1. Paper › Research › Peer-reviewed
  2. E-pub ahead of print

    A Study on Microarchitectural Covert Channel Vulnerabilities in Infrastructure-as-a-Service

    Semal, B., Markantonakis, K., Akram, R. N. & Kalbantner, J., 14 Oct 2020, (E-pub ahead of print) p. 360-377. 18 p.

    Research output: Contribution to conferencePaperpeer-review

  3. Published

    A Virtual Teams Model for Supporting Maritime Technology Management

    Berner, G., Hopcraft, R., Scanlan, J., Lutzhoft, M. & Earthy, J., 26 Sep 2018, p. 81-86. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  4. Published

    An ethics framework for research into heterogeneous systems

    Happa, J., Nurse, J. R. C., Goldsmith, M., Creese, S. & Williams, R., 14 Jun 2018, p. 1-8. 8 p.

    Research output: Contribution to conferencePaperpeer-review

  5. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, (E-pub ahead of print) p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  6. E-pub ahead of print

    Another Look at Some Isogeny Hardness Assumptions

    Merz, S-P., Minko, R. & Petit, C., 14 Feb 2020, (E-pub ahead of print) p. 496-511. 16 p.

    Research output: Contribution to conferencePaperpeer-review

  7. Published

    Attacker-centric thinking in security: perspectives from financial services practitioners

    Moeckel, C., Aug 2020, p. 1-10. 10 p.

    Research output: Contribution to conferencePaperpeer-review

  8. Published

    Bridging the discipline gap: towards improving heritage and computer graphics research collaboration

    Happa, J., Bennett, T., Gogioso, S., Voiculescu, I., Howell, D., Crawford, S., Ulmschneider, K. & Ramsey, C., 6 Nov 2021.

    Research output: Contribution to conferencePaperpeer-review

  9. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Cordeiro De Amorim, R., 2014, p. 334-338. 5 p.

    Research output: Contribution to conferencePaperpeer-review

  10. Published

    Characterising a CPU fault attack model via run-time data analysis

    Kelly, M., Mayes, K. & Walker, J. F., 2017, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  11. Published

    Clust-IT: Clustering-Based Intrusion Detection in IoT Environments

    Markiewicz, R. & Sgandurra, D., Aug 2020, p. 1-9. 9 p.

    Research output: Contribution to conferencePaperpeer-review

  12. Published

    Comparison of dynamic biometrie security characteristics against other biometrics

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 2017, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  13. Published

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K., 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  14. Published

    Countermeasures for attacks on satellite TV cards using open receivers

    Francis, L., Sirett, W. G., Mayes, K. & Markantonakis, K., 2005, p. 153--158.

    Research output: Contribution to conferencePaperpeer-review

  15. E-pub ahead of print

    Cryptanalysis of an oblivious PRF from supersingular isogenies

    Basso, A., Kutas, P., Merz, S-P., Petit, C. & Sanso, A., 2021, (E-pub ahead of print).

    Research output: Contribution to conferencePaperpeer-review

  16. E-pub ahead of print

    Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y., Sasaki, Y. & Viguier, B., 27 Oct 2018, (E-pub ahead of print) p. 35-64. 30 p.

    Research output: Contribution to conferencePaperpeer-review

  17. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, (E-pub ahead of print) p. 3-31. 29 p.

    Research output: Contribution to conferencePaperpeer-review

  18. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  19. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, (E-pub ahead of print) p. 226-229. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  20. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  21. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaperpeer-review

  22. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaperpeer-review

  23. E-pub ahead of print

    E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 3 Jun 2019, (E-pub ahead of print) p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  24. Published

    Exchangeability martingales for selecting features in anomaly detection

    Cherubin, G., Baldwin, A. & Griffin, J., Jun 2018, p. 157-170. 14 p.

    Research output: Contribution to conferencePaperpeer-review

  25. Published
  26. E-pub ahead of print

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 6 Apr 2019, (E-pub ahead of print) p. 646-678. 33 p.

    Research output: Contribution to conferencePaperpeer-review