1. 2020
  2. Published

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., Jan 2020, In: IEEE Transactions on Industrial Informatics. 16, 1, p. 691-702 12 p.

    Research output: Contribution to journalArticlepeer-review

  3. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2020, (Submitted).

    Research output: Working paper

  4. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Unpublished

    Advancements in Proxy Re-Encryption: Defining Security for wider Applications

    Lee, E., 2020, (Unpublished) 221 p.

    Research output: ThesisDoctoral Thesis

  6. Unpublished

    An Analysis of Primality Testing and Its Use in Cryptographic Applications

    Massimo, J., 2020, (Unpublished) 209 p.

    Research output: ThesisDoctoral Thesis

  7. Unpublished

    Building and breaking encrypted search schemes for ordered data

    Lacharite, M-S., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  8. Unpublished

    Cryptanalysis and Applications of Lattice-based Encryption Schemes

    Curtis, B., 2020, (Unpublished) 220 p.

    Research output: ThesisDoctoral Thesis

  9. Unpublished

    Cryptographic Security of SSH Encryption Schemes

    Hansen, T., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  10. Published

    Cryptography: The Key to Digital Security, How it Works, and Why it Matters

    Martin, K. M., 2020, New York: W.W. Norton. 320 p.

    Research output: Book/ReportBook

  11. Published

    Digital Identity: Ground-up Perspectives

    Coles-Kemp, L. & Heath, C. P. R., 2020, 46 p.

    Research output: Book/ReportBook

  12. Unpublished
  13. Forthcoming

    Estonia: From the Bronze Night to Cybersecurity Pioneers

    Hardy, A. & Robinson, N., 2020, (Accepted/In press) The Routledge Companion to Global Cyber Security.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    Modelling Digital Banking Attackers – Attacker-Centric Approaches in Security

    Moeckel, C., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  16. Published
  17. Unpublished

    Security and Privacy in Emerging Communication Standards

    Khan, H., 2020, (Unpublished) 175 p.

    Research output: ThesisDoctoral Thesis

  18. Unpublished

    Techniques for the Automation of the Heap Exploit Synthesis Pipeline

    Repel, D., 2020, (Unpublished) 241 p.

    Research output: ThesisDoctoral Thesis

  19. Published

    The Handbook of Displacement

    Adey, P., Bowstead, J., Brickell, K., Desai, V., Dolton, M., Pinkerton, A. & Siddiqi, A., 2020, Palgrave Macmillan.

    Research output: Book/ReportAnthology

  20. In preparation

    The Way We Evacuate: emergency, reproduction and the aesthetics of mobility

    Adey, P., 2020, (In preparation) Duke University Press.

    Research output: Book/ReportBook

  21. Unpublished

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  22. Unpublished

    Variants of Group Signatures and Their Applications

    Garms, L., 2020, (Unpublished)

    Research output: ThesisDoctoral Thesis

  23. Unpublished

    Variants of LWE: Reductions, Attacks and a Construction

    Deo, A., 2020, (Unpublished) 179 p.

    Research output: ThesisDoctoral Thesis

  24. Unpublished

    Vulnerability Analysis of Power System State Estimation

    Gul, A., 2020, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  25. 2019
  26. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Catch Me (On Time) If You Can: Understanding the Effectiveness of Twitter URL Blacklists

    Bell, S., Paterson, K. & Cavallaro, L., 5 Dec 2019, arXiv.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

Previous 12 3 4 5 6 7 8 9 ...85 Next