1. 2017
  2. Unpublished

    Risk Perception and Attitude in Information Security Decision-making

    Mersinas, K., 2017, (Unpublished) 291 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  4. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Unpublished

    Security and Privacy Aspects of Automotive Systems

    Mansor, H., 2017, (Unpublished) 208 p.

    Research output: ThesisDoctoral Thesis

  6. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I., 2017, In: Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Website Fingerprinting Defenses at the Application Layer

    Cherubin, G., Hayes, J. & Juarez, M., 2017, In: Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 18 p.

    Research output: Contribution to journalArticlepeer-review

  14. 2016
  15. Published

    Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 31 Dec 2016, In: International Journal on Advances in Security. 9, 3&4, p. 158-168 11 p.

    Research output: Contribution to journalArticlepeer-review

  16. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Are information security professionals expected value maximizers? An experiment and survey-based test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 22 Dec 2016, In: Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Limitations of IEC62351-3's public key management

    Wright, J. & Wolthusen, S., 19 Dec 2016, 2016 IEEE 24th International Conference on Network Protocols (ICNP). IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P., 14 Dec 2016, In: IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  20. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Connectivity, Communications and Technology

    Haggman, A., 7 Dec 2016, International Relations. McGlinchey, S. (ed.). E-International Relations, p. 135-143 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  23. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.), Dec 2016, Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  24. Published

    Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals

    Ibrahim, S., Dec 2016, In: International Journal of Law, Crime and Justice. 47, p. 44-57 14 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    You can’t touch this: Consumer-centric android application repackaging detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K., Dec 2016, In: Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Causes of socioeconomic cybercrime in Nigeria

    Ibrahim, S., 18 Nov 2016, 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE Xplore, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  27. Published

    How to stay in.eu: A post-Brexit gift from Estonia and an evening inside its Embassy

    Hardy, A., Robinson, N. & Haggman, A., 18 Nov 2016, RHUL Geopolitics & Security.

    Research output: Other contribution

  28. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031. p. 191-219 29 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. E-pub ahead of print

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D., 2 Nov 2016, Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074. p. 160-186 27 p. (Lecture Notes in Computer Science; vol. 10074).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K., 1 Nov 2016, In: International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    On the Security of 2-Key Triple DES

    Mitchell, C. J., Nov 2016, In: IEEE Transactions on Information Theory. 62, 11, p. 6260-6267 8 p.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. E-pub ahead of print

    Efficient, XOR-Based, Ideal (t,n)− threshold Schemes

    Chen, L., Laing, T. & Martin, K., 28 Oct 2016, Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052. p. 467-483 17 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L., 28 Oct 2016, ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Graph-theoretic design and analysis of key predistribution schemes

    Kendall, M. & Martin, K., Oct 2016, In: Designs, Codes and Cryptography. 81, 1, p. 11-34 24 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M., Oct 2016, In: ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p., 8.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Password Generators: Old Ideas and New

    AL Maqbali, F. & Mitchell, C., 17 Sep 2016, Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  41. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Automated Dynamic Analysis of Ransomware: Benefits, Limitations and use for Detection

    Sgandurra, D., Muñoz-González, L., Mohsen, R. & Lupu, E. C., 10 Sep 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  43. Published

    A survey of wearable biometric recognition systems

    Blasco, J., Chen, T. M., Tapiador, J. & Peris-Lopez, P., 1 Sep 2016, In: ACM Computing Surveys. 49, 3, 43.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L., 4 Aug 2016, Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J., Aug 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814. p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    The regulatory challenges of Australian information security practice

    Burdon, M., Siganto, J. & Coles-Kemp, L., Aug 2016, In: Computer Law and Security Review. 32, 4, p. 623-633 11 p.

    Research output: Contribution to journalArticlepeer-review

  50. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J., 17 Jul 2016, Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Challenges in standardising cryptography

    Mitchell, C. J., 1 Jul 2016, In: International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., Jul 2016, In: Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A., 29 Jun 2016, In: Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  56. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In: ArXiv.org.

    Research output: Contribution to journalArticle

  57. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 13 Jun 2016, Workshop on the Economics of Information Security. 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. E-pub ahead of print

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J., 12 Jun 2016, Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Challenges of security and trust of mobile devices as digital avionics component

    Akram, R. & Markantonakis, K., 9 Jun 2016, Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J., 3 Jun 2016, 4 p.

    Research output: Working paper

  63. Published

    Securing Autonomous Networks through Virtual Closure

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Jun 2016, In: International Journal of Intelligent Computing Research (IJICR). 7, 2, p. 694-705 12 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R., 30 May 2016, CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 12 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    The Navigation Metaphor in Security Economics

    Pieters, W., Barendse, J., Ford, M., Heath, C., Probst, C. W. & Verbij, R., 25 May 2016, In: IEEE Security and Privacy Magazine. 14, 3, p. 14-21 8 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Unpublished

    Analysis and Classification of Android Malware

    Tam, K., 18 May 2016, (Unpublished) 197 p.

    Research output: ThesisDoctoral Thesis

  68. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S., 18 May 2016, Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578. p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Two Rounds RFID Grouping-Proof Protocol

    Abu Ghazalah, S. & Markantonakis, K., 3 May 2016, p. 193-203. 11 p.

    Research output: Contribution to conferencePaperpeer-review

  70. Published

    Polly Cracker, revisited

    Albrecht, M., Faugere, J-C., Farshim, P., Herold, G. & Perret, L., May 2016, In: Designs, Codes and Cryptography. 79, 2, p. 261-302 42 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K., 28 Apr 2016, Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. E-pub ahead of print

    Physical punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S., 22 Apr 2016, International Journal of Human Rights and Constitutional Studies. 1 ed. Inderscience, Vol. 4. p. 54-74 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  73. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I., 17 Apr 2016, Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653. p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S., 2 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572. p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K., 18 Mar 2016, The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p. (Lecture Notes in Computer Science ; vol. 9100)(Security and Cryptology - sub series ).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. E-pub ahead of print

    Diary of a Plastic Soldier (extracts)

    Thornton, P., 10 Mar 2016, In: Critical Military Studies. 2, 1-2, p. 137-138 2 p.

    Research output: Contribution to journalSpecial issuepeer-review

  79. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Privacy, compliance and the cloud

    Mitchell, C. J., 9 Mar 2016, Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, p. 3-14 12 p. (» Computer Communications and Networks).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention

    Saracino, A., Sgandurra, D., Dini, G. & Martinelli, F., 1 Mar 2016, In: IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Crime, Regulation and Control During the Blitz: Protecting the Population of Bombed Cities

    Adey, P., Cox, D. J. & Godfrey, B., Mar 2016, Bloomsbury Academic. 272 p. (History of Crime Deviance and Punishment)

    Research output: Book/ReportBook

  83. Published

    Using Visualizations to Enhance Users' Understanding of App Activities on Android Devices

    Eze, C., Nurse, JRC. & Happa, J., Mar 2016, In: Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 7, p. 39-57 19 p., 1.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A., 23 Feb 2016, Ludic Geopolitics Blog.

    Research output: Other contribution

  85. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 21 Feb 2016, p. 38-44.

    Research output: Contribution to conferencePaperpeer-review

  86. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

    Sgandurra, D. & Lupu, E., 8 Feb 2016, In: ACM Computing Surveys. 48, 3, p. 1-38 38 p., 46.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published
  91. Published

    Emergency Mobilities

    Adey, P., 25 Jan 2016, In: Mobilities. 11, 1, p. 32-48 17 p.

    Research output: Contribution to journalArticlepeer-review

  92. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. E-pub ahead of print

    Cryptographic Enforcement of Information Flow Policies Without Public Information

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B., 9 Jan 2016, 13th International Conference on Applied Cryptography and Network Security (ACNS 2015) . Malkin, T., Kolesnikov, V., Bishop Lewko, A. & Polychronakis, M. (eds.). p. 389-408 20 p. (Lecture Notes in Computer Science; vol. 9092).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Policy enforcement system for secure interoperable control in distributed Smart Grid systems

    Alcaraz, C., Lopez, J. & Wolthusen, S., 1 Jan 2016, In: Journal of Network and Computer Applications. 59, p. 301-314 14 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    Disjoint difference families and their applications

    Ng, S-L. & Paterson, M. B., Jan 2016, In: Designs, Codes and Cryptography. 78, p. 103-127 25 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    Universal Mobile Telecommunications System (UMTS); LTE; Performance evaluation of the Tuak algorithm set

    Mayes, K., Jan 2016, ETSI TR 135 935: Technical Report.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R., 2016, Algorithmic Aspects in Information and Management: AAIM 2016. Springer-Verlag, p. 173-184 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  99. Published

    A Pragmatic System-Failure Assessment and Response Model

    Happa, J., Fairclough, G., Nurse, JRC., Agrafiotis, I., Goldsmith, M. & S, C., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Vol. 1. p. 503-508 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Unpublished

    Approximation of Controllability Graphs via Power Dominating Set

    Alwasel, B., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  101. Published

    Bias in the Mifare DESFire EV1 TRNG

    Hurley-Smith, D. & Hernandez-Castro, J., 2016, International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2016). Hancke, G. P. & Markantonakis, K. (eds.). Springer, p. 123-133 11 p. (Lecture Notes in Computer Science; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Blurred lines: intimacy, mobility, and the social military

    Adey, P., Denney, D., Jensen, R. & Pinkerton, A., 2016, In: Critical Military Studies. 2, 1-2, p. 7-24 18 p.

    Research output: Contribution to journalArticlepeer-review

Previous 12 3 4 5 6 7 8 9 ...21 Next