1. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Editorial

    Tomlinson, A., 2007, In : Information Security Technical Report. 12, 3, p. 111-112 2 p.

    Research output: Contribution to journalEditorial

  5. Published

    Editorial response: The value of critical Geopolitics & critical security studies

    Robinson, N., Hardy, A. & Wendt, N., 18 Sep 2018, RHUL Geopolitics & Security.

    Research output: Other contribution

  6. Published

    e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies

    Balfe, S. & Paterson, K. G., 2008, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008). Xu, S., Nita-Rotaru, C. & Seifert, J. P. (eds.). ACM, p. 81-92 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Effective maritime cybersecurity regulation – the case for a cyber code

    Hopcraft, R. & Martin, K., 11 Sep 2018, In : Journal of the Indian Ocean Region. 14, 3, p. 354-366 13 p.

    Research output: Contribution to journalSpecial issue

  9. Published

    Effectiveness of security by admonition: a case study of security warnings in a web browser setting

    Seifert, C., Welch, I. & Komisarczuk, P., 2006, In : secure Magazine. 1, 9

    Research output: Contribution to journalArticle

  10. Published

    Effects of noise on quantum error correction algorithms

    Barenco, A., Brun, T. A., Schack, R. & Spiller, T. P., 1997, In : Physical Review A. 56, p. 1177-1188 12 p.

    Research output: Contribution to journalArticle

  11. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, p. 226-229. 4 p.

    Research output: Contribution to conferencePaper

  13. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Efficient Attack Graph Analysis through Approximate Inference

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E., 11 Aug 2017, In : ACM Transactions on Information and System Security. 20, 3, p. 1-30 30 p., 10.

    Research output: Contribution to journalArticle

  15. Published

    Efficient Attack Graph Analysis through Approximate Inference (ArXiv)

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. C., 22 Jun 2016, In : ArXiv.org.

    Research output: Contribution to journalArticle

  16. Published

    Efficient Automata-Driven Pattern-Matching for Equational Programs

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1999, In : Softw., Pract. Exper.. 29, 9, p. 793-813 21 p.

    Research output: Contribution to journalArticle

  17. Published

    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards

    Birkett, J., Dent, A. W., Neven, G. & Schuldt, J. C. N., 2007, Information Security and Privacy: 12th Australasian Conference -- ACISP 2007. Pieprzyk, J., Ghodosi, H. & Dawson, E. (eds.). Springer-Verlag, p. 274-292 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Efficient Constructions for One Sharing of Many Secrets

    Martin, K. M. & Jackson, W-A., 1996, In : Australasian Journal of Combinatorics. 14, p. 283-296 14 p.

    Research output: Contribution to journalArticle

  20. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  21. Published

    Efficient Decoding Algorithms for Generalised Reed-Muller Codes

    Paterson, K. G. & Jones, A. E., 2000, In : IEEE Transactions on Communications. 48, 8, p. 1272-1285 14 p.

    Research output: Contribution to journalArticle

  22. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Efficient identity-based signatures secure in the standard model

    Paterson, K. G. & Schuldt, J. C. N., 2006, ACISP 2006. Batten, L. M. & Safavi-Naini, R. (eds.). Springer, p. 207-222 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  24. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaper

  25. Published

    Efficient KEMs with Partial Message Recovery

    Bjørstad, T. E., Dent, A. W. & Smart, N. P., 2007, Cryptography and Coding -- 11th IMA International Conference. Galbraith, S. D. (ed.). Springer-Verlag, p. 233-256 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    Efficient key predistribution for grid-based wireless sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., 2008, Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Efficient Multiplicative Sharing Schemes

    Blackburn, S. R., Burmester, M., Desmedt, Y. & Wild, P. R., 1996, Advances in Cryptology -- EUROCRYPT '96. Maurer, U. (ed.). Berlin: Springer, p. 107-118 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  28. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2008, ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    Efficient Secret Sharing without a Mutually Trusted Authority

    Jackson, W-A., Martin, K. M. & O'Keefe, C. M., 1995, Advances in Cryptology: Eurocrypt '95. Springer, Vol. 921. p. 183-193 11 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Efficient state preparation for a register of quantum bits

    Soklakov, A. N. & Schack, R., 2006, In : Physical Review A. 73, p. 012307 1 p.

    Research output: Contribution to journalArticle

  33. E-pub ahead of print

    Efficient, XOR-Based, Ideal (t,n)− threshold Schemes

    Chen, L., Laing, T. & Martin, K., 28 Oct 2016, Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052. p. 467-483 17 p. (Lecture Notes in Computer Science; vol. 10052).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Emergency Mobilities

    Adey, P., 25 Jan 2016, In : Mobilities. 11, 1, p. 32-48 17 p.

    Research output: Contribution to journalArticle

  37. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Enabling Fair ML Evaluations for Security

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 8 Oct 2018, p. 2264-2266. 3 p.

    Research output: Contribution to conferencePoster

  39. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In : Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticle

  40. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Submitted

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Robinson, N. & Butler-Rees, A., 1 Jul 2019, (Submitted) In : Emotion, Space and Society.

    Research output: Contribution to journalArticle

  42. Published

    Encyclopedia of Cyber Warfare

    Springer, P. J. (ed.) & Repel, D., 2017, Encyclopedia of Cyber Warfare. 1 ed. ABC-Clio, p. 51-52 2 p.

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  43. Published

    End-to-end Cryptographic Security Systems for Payments

    Cid, C., Jan 2011, E-finance & Payments Law & Policy newsletter, 5, 01.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  44. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T., 2018, (Unpublished) 201 p.

    Research output: ThesisDoctoral Thesis

  52. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaper

  57. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. & Markantonakis, K., 18 Nov 2015, 20th European Symposium on Research in Computer Security (ESORICS 2015). Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Unpublished

    Enhancing the Security of Centralised and Distributed Payments

    Jayasinghe, D., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  61. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Enhancing user privacy using trusted computing

    Gajparia, A. & Mitchell, C. J., 2005, Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 239-250 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  64. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In : ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticle

  65. Published

    Entanglement purification of unknown quantum states

    Brun, T. A., Caves, C. M. & Schack, R., 2001, In : Physical Review A. 63, p. 042309 1 p.

    Research output: Contribution to journalArticle

  66. Published

    Enumerating Boolean functions of cryptographic significance

    Mitchell, C. J., 1990, In : Journal of Cryptology. 2, p. 155-170 16 p.

    Research output: Contribution to journalArticle

  67. Published

    Enumerating Perfect Maps

    Paterson, K. G. & Hoare, P. R., 1995, Cryptography and Coding IV. Farrell, P. G. (ed.). Southend-On-Sea, Essex: Formara Ltd.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  68. Published

    Enumeration of Finite Groups

    Blackburn, S. R., Neumann, P. M. & Venkataraman, G., 2007, Cambridge: Cambridge University Press.

    Research output: Book/ReportBook

  69. Published

    Enumeration within Isoclinism Classes of Groups of Prime Power Order

    Blackburn, S. R., 1994, In : Journal of the London Mathematical Society. 50, p. 293-304 12 p.

    Research output: Contribution to journalArticle

  70. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  71. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In : Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticle

  72. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K., 29 Aug 2017, 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P., 2009, In : Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticle

  76. Published

    Estimate All the {LWE, NTRU} Schemes!

    Albrecht, M. R., Curtis, B. R., Deo, A., Davidson, A., Player, R., Postlethwaite, E. W., Virdia, F. & Wunderer, T., 2018, 17 p. Springer.

    Research output: Other contribution

  77. Forthcoming

    Estonia: From the Bronze Night to Cybersecurity Pioneers

    Hardy, A. & Robinson, N., 2020, (Accepted/In press) The Routledge Companion to Global Cyber Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    Ethernet Services-Service Definition and Market Potential

    Komisarczuk, P. P., 2002, In : Journal of the Communications Network. 1, 3, p. 20-28 9 p.

    Research output: Contribution to journalArticle

  79. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L., 3 Jul 2017, Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 425-435 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. E-pub ahead of print

    Evacuated to Death: The Lexicon, Concept, and Practice of Mobility in the Nazi Deportation and Killing Machine

    Searles-Adey, P., 29 Aug 2019, In : Annals of the Association of American Geographers. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  81. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  82. In preparation

    Evaluating the effectiveness of heuristic worst-case noise analysis in FHE

    Costache, A., Laine, K. & Player, R., 2019, (In preparation) Eprint.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R., 2 Apr 2017, Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  86. Published

    Everyday Cryptography: Fundamental Principles & Applications

    Martin, K., 8 Jun 2017, 2nd ed. Oxford University Press. 720 p.

    Research output: Book/ReportBook

  87. Published

    Evolution of Attacks, Threat Models, and Solutions for Virtualized Systems

    Sgandurra, D. & Lupu, E., 8 Feb 2016, In : ACM Computing Surveys. 48, 3, p. 1-38 38 p., 46.

    Research output: Contribution to journalArticle

  88. Published

    Evolution of support for an on-line information security masters programme

    Martin, K. M., Balfe, S., Coles-Kemp, L. & Ganley, H., 2006, Proceedings of 1st Annual Conference on Education in Information Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  89. Published

    Evolving specification engineering

    Pavlovic, D., Pepper, P. & Smith, D. R., 2008, Proceedings of AMAST 2008. Meseguer, J. & Rosu, G. (eds.). Springer-Verlag, Vol. 5140. p. 299-314 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. E-pub ahead of print

    E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  91. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 23 Mar 2017, In : IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  92. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  93. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Exchangeability and de Finetti's theorem: from probabilities to quantum-mechanical states

    Schack, R., 2004, Bayesian Inference and Maximum Entropy Methods in Science and Engineering: AIP Conference Proceedings Vol.~735. Fischer, R., Preuss, R. & von Toussaint, U. (eds.). Melville, New York: AIP Press, p. 565

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Exchangeability martingales for selecting features in anomaly detection

    Cherubin, G., Baldwin, A. & Griffin, J., Jun 2018, p. 157-170. 14 p.

    Research output: Contribution to conferencePaper

  97. Published

    Existence of good codes with low peak-to-average power ratios

    Paterson, K. G. & Tarokh, V., 2002, Codes, Graphs, and Systems: A Celebration of the Life and Career of G. David Forney. Blahut, R. E. & Koetter, R. (eds.). Kluwer Academic Publishers, p. 187-197 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published
  99. Published

    Experiences of SOLO 1000 in research at the University of Edinburgh

    McGregor, M. S., Tomlinson, A. & Tan, O. K., 1989, Electronics Computer Aided Design. Jones, P. L. & Buckley, A. (eds.). Manchester University Press, p. 182-184 3 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  100. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...21 Next