1. Conference contribution › Research
  2. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Who’s Accessing My Data? Application-Level Access Control for Bluetooth Low Energy

    Sivakumaran, P. & Blasco, J., Sep 2021, Proceedings of the 17th EAI International Conference on Security and Privacy in Communication Networks: SECURECOMM 2021. Springer, p. 252-272 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. F. & Quaglia, E. A., 6 Nov 2019, (E-pub ahead of print) CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, p. 2231-2247 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 1 Nov 2009, CCS '09 Proceedings of the 16th ACM conference on Computer and communications security. New York: ACM, p. 635-647

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, (E-pub ahead of print) ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Other contribution › Research
  11. Published

    A Face Centered Cubic Key Agreement Mechanism for Mobile Ad Hoc Networks

    Askoxylakis, I. G., Markantonakis, K., Tryfonas, T., May, J. & Traganitis, A., 2009, Mobile Lightweight Wireless Systems. Granelli, F., Skianis, C., Chatzimisios, P., Xiao, Y., Redana, S., Akan, O., Bellavista, P., Cao, J., Dressler, F., Ferrari, D., Gerla, M., Kobayashi, H., Palazzo, S., Sahni, S., Shen, X. S., Stan, M., Xiaohua, J., Zomaya, A. & Coulson, G. (eds.). Springer Berlin / Heidelberg, Vol. 13. p. 103-113 11 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  12. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  13. Published

    Classical and quantum structuralism

    Coecke, B., Paquette, É. O. & Pavlovic, D., 2009, Semantical Techniques in Quantum Computation. Gay, S. & Mackie, I. (eds.). Cambridge University Press, p. 29-69 41 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. Published

    Cyber Security Education, Qualifications and Training

    Martin, K. M., 2015, Engineering and Technology Reference. IET

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  15. Published

    Dome, sweet home: climate shelters past, present and future

    Squire, R., Searles-Adey, P. & Jensen, R. B., 23 Nov 2018, Nature.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  16. Published

    Formal Methods

    Walter, C. D., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 135-138 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  17. Published

    Formal Specification and Verification of Software

    Walter, C. D. & Eldridge, S. E., 1991, Concise Encyclopedia of Software Engineering. Morris, D. & Tamm, B. (eds.). Pergamon Press, p. 331-338 8 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  18. Published

    Interfacing with Smart Card Applications (The PC/SC and OpenCard Framework)

    Markantonakis, K., 1999, Interfacing with Smart Card Applications (The PC/ SC and OpenCard Framework). 2 ed. Elsevier, Vol. 4. p. 69 77 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  19. Published

    Leakage from Montgomery Multiplication

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 431-449 19 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  20. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  21. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2011, Encyclopedia of Cryptography and Security (2nd Ed.). Tilborg, H. C. A. V. & Jajodia, S. (eds.). Springer, p. 795-798 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  22. Published

    Montgomery Arithmetic

    Koç, Ç. K. & Walter, C. D., 2005, Encyclopedia of Cryptography and Security. Tilborg, H. C. A. V. (ed.). Springer

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  23. Published

    Partitional Clustering of Malware Using K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2014, Cyberpatterns, Unifying Design Patterns with Security and Attack Patterns. p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  24. Published

    Performance Evaluation of the TUAK algorithm in support of the GSMA and ETSI SAGE standardisation group

    Mayes, K., 31 Oct 2014, Crisp Telecom.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  25. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M., May 2017, (Unpublished) Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  26. Published

    Randomised Exponentiation Algorithms

    Walter, C. D., 2008, Cryptographic Engineering. Koç, Ç. (ed.). Springer, p. 451-473 23 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  27. Published

    Smart Card Technology in the Public Transport Industry: Secure Magazine - The Silicon Trust Report

    Markantonakis, K. & Mayes, K., Feb 2004, Secure Magazine - The Silicon Trust Report. 1 ed. The Silicon Trust, p. 26 29 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution