35. Published

    Challenges for Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, In : IEEE Security and Privacy Magazine. Nov./Dec., p. 60-66 7 p.

    Research output: Contribution to journalArticle

  36. Published

    Challenges in standardising cryptography

    Mitchell, C. J., 1 Jul 2016, In : International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticle

  37. Published

    Changing thresholds in the absence of secure channels

    Martin, K. M., Pieprzyk, J., Safavi-Naini, R. & Wang, H., 1999, In : Australian Computer Journal. 31, 2, p. 34-43 10 p.

    Research output: Contribution to journalArticle

  38. Published

    Chaos for Liouville probability densities

    Schack, R. & Caves, C. M., 1996, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 53, p. 3387 1 p.

    Research output: Contribution to journalArticle

  39. Published

    Character sums and nonlinear recurrence sequences

    Blackburn, S. R. & Shparlinski, I. E., 2006, In : Discrete Mathematics. 306, p. 1132-1138 7 p.

    Research output: Contribution to journalArticle

  40. Published

    Classical limit in terms of symbolic dynamics for the quantum baker's map

    Soklakov, A. N. & Schack, R., 2000, In : Physical Review E (Statistical Physics, Plasmas, Fluids, and Related Interdisciplinary Topics). 61, p. 5108-5114 7 p.

    Research output: Contribution to journalArticle

  41. Published

    Classical model for bulk-ensemble NMR quantum computation

    Schack, R. & Caves, C. M., 1999, In : Physical Review A. 60, p. 4354-4362 9 p.

    Research output: Contribution to journalArticle

  42. Published

    Classical predictability and coarse-grained evolution of the quantum baker's map

    Scherer, A., Soklakov, A. N. & Schack, R., 2006, In : Physical Review D . 73, p. 125009 1 p.

    Research output: Contribution to journalArticle

  43. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Deo, R. & Paterson, K., 14 Aug 2018, In : TCHES. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticle

  44. Published

    Combinatorial Models for Perfect Secret Sharing Schemes

    Martin, K. M. & Jackson, W-A., 1998, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 28, p. 249-265 17 p.

    Research output: Contribution to journalArticle

  45. Published

    Comment - Signature with message recovery

    Mitchell, C. J. & Yeun, C. Y., 1999, In : Electronics Letters. 35, p. 217 1 p.

    Research output: Contribution to journalArticle

  46. Published

    Comment on "Boltzmann's entropy and time's arrow" by J.~Lebowitz

    Barnum, H., Caves, C. M., Fuchs, C. & Schack, R., 1994, In : Physics Today. 47, 11, p. 11 1 p.

    Research output: Contribution to journalArticle

  47. Published

    Comment on "Exponential sensitivity and chaos in quantum systems"

    Schack, R., 1995, In : Physical Review Letters. 75, p. 581 1 p.

    Research output: Contribution to journalArticle

  48. Published

    Comment on 'Blocking method for RSA cryptosystem without expanding cipher length'

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1527 1 p.

    Research output: Contribution to journalArticle

  49. Published

    Comment on 'Existence of one-dimensional perfect binary arrays'

    Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 714

    Research output: Contribution to journalArticle

  50. Published

    Comments on a cryptographic key assignment scheme

    Tang, Q. & Mitchell, C. J., 2005, In : Computer Standards & Interfaces. 27, p. 323-326 4 p.

    Research output: Contribution to journalArticle

  51. Published

    Comments on an optimized protocol for mobile network authentication and security

    Martin, K. M. & Mitchell, C. J., 1999, In : Mobile Computing and Communications Review. 3, 2, p. 37

    Research output: Contribution to journalArticle

  52. Published

    Comments on the S/KEY user authentication scheme

    Mitchell, C. J. & Chen, LI., Oct 1996, In : Operating Systems Review. 30, 4, p. 12-16 5 p.

    Research output: Contribution to journalArticle

  53. Published

    Comments on two anonymous conference key distribution systems

    Tang, Q. & Mitchell, C. J., Oct 2005, In : Computer Standards & Interfaces. 27, 7, p. 397-400 4 p.

    Research output: Contribution to journalArticle

  54. Published

    Computation of Five- and Six-Dimensional Bieberbach Groups

    Cid, C. & Schulz, T., 2001, In : EXPERIMENTAL MATHEMATICS. 10, 1, p. 109-115 7 p.

    Research output: Contribution to journalArticle

  55. Published

    Computing the error linear complexity spectrum of a binary sequence of period 2^n

    Lauder, A. G. B. & Paterson, K. G., 2003, In : IEEE Transactions on Information Theory. 49, 1, p. 273-280 8 p.

    Research output: Contribution to journalArticle

  56. Published

    Conditional evolution in single-atom cavity QED

    Soklakov, A. N. & Schack, R., 2002, In : Physical Review A. 65, p. 013804 1 p.

    Research output: Contribution to journalArticle

  57. Published

    Conditions for compatibility of quantum-state assignments

    Caves, C. M., Fuchs, C. A. & Schack, R., 2002, In : Physical Review A. 66, p. 062111 1 p.

    Research output: Contribution to journalArticle

  58. Published

    Confidence in smart token proximity: Relay attacks revisited

    Hancke, G. P., Mayes, K. E. & Markantonakis, K., 2009, In : Computers and Security. 28, 7, p. 615 - 627

    Research output: Contribution to journalArticle

  59. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In : Annals of Mathematics and Artificial Intelligence. 81, 1-2, p. 105–123 19 p.

    Research output: Contribution to journalArticle

  60. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In : Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticle

  61. Published

    Consistent linearization for quasi-probabilities

    Kärtner, F., Schack, R. & Schenzle, A., 1992, In : J. Mod. Opt.. 39, p. 917-925 9 p.

    Research output: Contribution to journalArticle

  62. Published

    Constructing c-ary Perfect Factors

    Mitchell, C. J., 1994, In : Designs, Codes and Cryptography. 4, p. 341-368 28 p.

    Research output: Contribution to journalArticle

  63. Published

    Constructing new perfect binary arrays

    Jedwab, J. & Mitchell, C. J., 26 May 1988, In : Electronics Letters. 24, 11, p. 650-652 3 p.

    Research output: Contribution to journalArticle

  64. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In : Annals of Mathematics and Artificial Intelligence. 81, 1-2, p. 21-46 26 p.

    Research output: Contribution to journalArticle

  65. Published

    Criteria to evaluate Automated Personal Identification Mechanisms

    Palmer, A., 1 Dec 2008, In : Computers and Security. 27, 7-8, p. 260-284 25 p., Palmer:2008:CEA2639520.2639609.

    Research output: Contribution to journalArticle

  66. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In : Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticle

  67. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In : Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticle

  68. Published

    Cryptanalysis of a cryptosystem based on Drinfeld modules

    Blackburn, S. R., Cid, C. & Galbraith, S. G., 2006, In : IEE Proc. Information Security. 153, 1, p. 12-14 3 p.

    Research output: Contribution to journalArticle

  69. Published

    Cryptanalysis of a cryptosystem due to Yoo, Hong, Lee, Lim, Yi and Sung

    Blackburn, S. R. & Garefalakis, T., 2001, In : Electronics Letters. 37, 18, p. 1118-1119 2 p.

    Research output: Contribution to journalArticle

  70. Published

    Cryptanalysis of a homomorphic public-key cryptosystem over a finite group

    Choi, S-J., Blackburn, S. R. & Wild, P. R., 2007, In : Journal of Mathematical Cryptology. 1, p. 351-358 8 p.

    Research output: Contribution to journalArticle

  71. Published

    Cryptanalysis of a hybrid authentication protocol for large mobile networks

    Tang, Q. & Mitchell, C. J., Apr 2006, In : Journal of Systems and Software. 79, 4, p. 496-501 6 p.

    Research output: Contribution to journalArticle

  72. Published

    Cryptanalysis of a Keystream Generator due to Chan and Cheng

    Blackburn, S. R., 1998, In : Electronics Letters. 34, 18, p. 1737-1738 2 p.

    Research output: Contribution to journalArticle

  73. Published

    Cryptanalysis of a public key cryptosystem due to Wu and Dawson

    Blackburn, S. R., 1999, In : IEE Proc. Computers and Digital Techniques. 146, 4, p. 185-186 2 p.

    Research output: Contribution to journalArticle

  74. Published

    Cryptanalysis of Pomaranch

    Cid, C., Gilbert, H. & Johansson, T., 2006, In : IEE Proc. Information Security. 153, 2, p. 51-53 4 p.

    Research output: Contribution to journalArticle

  75. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In : Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticle

  76. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In : Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticle

  77. Published

    Cryptanalysis of two identification schemes based on an ID-based cryptosystem

    Tang, Q. & Mitchell, C. J., Oct 2005, In : IEE Proceedings on Communications. 152, 5, p. 723-724 2 p.

    Research output: Contribution to journalArticle

  78. Published

    Cryptographic enforcement of information flow policies without public information via tree partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 24 Aug 2017, In : Journal of Computer Security. 25, 6, p. 511-535 25 p.

    Research output: Contribution to journalArticle

  79. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In : Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticle

  80. Published

    Cryptography from pairings: a snapshot of current research

    Paterson, K. G., 2002, In : Information Security Technical Report. 7, 3, p. 41-54 14 p.

    Research output: Contribution to journalArticle

  81. Published

    Cultural Heritage Predictive Rendering

    Happa, J., Bashford-Rogers, T., Wilkie, A., Artusi, A., Debattista, K. & Chalmers, A., 2012, In : Computer Graphics Forum.

    Research output: Contribution to journalArticle

  82. Published

    Cyber Security Threats and Challenges in Collaborative Mixed-Reality

    Happa, J., Glencross, M. & Steed, A., 9 Apr 2019, In : Frontiers in ICT. 6, p. 1-20 20 p., 5.

    Research output: Contribution to journalArticle

  83. Published

    De Bruijn sequences and perfect factors

    Mitchell, C. J., 1997, In : SIAM Journal on Discrete Mathematics. 10, p. 270-281 12 p.

    Research output: Contribution to journalArticle

  84. Published

    Decoding Perfect Maps

    Mitchell, C. J. & Paterson, K. G., 1994, In : Designs, Codes and Cryptography. 4, p. 11-30 20 p.

    Research output: Contribution to journalArticle

  85. Published

    Decoherence and linear entropy increase in the quantum baker's map

    Soklakov, A. N. & Schack, R., 2002, In : Physical Review E (Statistical, Nonlinear, and Soft Matter Physics). 66, p. 036212 1 p.

    Research output: Contribution to journalArticle

  86. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2008, In : International Journal of Information Security. 7, 2, p. 123-136 14 p.

    Research output: Contribution to journalArticle

  87. Published

    Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

    Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P. & Blasco, J., Mar 2014, In : Expert Systems with Applications. 41, 4, Part 1, p. 1104-1117 14 p.

    Research output: Contribution to journalArticle

  88. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S., 2009, In : International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticle

  89. Published

    Design of a secure distance-bounding channel for RFID

    Hancke, G., 2012, In : Journal of Network and Computer Applications. 34, 3, p. 877-887

    Research output: Contribution to journalArticle

  90. Published

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Muttik, I. & Roggenbach, M., 1 Mar 2018, In : Journal of Network and Computer Applications. 105, p. 88-104 17 p.

    Research output: Contribution to journalArticle

  91. Published

    Detection of repackaged mobile applications through a collaborative approach

    Aldini, A., Martinelli, F., Saracino, A. & Sgandurra, D., 10 Aug 2015, In : Concurrency Computation. 27, 11, p. 2818-2838 21 p.

    Research output: Contribution to journalArticle

  92. Published

    Disjoint difference families and their applications

    Ng, S. & Paterson, M., Jan 2016, In : Designs, Codes and Cryptography. 78, 1, p. 103-127 25 p.

    Research output: Contribution to journalArticle

  93. Published

    Distance Bounding: A Practical Security Solution for Industrial Real-Time Location Systems?

    Abu-Mahfouz, A. & Hancke, G., Feb 2013, In : IEEE Transactions on Industrial Informatics. 9, 1, p. 16 27 p.

    Research output: Contribution to journalArticle

  94. Published

    Distance-invariant error control codes from combinatorial designs

    Mitchell, C. J., 1989, In : Electronics Letters. 25, p. 1528-1529 2 p.

    Research output: Contribution to journalArticle

  95. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In : IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticle

  96. Published

    Distributing the encryption and decryption of a block cipher

    Martin, K. M., Safavi-Naini, R., Wang, H. & Wild, P., 2005, In : Designs, Codes and Cryptography. 36, 3, p. 263-287 25 p.

    Research output: Contribution to journalArticle

  97. Published

    Distributing trust amongst multiple authentication servers

    Chen, LI., Gollmann, D. & Mitchell, C. J., 1995, In : Journal of Computer Security. 3, 4, p. 255-267 13 p.

    Research output: Contribution to journalArticle

  98. Published

    Dynamic content attacks on digital signatures

    Alsaid, A. & Mitchell, C. J., 2005, In : Information and Computer Security . 13, 4, p. 328-336 9 p.

    Research output: Contribution to journalArticle

  99. Published

    Dynamics and symmetry of a laser with a squeezed reservoir

    Ginzel, C., Schack, R. & Schenzle, A., 1991, In : J. Opt. Soc. Am. B. 8, p. 1704-1711 8 p.

    Research output: Contribution to journalArticle

  100. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In : secure Magazine. 1, 9

    Research output: Contribution to journalArticle

  101. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In : Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...20 Next