1. 2018
  2. Published
  3. 2017
  4. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study

    Ibrahim, S., Rush, M., Edwards, E. T. & Monks, C. P., 31 Dec 2017, In: Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 16 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    The Applicability of Ambient Sensors as Proximity Evidence for NFC Transactions

    Shepherd, C., Gurulian, I., Frank, E., Markantonakis, K., Akram, R., Mayes, K. & Panaousis, E., 21 Dec 2017, Mobile Security Technologies (MoST '17), IEEE Security & Privacy Workshops. IEEE, p. 179-188 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published
  8. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    One leak will sink a ship: WebRTC IP address leaks

    Al-Fannah, N. M., 7 Dec 2017, p. 1-5. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  10. E-pub ahead of print

    Distributed denial of government: the Estonian Data Embassy Initiative

    Robinson, N. & Martin, K., 1 Dec 2017, (E-pub ahead of print) In: Network Security. 2017, 9, p. 13-16 4 p.

    Research output: Contribution to journalSpecial issue

  11. Published

    Multi-Platform Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., Dec 2017, In: International Journal on Advances in Security. 10, 3&4, p. 196-207 12 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Geographies of (con)text: language and structure in a digital age

    Thornton, P., 28 Nov 2017, In: Computational Culture: A Journal of Software Studies. Autumn 2017, Issue 6, p. 1-11 11 p.

    Research output: Contribution to journalSpecial issuepeer-review

  13. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, (E-pub ahead of print) Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In: Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticlepeer-review

  15. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M., 14 Nov 2017, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  16. Published

    “10 Things Video Games….” Taught me!

    Agha, D., 13 Nov 2017

    Research output: Other contribution

  17. Published

    Overpromised or Underdelivered?: Evaluating the Performance of Australia's National Cyber Security Strategy

    Haggman, A., 9 Nov 2017, Asia Pacific Security Magazine, November/December 2017, p. 10 11 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  18. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaperpeer-review

  19. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L., 30 Oct 2017, PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    The TypTop System: Personalized Typo-Tolerant Password Checking

    Chatterjee, R., Woodage, J., Pnueli, Y., Chowdhury, A. & Ristenpart, T., 30 Oct 2017, CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 329-346 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K., 26 Oct 2017, (Accepted/In press) The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  25. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D., 5 Oct 2017, Custard, Culverts and Cake: Academics on Life in The Archers. Courage, C. & Headlam, N. (eds.). Emerald Publishing, p. 249-267

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L., 1 Oct 2017, Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., 1 Oct 2017, In: IEEE Transactions on Mobile Computing. 16, 10, p. 2927-2940 14 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Conformal prediction of biological activity of chemical compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 105–123 19 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A., Oct 2017, In: Annals of Mathematics and Artificial Intelligence. 81, p. 21-46 26 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 19 Sep 2017, In: IACR Transactions on Symmetric Cryptology. 2017, 3, p. 73-107 35 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Localised multisecret sharing

    Laing, T., Martin, K., Paterson, M. & Stinson, D., Sep 2017, In: Cryptography and Communications. 9, p. 581–597 17 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    OCPP Protocol: Security Threats and Challenges

    Alcaraz, C., Lopez, J. & Wolthusen, S., Sep 2017, In: IEEE Transactions on Smart Grid. 8, 5, p. 2452-2459 8 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

    Livraga, G. (ed.) & Mitchell, C. J. (ed.), Sep 2017, Berlin: Springer-Verlag. 235 p. (Lecture Notes in Computer Science; vol. 10547)

    Research output: Book/ReportAnthology

  35. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S., Sep 2017, (Accepted/In press) 1 p. Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  36. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K., 29 Aug 2017, ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM, p. 1-10 10 p. 5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R., 29 Aug 2017, FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM, p. 1-9 9 p. 49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Cryptographic enforcement of information flow policies without public information via tree partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 24 Aug 2017, In: Journal of Computer Security. 25, 6, p. 511-535 25 p.

    Research output: Contribution to journalArticlepeer-review

  40. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Cyber Security Strategy Wargame

    Haggman, A., 17 Aug 2017.

    Research output: Contribution to conferencePosterpeer-review

  42. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L., 16 Aug 2017, Proceedings of the 26th USENIX Security Symposium. USENIX, p. 625-642 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. E-pub ahead of print

    Detecting Malicious Collusion Between Mobile Software Applications: The AndroidTM Case

    Blasco Alis, J., 2 Aug 2017, (E-pub ahead of print) Data Analytics and Decision Support for Cybersecurity. Springer, p. 55-97 43 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. E-pub ahead of print

    Key Rotation for Authenticated Encryption

    Everspaugh, A., Paterson, K., Ristenpart, T. & Scott, S., 2 Aug 2017, (E-pub ahead of print) Advances in Cryptology – CRYPTO 2017 : 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20–24, 2017, Proceedings, Part III. Springer, p. 98-129 32 p. (Lecture Notes in Computer Science ; vol. 10403 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J., Aug 2017, USENIX Workshop on Offensive Technologies (WOOT). USENIX, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    TACTICS: Validation of the security framework developed for tactical SOA

    Gkioulos, V., Risthein, E. & Wolthusen, S., Aug 2017, In: Journal of Information Security and Applications. 35, p. 96-105 10 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    CryptoCache: Network caching with confidentiality

    Leguay, J., Paschos, G., Quaglia, E. & Smyth, B., 31 Jul 2017, 2017 IEEE International Conference on Communications (ICC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. N. & Markantonakis, K., 27 Jul 2017, (E-pub ahead of print) Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 16 p. (Lecture Notes in Computer Science; vol. 10442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R., 27 Jul 2017, In: Journal of Sensors. 2017, p. 1-11 11 p., 3186482.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Trashing IMSI catchers in mobile networks

    Khan, M. & Mitchell, C. J., 18 Jul 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    ExpoSE: practical symbolic execution of standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 13 Jul 2017, SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Diary of a plastic soldier (extracts)

    Thornton, P., 12 Jul 2017, Embodying militarism: exploring the spaces and bodies in-between. Dyvik, S. L. & Greenwood, L. (eds.). Routledge, Chapter 12

    Research output: Chapter in Book/Report/Conference proceedingChapter

  54. Published

    Gaming...Seriously?

    Haggman, A., 11 Jul 2017, 1 p. Information Security Group.

    Research output: Other contribution

  55. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Efficient Attack Graph Analysis through Approximate Inference

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E., Jul 2017, In: ACM Transactions on Information and System Security. 20, 3, p. 1-30 30 p., 10.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. & Ng, S., Jul 2017, In: IET Information Security . 11, 4, p. 204-210 7 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Crypto Wars 2.0: RHUL Students head to the 3rd inter-CDT workshop in Oxford

    Haggman, A., 29 Jun 2017, RHUL Geopolitics and Security.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  60. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S., 26 Jun 2017, Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. E-pub ahead of print

    Detecting disguised processes using application-behavior profiling

    Vaas, C. & Happa, J., 8 Jun 2017, (E-pub ahead of print) Technologies for Homeland Security (HST), 2017 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Everyday Cryptography: Fundamental Principles & Applications

    Martin, K., 8 Jun 2017, 2nd ed. Oxford University Press. 720 p.

    Research output: Book/ReportBook

  67. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    A survey on Reinforcement learning models and algorithms for traffic signal control

    Yau, K. L. A., Qadir, J., Khoo, H. L., Ling, M. H. & Komisarczuk, P., 1 Jun 2017, In: ACM Computing Surveys. 50, 3, 3068287.

    Research output: Contribution to journalReview articlepeer-review

  70. Published

    Improving Reliable Probabilistic Prediction by Using Additional Knowledge

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 193-200 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Reverse Conformal Approach for On-line Experimental Design

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 185-192 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L., Jun 2017, In: IEEE Transactions on Information Forensics and Security . 12, 6, p. 1269-1284 16 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    CDT students take on the Cyber 9/12 Challenge in Geneva

    Haggman, A., 30 May 2017, RHUL Geopolitics and Security.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  76. Published

    Improving interpretations of trust claims

    Sel, M., 24 May 2017, Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Vassileva, J., Mauw, S., Habib, S. M. & Muhlhauser, M. (eds.). Springer New York LLC, p. 164-173 10 p. (IFIP Advances in Information and Communication Technology; vol. 473).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    Multi-Application Smart Card Platforms and Operating Systems

    Markantonakis, K. & Akram, R. N., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 59-92 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  79. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K., 19 May 2017, Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  80. Published

    The Death of the Reader

    Thornton, P., 16 May 2017, 5 p. London : Under the Influence magazine .

    Research output: Other contribution

  81. E-pub ahead of print

    Increasing the Security of Wireless Communication through Relaying and Interference Generation

    Rose, L., Quaglia, E. & Valentin, S., 11 May 2017, (E-pub ahead of print) 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Levitation: The Science, Myth and Magic of Suspension

    Adey, P., 1 May 2017, London: Reaktion Books. 272 p.

    Research output: Book/ReportBook

  83. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M., May 2017, (Unpublished) Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  84. Published

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., 23 Apr 2017, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  85. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, (E-pub ahead of print) CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J., 7 Apr 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 75-90 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Preventing relay attacks in mobile transactions using infrared light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K., 3 Apr 2017, SAC '17 Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C., 2 Apr 2017, SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM, p. 19-26 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    On Dual Lattice Attacks Against Small-Secret LWE and Parameter Choices in HElib and SEAL

    Albrecht, M., 1 Apr 2017, (E-pub ahead of print) Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2017: Advances in Cryptology . Springer, p. 103-129 27 p. (Lecture Notes in Computer Science; vol. 10210).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Apr 2017, In: International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 23 Mar 2017, In: IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  95. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, (E-pub ahead of print) 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L., 22 Mar 2017, ACM CODASPY. ACM, p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R., 16 Mar 2017, In: Journal of Computer Security. 25, 1, p. 83-115 33 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Stack Object Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L., 27 Feb 2017, NDSS Symposium 2017. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Unpublished
  100. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K., 9 Feb 2017, The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Log Your Car: The Non-invasive Vehicle Forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 974-982 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...22 Next