1. Paper › Research › Not peer-reviewed
  2. Published

    Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks

    Onieva, J. A. (ed.), D., S. (ed.), S., C. (ed.), D., G. (ed.) & Markantonakis, K. (ed.), 2008.

    Research output: Contribution to conferencePaper

  3. Published

    Instant Knowledge: a Secure Mobile Context-Aware Distributed Recommender System

    Helmhout, M., Saunders, C., Tomlinson, A., MacDonald, J. A., Irvine, J. M. & McDiarmid, A., 1 Jun 2009.

    Research output: Contribution to conferencePaper

  4. Published

    Is security a lost cause?

    Mitchell, C. J., May 2010. 8 p.

    Research output: Contribution to conferencePaper

  5. Published

    Misuse cases for an Instant Knowledge system

    Yau, P-W. & Tomlinson, A., 2010.

    Research output: Contribution to conferencePaper

  6. Published

    Mutual Authentication of B3G devices within Personal Distributed Environments

    Billington, K. L. & Tomlinson, A., 1 Oct 2004, p. 452-456. 5 p.

    Research output: Contribution to conferencePaper

  7. Published

    Preserving Privacy in Assistive Technologies

    Goo, S. K., Irvine, J. M., Andonovic, I. & Tomlinson, A., 1 Jun 2009, p. 110 - 115.

    Research output: Contribution to conferencePaper

  8. Published

    Protection of Downloadable Software on SDR Devices

    Gallery, E. & Tomlinson, A., 1 Nov 2005.

    Research output: Contribution to conferencePaper

  9. Published

    Regional Blackouts: Protection of Broadcast Content on 3G Networks

    Dent, A. W. & Tomlinson, A., 1 Oct 2004, p. 442-446. 5 p.

    Research output: Contribution to conferencePaper

  10. Published

    Securing Grid Workflows with Trusted Computing

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 1 Jun 2008, p. 510-519. 10 p.

    Research output: Contribution to conferencePaper

  11. Published

    Security Challenges in the Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A., Goo, S. K. & Irvine, J. M., 1 Sep 2004, p. 3267 - 3270.

    Research output: Contribution to conferencePaper

  12. Published

    Security of Open Satellite TV Receivers

    Markantonakis, K., Tunstall, M. & Mayes, K., Sep 2006.

    Research output: Contribution to conferencePaper

  13. Published

    Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper)

    Goo, S. K., Irvine, J. M., Dunlop, J., Tomlinson, A. & Schwiderski-Grosche, S., 1 Apr 2005, p. 573-581. 9 p.

    Research output: Contribution to conferencePaper

  14. In preparation
  15. Published

    The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks

    Pangalos, P., Chew, K. A., Sattari, N., Tomlinson, A., Atkinson, R., Aghvami, H. & Tafazolli, R., 1 Apr 2005, p. 823-828. 6 p.

    Research output: Contribution to conferencePaper

  16. Published

    Theoretical Analysis of Security Attacks from a Swarm-like Perspective

    George, C., Goo, S. K. & Tomlinson, A., 2011.

    Research output: Contribution to conferencePaper

  17. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  18. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  19. Published
  20. Paper › Research › Peer-reviewed
  21. E-pub ahead of print

    A Certificateless Group Authenticated Key Agreement Protocol for Secure Communication in Untrusted UAV Networks

    Semal, B., Markantonakis, K. & Akram, R. N., 10 Dec 2018, (E-pub ahead of print) p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  22. Published

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 2018, p. 1-15. 15 p.

    Research output: Contribution to conferencePaperpeer-review

  23. Published
  24. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  25. Published
  26. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S., 22 Apr 2018, p. 46-51. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  27. Published
  28. E-pub ahead of print

    A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Oct 2020, (E-pub ahead of print) p. 360-377. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  29. Published

    A Virtual Teams Model for Supporting Maritime Technology Management

    Berner, G., Hopcraft, R., Scanlan, J., Lutzhoft, M. & Earthy, J., 26 Sep 2018, p. 81-86. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  30. Published

    An ethics framework for research into heterogeneous systems

    Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. & Williams, R., 14 Jun 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  31. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, (E-pub ahead of print) p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  32. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, (E-pub ahead of print) p. 496-511. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  33. Published

    Attacker-centric thinking in security: perspectives from financial services practitioners

    Moeckel, C., Aug 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  34. Published

    Bridging the discipline gap: towards improving heritage and computer graphics research collaboration

    Happa, J., Bennett, T., Gogioso, S., Voiculescu, I., Howell, D., Crawford, S., Ulmschneider, K. & Ramsey, C., 6 Nov 2021.

    Research output: Contribution to conferencePaperpeer-review

  35. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Cordeiro De Amorim, R., 2014, p. 334-338. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  36. Published

    Characterising a CPU fault attack model via run-time data analysis

    Kelly, M., Mayes, K. & Walker, J. F., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  37. Published

    Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

    Markiewicz, R. & Sgandurra, D., Aug 2020, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  38. Published

    Comparison of dynamic biometrie security characteristics against other biometrics

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  39. Published

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  40. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review

  41. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  42. E-pub ahead of print

    Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y., Sasaki, Y. & Viguier, B., 27 Oct 2018, (E-pub ahead of print) p. 35-64. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  43. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, (E-pub ahead of print) p. 3-31. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  44. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  45. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, (E-pub ahead of print) p. 226-229. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  46. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  47. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaperpeer-review

  48. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaperpeer-review

  49. E-pub ahead of print

    E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 3 Jun 2019, (E-pub ahead of print) p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  50. Published

    Exchangeability martingales for selecting features in anomaly detection

    Cherubin, G., Baldwin, A. & Griffin, J., Jun 2018, p. 157-170. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  51. Published
  52. E-pub ahead of print

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 6 Apr 2019, (E-pub ahead of print) p. 646-678. 33 p.

    Research output: Contribution to conferencePaperpeer-review

  53. Published

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  54. Published

    Gesture recognition implemented on a personal limited device

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  55. Published

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N., 2018, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  56. Published

    Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli

    Auerbach, B. & Poettering, B., 2018, p. 403-430. 28 p.

    Research output: Contribution to conferencePaperpeer-review

  57. E-pub ahead of print

    High Precision Laser Fault Injection using Low-cost Components

    Kelly, M. & Mayes, K., 25 Dec 2020, (E-pub ahead of print) p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  58. Published

    Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks

    Khan, H., Dowling, B. & Martin, K., 6 Sep 2018, p. 1064-1069. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  59. Published

    Human-Computer Interaction for Security Research: The Case of EU E-Banking Systems

    Moeckel, C. & Faulkner, X., 5 Sep 2011, p. 406-409. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  60. Published

    Hybrid Encryption in a Multi-user Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B., 2018, p. 159-189. 31 p.

    Research output: Contribution to conferencePaperpeer-review

  61. Published

    Implementation of Temporally Aware Behaviour-Based Security in Smart Cards

    Sirett, W. G., Markantonakis, K. & Mayes, K., Nov 2006.

    Research output: Contribution to conferencePaperpeer-review

  62. Published

    Iterative recovery of controllability via maximum matching

    Zhang, S. & Wolthusen, S., 15 Jan 2018, p. 328-333. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  63. Published

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B., 2018, p. 190-218. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  64. E-pub ahead of print

    Leaky Controller: Cross-VM Memory Controller Covert Channel on Multi-Core Systems

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Sep 2020, (E-pub ahead of print) p. 3-16. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  65. E-pub ahead of print

    Lossy Trapdoor Permutations with Improved Lossiness

    Auerbach, B., Kiltz, E., Poettering, B. & Schoenen, S., 3 Feb 2019, (E-pub ahead of print) p. 230-250. 21 p.

    Research output: Contribution to conferencePaperpeer-review

  66. Published

    Making defeating CAPTCHAs harder for bots

    Al-Fannah, N. M., 11 Jan 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  67. E-pub ahead of print

    Malware vs Anti-Malware Battle - Gotta Evade 'em All!

    Chaffey, E. J. & Sgandurra, D., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  68. E-pub ahead of print

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N., 26 Jan 2018, (E-pub ahead of print) p. 142-159. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  69. Published
  70. Published

    New Most Efficient State Recovery Attacks on an eSTREAM Candidate F-FCSR-H v2 and F-FCSR-H Stream Ciphers

    Ali, A., 21 Feb 2011, p. 240--246. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  71. Published

    Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability

    Al-Fannah, N. M. & Li, W., 2017, p. 105-120. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  72. Published

    Notes on GGH13 Without the Presence of Ideals

    Davidson, A., Albrecht, M. & Larraia de Vega, E., 2017, p. 135-158. 24 p.

    Research output: Contribution to conferencePaperpeer-review

  73. Published

    Off-line NFC Tag Authentication

    Saeed, Q. & Walter, C., 2012, p. 730-735.

    Research output: Contribution to conferencePaperpeer-review

  74. E-pub ahead of print

    On Adaptive Attacks against Jao-Urbanik’s Isogeny-Based Protocol

    Basso, A., Kutas, P., Merz, S. P., Petit, C. & Weitkämper, C., 5 Jul 2020, (E-pub ahead of print) p. 195-213. 19 p.

    Research output: Contribution to conferencePaperpeer-review

  75. E-pub ahead of print

    On Index Calculus Algorithms for Subfield Curves

    Galbraith, S. D., Granger, R., Merz, S-P. & Petit, C., 21 Jul 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  76. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  77. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B., 2017, p. 519-534. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  78. E-pub ahead of print

    One Covert Channel to Rule Them All: A Practical Approach to Data Exfiltration in the Cloud

    Semal, B., Markantonakis, K., Mayes, K. & Kalbantner, J., 9 Feb 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  79. Published

    One leak will sink a ship: WebRTC IP address leaks

    Al-Fannah, N. M., 7 Dec 2017, p. 1-5. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  80. E-pub ahead of print

    One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols

    Kutas, P., Merz, S-P., Petit, C. & Weitkämper, C., 16 Jun 2021, (E-pub ahead of print) p. 242-271. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  81. E-pub ahead of print

    Performance Evaluation and Optimisation for Kyber on the MULTOS IoT Trust-Anchor

    Mayes, K., 10 Sep 2020, (E-pub ahead of print) p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  82. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A., 21 Feb 2016, p. 38-44.

    Research output: Contribution to conferencePaperpeer-review

  83. Published

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K., 23 Apr 2017, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  84. Published

    Privacy-certification standards for extended-reality devices and services

    Happa, J., Steed, A. & Glencross, M., Mar 2021.

    Research output: Contribution to conferencePaperpeer-review

  85. Unpublished

    Researching Sensitive HCI Aspects in Information Security: Experiences from Financial Services (position paper)

    Moeckel, C., 4 May 2019, (Unpublished).

    Research output: Contribution to conferencePaperpeer-review

  86. Published

    Re-thinking the care of male prisoners who self-harm

    Neave, S., Glorney, E. & Coles-Kemp, L., 19 Jun 2018.

    Research output: Contribution to conferencePaperpeer-review

  87. Published

    Return-Oriented Programming on RISC-V

    Jaloyan, G-A., Markantonakis, K., Akram, R. N., Robin, D., Mayes, K. & Naccache, D., Oct 2020, p. 471-480. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  88. E-pub ahead of print

    Secure Shared Processing on a Cluster of Trust-Anchors

    Mayes, K., 31 Oct 2020, (E-pub ahead of print) p. 968-984. 17 p.

    Research output: Contribution to conferencePaperpeer-review

  89. Published

    Secure virtual disk images for grid computing

    Gebhardt, C. & Tomlinson, A., Oct 2008, p. 19-29. 11 p.

    Research output: Contribution to conferencePaperpeer-review

  90. Published

    Security, privacy and safety evaluation of dynamic and static fleets of drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S., 9 Nov 2017, p. 1-12. 12 p.

    Research output: Contribution to conferencePaperpeer-review

  91. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  92. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  93. Published

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B., 2018, p. 344-361. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  94. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  95. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., Apr 2009, p. 307- 312.

    Research output: Contribution to conferencePaperpeer-review

  96. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaperpeer-review

  97. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  98. Published

    The Mobile Java Card Grid Project: 7th Edition of e-smart conference and demos

    Chaumette, S., Markantonakis, K., Mayes, K. & Sauveron, D., Sep 2006.

    Research output: Contribution to conferencePaperpeer-review

  99. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaperpeer-review

  100. Published

    Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

    Tomlinson, A. & Yap, J. Y., 14 Jul 2013, p. 39-45. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  101. Published

    Threat modeling approaches and tools for securing architectural designs of an e-banking application

    Moeckel, C. & Abdallah, A. E., 14 Oct 2010, p. 149-154. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  102. Published

    Time Accuracy De-Synchronisation Attacks Against IEC 60870-5-104 and IEC 61850 Protocols

    Wright, J. & Wolthusen, S. D., 8 Aug 2019, p. 1-5. 5 p.

    Research output: Contribution to conferencePaperpeer-review