1. 2019
  2. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, p. 189-205. 17 p.

    Research output: Contribution to conferencePaper

  3. Published

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 16 Sep 2019, IEEE Security & Privacy . IEEE Press, p. 1067-1083 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 2 Sep 2019, (Accepted/In press) Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  7. E-pub ahead of print

    The significance of securing as a critical component of information security: An Australian narrative

    Burdon, M. & Coles-Kemp, L., 28 Aug 2019, In : Computers and Security. 87, p. 1-10 10 p., 101601.

    Research output: Contribution to journalArticle

  8. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 25 Aug 2019, (Accepted/In press) 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. E-pub ahead of print

    Intrusion Detection in Robotic Swarms

    Sargeant, I. & Tomlinson, A., 24 Aug 2019, Proceedings of SAI Intelligent Systems Conference. Bi, Y., Bhatia, R. & Kapoor, S. (eds.). Springer, Vol. 2. p. 968-980 13 p. (Advances in Intelligent Systems and Computing; vol. 1038).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Forthcoming

    A Game of “Cut and Mouse”: Bypassing Antivirus by Simulating User Inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 23 Aug 2019, (Accepted/In press) The Annual Computer Security Applications Conference (ACSAC). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaper

  14. Forthcoming

    Algebraic Cryptanalysis of STARK-Friendly Designs: Application to MARVELlous and MiMC

    Albrecht, M., Cid, C., Grassi, L., Khovratovich, D., Lüftenegger, R., Rechberger, C. & Schofnegger, M., 15 Aug 2019, (Accepted/In press) ASIACRYPT 2019. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  16. Forthcoming

    Quantum Algorithms for the Approximate k-List Problem and their Application to Lattice Sieving

    Kirshanova, E., Mårtensson, E., Postlethwaite, E. & Roy Moulik, S., 15 Aug 2019, (Accepted/In press) Advances in Cryptology -- ASIACRYPT 2019: 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  18. Forthcoming

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 2 Aug 2019, (Accepted/In press) Central European Cybersecurity Conference 2019. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, p. 3-31. 29 p.

    Research output: Contribution to conferencePaper

  20. Published
  21. Published

    Sonification to Support the Monitoring Tasks of Security Operations Centres

    Axon, L., Happa, J., van Rensburg, A. J., Goldsmith, M. & Creese, S., 29 Jul 2019, In : IEEE Transactions on Dependable and Secure Computing. p. 1-17 17 p.

    Research output: Contribution to journalArticle

  22. Published
  23. Forthcoming

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 20 Jul 2019, (Accepted/In press).

    Research output: Working paper

  24. E-pub ahead of print

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Berners-Lee, E., 20 Jul 2019, Lecture Notes in Computer Science. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  26. Submitted

    Encountering precarity, uncertainty and everyday anxiety as part of the postgraduate research journey

    Robinson, N. & Butler-Rees, A., 1 Jul 2019, (Submitted) In : Emotion, Space and Society.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...77 Next