1. 2016
  2. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K., Oct 2016, In : Designs, Codes and Cryptography. 81, 1, p. 11-34 24 p.

    Research output: Contribution to journalArticle

  5. Published

    Password Generators: Old Ideas and New

    AL Maqbali, F. & Mitchell, C., 17 Sep 2016, Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  6. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  8. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In : ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticle

  9. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In : Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticle

  13. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, Vol. 9814. p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Challenges in standardising cryptography

    Mitchell, C. J., 1 Jul 2016, In : International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticle

  18. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In : Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticle

  19. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In : Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  20. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  21. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Challenges of security and trust of mobile devices as digital avionics component

    Akram, R. & Markantonakis, K., 9 Jun 2016, Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J., 3 Jun 2016, 4 p.

    Research output: Working paper

  27. Published

    Securing Autonomous Networks through Virtual Closure

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Jun 2016, In : International Journal of Intelligent Computing Research (IJICR). 7, 2, p. 694-705 12 p.

    Research output: Contribution to journalArticle

  28. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    The Navigation Metaphor in Security Economics

    Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W. & Verbij, R., 25 May 2016, In : IEEE Security and Privacy Magazine. 14, 3, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  30. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Unpublished

    Analysis and Classification of Android Malware

    Tam, K., 18 May 2016, (Unpublished) 197 p.

    Research output: ThesisDoctoral Thesis

  32. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Two Rounds RFID Grouping-Proof Protocol

    Abu Ghazalah, S. & Markantonakis, K., 3 May 2016, p. 193-203. 11 p.

    Research output: Contribution to conferencePaper

  34. Published

    Polly Cracker, revisited

    Albrecht, M., Faugere, J-C., Farshim, P., Herold, G. & Perret, L., May 2016, In : Designs, Codes and Cryptography. 79, 2, p. 261-302 42 p.

    Research output: Contribution to journalArticle

  35. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K., 28 Apr 2016, Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Vol. 9665. p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. E-pub ahead of print

    Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S., 22 Apr 2016, International Journal of Human Rights and Constitutional Studies. 1 ed. Inderscience, Vol. 4. p. 54-74 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  37. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p. (Lecture Notes in Computer Science ; vol. 9100)(Security and Cryptology - sub series ).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  42. E-pub ahead of print

    Diary of a Plastic Soldier (extracts)

    Thornton, P., 10 Mar 2016, In : Critical Military Studies. 2, 1-2, p. 137-138 2 p.

    Research output: Contribution to journalSpecial issue

  43. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Privacy, compliance and the cloud

    Mitchell, C. J., 9 Mar 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, p. 3-14 12 p. (» Computer Communications and Networks).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

    Saracino, A., Sgandurra, D., Dini, G. & Martinelli, F., 1 Mar 2016, In : IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  46. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticle

  47. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  48. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 21 Feb 2016, p. 38-44.

    Research output: Contribution to conferencePaper

  49. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

    Sgandurra, D. & Lupu, E., 8 Feb 2016, In : ACM Computing Surveys. 48, 3, p. 1-38 38 p., 46.

    Research output: Contribution to journalArticle

  51. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published
  54. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Policy enforcement system for secure interoperable control in distributed Smart Grid systems

    Alcaraz, C., Lopez, J. & Wolthusen, S., 1 Jan 2016, In : Journal of Network and Computer Applications. 59, p. 301-314 14 p.

    Research output: Contribution to journalArticle

  58. Published

    Disjoint difference families and their applications

    Ng, S. & Paterson, M., Jan 2016, In : Designs, Codes and Cryptography. 78, 1, p. 103-127 25 p.

    Research output: Contribution to journalArticle

  59. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016. Springer-Verlag, p. 173-184 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Published

    A Pragmatic System-Failure Assessment and Response Model

    Happa, J., Fairclough, G., Nurse, JRC., Agrafiotis, I., Goldsmith, M. & S, C., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Vol. 1. p. 503-508 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  62. Published

    Bias in the Mifare DESFire EV1 TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., 2016, International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2016). Hancke, G. P. & Markantonakis, K. (eds.). Springer, p. 123-133 11 p. (Lecture Notes in Computer Science; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G., 2016, (Unpublished) 374 p.

    Research output: ThesisDoctoral Thesis

  64. Published

    Cryptographic Tools for Cloud Environments

    Alderman, J., Crampton, J. & Martin, K., 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, Vol. Guide to Security Assurance for Cloud Computing. p. 15-30 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  65. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published
  68. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Mutual Authentication Protocols for RFID Special Schemes

    Abu Ghazalah, S., 2016, (Unpublished) 181 p.

    Research output: ThesisDoctoral Thesis

  71. Unpublished

    On the use of Attribute-based Encryption in Publicly Verifiable Outsourced Computation

    Alderman, J., 2016, (Unpublished) 277 p.

    Research output: ThesisDoctoral Thesis

  72. Unpublished

    On the Verification of Computation and Data Retrievability

    Janson, C., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  73. Unpublished

    Platform Verification and Secure Program Execution in Embedded Devices

    Msgna, M., 2016, (Unpublished) 184 p.

    Research output: ThesisDoctoral Thesis

  74. Forthcoming

    Resiliency Policies in Access Control Revisited

    Crampton, J., Gutin, G. & Watrigant, R., 2016, (Accepted/In press) Proceedings of 21st ACM Symposium on Access Control Models and Technologies (SACMAT 2016). ACM

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    Towards Automated Android App Collusion Detection

    AsǍvoae, I. M., Blasco, J., Chen, T. M., Kalutarage, H. K., Muttik, I., Nguyen, H. N., Roggenbach, M. & Shaikh, S. A., 2016, p. 29-37. 9 p.

    Research output: Contribution to conferencePaper

  76. 2015
  77. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Multilinear Maps from Obfuscation

    Albrecht, M., Farshim, P., Hofheinz, D., Larraia de Vega, E. & Paterson, K., 19 Dec 2015, Theory of Cryptography. Kushilevitz, E. & Malkin, T. (eds.). Springer, Vol. 9562. p. 446-473 27 p. (Lecture Notes in Computer Science; vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Bow ties are cool: an evening at the IISS with Toomas Hendrik Ilves

    Robinson, N. & Haggman, A., 3 Dec 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  84. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. E-pub ahead of print

    Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and their Countermeasures

    Akram, R., Markantonakis, K. & Sauveron, D., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). Yan, Z. & Mueller, P. (eds.). Helsinki, Finland: IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Critical visualization: a case for rethinking how we visualize risk and security

    Hall, P., Heath, C. & Coles-Kemp, L., 1 Dec 2015, In : Journal of Cybersecurity. 1, 1, p. 93-108 16 p.

    Research output: Contribution to journalArticle

  87. Published

    Security in Swarm Robotics

    Laing, T., Martin, K., Ng, S. & Tomlinson, A., Dec 2015, Handbook of Research on Design, Control, and Modeling of Swarm Robotics. Tan, Y. (ed.). IGI Global, p. 42-66 25 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  88. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  90. Published

    Algebraic Cryptanalysis and RFID Authentication

    Cid, C., Ferreira, L., Procter, G. & Robshaw, M., 21 Nov 2015, The 11th Workshop on RFID Security - RFIDSec 2015. Springer, p. 104-121 18 p. (Lecture Notes in Computer Science; vol. 9440).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. & Markantonakis, K., 18 Nov 2015, 20th European Symposium on Research in Computer Security (ESORICS 2015). Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Akram, R. N., Markantonakis, K. & Sauveron, D., 10 Nov 2015, In : Journal of Information Science. 321, p. 150–161 12 p.

    Research output: Contribution to journalArticle

  93. Published

    Let’s Get Mobile: Secure FOTA for Automotive System

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 6 Nov 2015, Network and System Security. Springer, Vol. 9408. p. 503-510 8 p. (Lecture Notes in Computer Science; vol. 9408).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Investigation into the effects of transmission-channel fidelity loss in RGBD sensor data for SLAM

    Wetherall, J., Taylor, M. & Hurley-Smith, D., 2 Nov 2015, 2015 International Conference on Systems, Signals and Image Processing (IWSSIP). IEEE, p. 81-84 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Ships, Brooms and the End of Humanity

    Haggman, A., 17 Oct 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  97. Published

    Addressing Threats to Real-World Identity Management Systems

    Li, W. & Mitchell, C., 16 Oct 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Reimer, H., Pohlmann, N. & Schneider, W. (eds.). Wiesbaden: Springer Vieweg, p. 251-259 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  99. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In : Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticle

  100. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In : Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issue

  101. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C., Oct 2015, In : Journal of Cryptology. 28, 4, p. 769–795 27 p.

    Research output: Contribution to journalArticle

  102. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 3 4 5 6 7 8 ...20 Next