1. 2015
  2. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs (ArXiv)

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E., 8 Oct 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  3. Published

    On the concrete hardness of Learning with Errors

    Albrecht, M., Player, R. & Scott, S., 2 Oct 2015, In : Journal of Mathematical Cryptology. 9, 3, p. 169–203 35 p.

    Research output: Contribution to journalArticle

  4. Published

    The meaning of light: seeing and being on the battlefield

    Thornton, P., 1 Oct 2015, In : Cultural Geographies. 22, 4, p. 567-583 17 p.

    Research output: Contribution to journalSpecial issue

  5. Published

    On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes

    Procter, G. & Cid, C., Oct 2015, In : Journal of Cryptology. 28, 4, p. 769–795 27 p.

    Research output: Contribution to journalArticle

  6. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R., 13 Sep 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Examining the Contribution of Critical Visualisation to Information Security

    Hall, P., Heath, C., Coles-Kemp, L. & Tanner, A., 8 Sep 2015, Proceedings of NSPW 2015. ACM, p. 59-72 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. E-pub ahead of print

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis

    Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 7 Sep 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Binary Model of Broken Home: Parental Death-Divorce Hypothesis of Male Juvenile Delinquency in Nigeria and Ghana

    Ibrahim, S., 3 Sep 2015, Contemporary Perspectives in Family Research. Blair, S. L. & Maxwell, S. R. (eds.). New York: Emerald Publishing, Vol. 9. p. 311-340 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  11. Published

    Risk analysis of Android applications: A user-centric solution

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Sep 2015, In : Future Generation Computer Systems.

    Research output: Contribution to journalArticle

  12. Published

    Cyber risks to governance, Part I: Silk Road: resisting and reshaping governance

    Haggman, A., 20 Aug 2015, Strife Blog.

    Research output: Other contribution

  13. Published

    The Problem with Curtains: Public Attitudes to Encryption and the Dilemma they Create

    Haggman, A., 19 Aug 2015.

    Research output: Contribution to conferencePaper

  14. Published

    Detection of repackaged mobile applications through a collaborative approach

    Aldini, A., Martinelli, F., Saracino, A. & Sgandurra, D., 10 Aug 2015, In : Concurrency Computation. 27, 11, p. 2818-2838 21 p.

    Research output: Contribution to journalArticle

  15. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  16. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Guenther, F., Paterson, K. & Marson, G. A., 1 Aug 2015, Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    The Pythia PRF Service

    Everspaugh, A., Chatterjee, R., Juels, A., Scott, S. & Ristenpart, T., Aug 2015, Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association, p. 547 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

    Garman, C., Paterson, K. & Van Der Merwe, T., Jul 2015, USENIX Security 2015. USENIX Association, p. 113-128

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    e-Residency takes another enormous step by moving fully digital

    Robinson, N., 18 Jun 2015, RHUL Geopolitics & Security

    Research output: Other contribution

  22. Published

    Taking Stock of Cyber Deterrence

    Haggman, A., 18 Jun 2015, Future Foreign Policy.

    Research output: Other contribution

  23. Published

    Cyber Weapons as a Game Changer: A Critical Reflection

    Haggman, A., 9 Jun 2015, E-International Relations.

    Research output: Other contribution

  24. Published

    Cyber Weapons Don't Go Boom

    Haggman, A., 9 Jun 2015, 1 p. Information Security Group.

    Research output: Other contribution

  25. Published

    On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

    Crampton, J., Morisset, C. & Zannone, N., 1 Jun 2015, 20th ACM Symposium on Access Control Models and Technologies. ACM, p. 99-109 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In : ArXiv.org.

    Research output: Contribution to journalArticle

  28. Published

    Authentication based on a changeable biometric using gesture recognition with the Kinect™

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K., 22 May 2015, The 8th IAPR International Conference on Biometrics (ICB) 2015. Phuket : IEEE, p. 38-45 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  29. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Access Control in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Ciphers for MPC and FHE

    Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T. & Zohner, M., 14 Apr 2015, Advances in Cryptology -- EUROCRYPT 2015. Oswald, E. & Fischlin, M. (eds.). Springer, p. 430-454 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Conformal Clustering and Its Application to Botnet Traffic

    Cherubin, G., Nouretdinov, I., Gammerman, A., Jordaney, R., Wang, Z., Papini, D. & Cavallaro, L., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 313-322 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A note on an upper bound of traceability codes

    Owen, S. & Ng, S-L., 2 Apr 2015, In : Australasian Journal of Combinatorics. 62, 1, p. 140-146 7 p.

    Research output: Contribution to journalArticle

  35. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstract

  36. Published

    The Ingredients of Cyber Weapons

    Repel, D. & Hersee, S., 24 Mar 2015, 10th International Conference on Cyber Warfare and Security (ICCWS15). p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. E-pub ahead of print

    Simulation-Based Selective Opening CCA Security for PKE from Key Encapsulation Mechanisms

    Liu, S. & Paterson, K. G., 17 Mar 2015, Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings. Katz, J. (ed.). Springer, Vol. 9020. p. 3-26 24 p. (Lecture Notes in Computer Science; vol. 9020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Multiple Attacks on Authentication Protocols for Low-Cost RFID Tags

    Bilal, Z., Martin, K. M. & Saeed, Q., 1 Mar 2015, In : Applied Mathematics and Information Sciences. 9, 2, p. 561-569 9 p.

    Research output: Contribution to journalArticle

  39. Published

    Business risks of software vulnerabilities: Four sources of risk are relevant for evaluating the influence of software vulnerabilities on businesses

    Kramer, H. & Walter, C., Mar 2015, Computer Weekly, p. 1-11 11 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  40. Published

    Hindering data theft with encrypted data trees

    Blasco, J., Tapiador, J. E., Pens-Lopez, P. & Suarez-Tangil, G., Mar 2015, In : Journal of Systems and Software. 101, p. 147-158 12 p.

    Research output: Contribution to journalArticle

  41. Published

    Performance Variation in Host-Based Card Emulation Compared to a Hardware Security Element

    Umar, A., Mayes, K. & Markantonakis, K., 20 Feb 2015, 2015 First Conference on Mobile and Secure Services (MOBISECSERV). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Impressions from a Talk on the Dark Web

    Davidson, A. & Haggman, A., 16 Feb 2015, RHUL Geopolitics & Security.

    Research output: Other contribution

  43. Published

    CopperDroid: Automatic Reconstruction of Android Malware Behaviors

    Tam, K., Khan, S., Fattori, A. & Cavallaro, L., 7 Feb 2015, NDSS Symposium 2015. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    On the complexity of the BKW algorithm on LWE

    Albrecht, M., Cid, C., Faugere, J-C., Fitzpatrick, R. & Perret, L., Feb 2015, In : Designs, Codes and Cryptography. 74, 2, p. 325-354 30 p.

    Research output: Contribution to journalArticle

  45. E-pub ahead of print
  46. Published

    A Pilot Study Investigating The Process of Risk Assessment and Re-Accreditation in UK Public Sector Systems

    Davies, M., Happa, J. & I, A., 2015, York Doctoral Symposium on Computer Science and Electronics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Unpublished

    Addressing Security and Privacy Issues in Low-Cost RFID Systems

    Bilal, Z., 2015, (Unpublished) 198 p.

    Research output: ThesisDoctoral Thesis

  48. Unpublished

    Analysis of Public-Key Encryption Schemes in Extended Attack Models

    Sibborn, D., 2015, (Unpublished) 242 p.

    Research output: ThesisDoctoral Thesis

  49. Published

    AntiCheetah: Trustworthy computing in an outsourced (cheating) environment

    Di Pietro, R., Lombardi, F., Martinelli, F. & Sgandurra, D., 2015, In : Future Generation Computer Systems. 48, p. 28-38 11 p.

    Research output: Contribution to journalArticle

  50. Unpublished

    Applications of Game Theory in Information Security

    Pham, V., 2015, (Unpublished) 222 p.

    Research output: ThesisDoctoral Thesis

  51. Published

    Balancing Privacy and Surveillance in the Cloud

    Macropoulos, C. & Martin, K., 2015, In : IEEE Cloud Computing . 2, 4, p. 14-21 8 p.

    Research output: Contribution to journalArticle

  52. Forthcoming

    Biometric Technology

    Thornton, P. & Adey, P., 2015, (Accepted/In press) Dictionary of International Migration. Brasilia Press

    Research output: Chapter in Book/Report/Conference proceedingEntry for encyclopedia/dictionary

  53. Published

    Cyber Security Education, Qualifications and Training

    Martin, K. M., 2015, Engineering and Technology Reference. IET

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  54. Published

    Design and development of a facebook application to raise privacy awareness

    Costantino, G. & Sgandurra, D., 2015, Proceedings - 23rd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2015. Institute of Electrical and Electronics Engineers Inc., p. 583-586 4 p. 7092778

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Experimental Elicitation of Risk Behaviour amongst Information Security Professionals

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A., 2015, Workshop on the Economics of Information Security . p. 1-55 55 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Information Security, 18th International Conference, ISC 2015. Trondheim, Norway, September 9-11, 2015. Proceedings.

    Lopez, J. (ed.) & Mitchell, C. J. (ed.), 2015, Springer-Verlag. 570 p. (Lecture Notes in Computer Science; vol. 9290)

    Research output: Book/ReportAnthology

  57. Unpublished

    On Methodologies to Select Systems for Automated Personal Identification

    Palmer, A., 2015, (Unpublished) 513 p.

    Research output: ThesisDoctoral Thesis

  58. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints

    Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2015, (Accepted/In press) 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Forthcoming

    Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies

    Crampton, J., Farley, N., Gutin, G. & Jones, M., 2015, (Accepted/In press) 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy: DBSec 2015. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingChapter

  60. Published

    Practical Attacks on Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., 2015, Risks and Security of Internet and Systems: 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers. Lopez, J., Ray, I. & Crispo, B. (eds.). 1 ed. Springer International Publishing, Vol. 8924. p. 180-195 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  61. Unpublished

    The Design and Analysis of Symmetric Cryptosystems

    Procter, G., 2015, (Unpublished) 218 p.

    Research output: ThesisDoctoral Thesis

  62. Published

    Valued Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Karapetyan, D., 2015, Proceedings of the 20th ACM Symposium on Access Control Models and Technologies. p. 3-13 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  63. 2014
  64. Published

    A tunable proof of ownership scheme for deduplication using Bloom filters

    Blasco, J., Di Pietro, R., Orfila, A. & Sorniotti, A., 29 Dec 2014, 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., p. 481-489 9 p. 6997518. (2014 IEEE Conference on Communications and Network Security, CNS 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    War and Remembrance: The Case of Finnish Covert Operations in the First World War

    Haggman, A., 10 Dec 2014, In : Strife Journal. 4, p. 14-20 7 p.

    Research output: Contribution to journalArticle

  67. Published

    A Formally Verified Mutual Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., Dec 2014, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 3, 2, p. 156-169 14 p.

    Research output: Contribution to journalArticle

  68. Published

    Iterative Plan Construction for the Workflow Satisfiability Problem

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 21 Nov 2014, In : Journal of Artificial Intelligence Research. 51, p. 555-577 23 p.

    Research output: Contribution to journalArticle

  69. Published

    Broadcast-Enhanced Key Predistribution Schemes

    Kendall, M., Martin, K. M., Ng, S-L., Paterson, M. & Stinson, D., 7 Nov 2014, In : ACM Transactions on Sensor Networks. 11, 1, 33 p., 6.

    Research output: Contribution to journalArticle

  70. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Strategic Discovery and Sharing of Vulnerabilities in Competitive Environments

    Rezaei Khouzani, M., Pham, V. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 59-78 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Watching You Watching Me: The Art of Playing the Panopticon.

    Coles-Kemp, L., Zugenmaier, A. & Lewis, M., Nov 2014, Digital Enlightenment Yearbook 2014. O'Hara, K. (ed.). 2014: IOS Press, p. 147-162 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

    Akram, R. N., Markantonakis, K. & Sauveron, D., 1 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Liu, Y. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Unpublished

    Some Algorithms for Learning with Errors

    Fitzpatrick, R., 21 Aug 2014, (Unpublished) 167 p.

    Research output: ThesisDoctoral Thesis

  80. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaper

  81. Published

    Phoenix: DGA-Based Botnet Tracking and Intelligence

    Schiavoni, S., Maggi, F., Cavallaro, L. & Zanero, S., 10 Jul 2014, Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA). London: Springer, Vol. 8550. p. 192-211 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Grammar-based transformations: Attack and Defence

    Repel, D. & Stengel, I., 25 Jun 2014, In : Information and Computer Security . 22, 2, p. 141-154

    Research output: Contribution to journalArticle

  83. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Jun 2014, 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Deconstructing the panopticon

    Haggman, A., 1 May 2014, Strife Blog.

    Research output: Other contribution

  88. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Avatar Voting in Virtual Worlds

    Cobourne, S., Hili, G., Mayes, K. & Markantonakis, K., Apr 2014, 5th International Conference on Information and Communication Systems (ICICS), 2014 . IEEE, p. 1 - 6

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  90. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In : Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticle

  92. Published

    Dendroid: A text mining approach to analyzing and classifying code structures in Android malware families

    Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P. & Blasco, J., Mar 2014, In : Expert Systems with Applications. 41, 4, Part 1, p. 1104-1117 14 p.

    Research output: Contribution to journalArticle

  93. Published

    The problem with curtains

    Haggman, A., 25 Feb 2014, Strife Blog.

    Research output: Other contribution

  94. Published

    Clausewitz and cyber security: towards a new Trinity?

    Haggman, A., 13 Feb 2014, Strife Blog.

    Research output: Other contribution

  95. Published

    Applying Information Hiding in VANETs to Covertly Report Misbehaving Vehicles

    De Fuentes, J. M., Blasco, J., González-Tablas, A. I. & González-Manzano, L., 1 Feb 2014, In : International Journal of Distributed Sensor Networks. 10, 2, p. 1-15 15 p., 120626.

    Research output: Contribution to journalArticle

  96. Published

    A cluster-based approach to consensus based distributed task allocation

    Smith, D., Wetherall, J., Woodhead, S. & Adekunle, A., 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing. p. 428-431 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., 2014, Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A scenario method to automatically assess ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. IEEE Computer Society, p. 544-551 8 p. 6787327

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    A Tactile Visual Library To Support User Experience Storytelling

    Lewis, M. & Coles-Kemp, L., 2014, Proceedings of NordDesign 2014. Design Society, 2014.. Aalto Design Factory, p. 386 395 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Adaptive online/offline RFID scheme for supply chain management systems

    Bilal, Z. & Martin, K. M., 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS) . IEEE, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  103. Published

    Addressing privacy issues in location-based collaborative and distributed environments

    Saracino, A., Sgandurra, D. & Spagnuelo, D., 2014, 2014 International Conference on Collaboration Technologies and Systems, CTS 2014. IEEE Computer Society, p. 166-172 7 p. 6867560

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  105. Published

    An Introduction to Java Card Programming

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Springer, p. 497-513 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  106. Published

    An Introduction to the Trusted Platform Module and Mobile Trusted Module

    Akram, R. N., Markantonakis, K. & Mayes, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 71-93 23 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  107. Published

    Anonymous User Revocation for Using Attribute-Based Signature in Cloud Computing

    Xu, Z. & Martin, K. M., 2014, The 6th IEEE International Conference on Cloud Computing Technology and Science. IEEE, p. 358-365

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  108. Published

    Another Look at Privacy Threats in 3G Mobile Telephony

    Alam, S. & Mitchell, C. J., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Susilo, W. & Mu, Y. (eds.). Berlin: Springer-Verlag, p. 386-396 11 p. (Lecture Notes in Computer Science; vol. 8544).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Asynchronous Binary Byzantine Consensus over Graphs with Power Law Degree Sequence

    Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 263 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  110. Published

    Attribute-Based Encryption for Access Control Using Elementary Operations

    Crampton, J. & Pinto, A., 2014, 27th Computer Security Foundations Symposium. IEEE, p. 125-139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  111. Unpublished

    Authenticated Encryption in Theory and in Practice

    Degabriele, J., 2014, (Unpublished) 182 p.

    Research output: ThesisDoctoral Thesis

  112. Unpublished

    Authentication Issues in Near Field Communication and RFID

    Saeed, Q., 2014, (Unpublished) 137 p.

    Research output: ThesisDoctoral Thesis

  113. Published

    Authorized workflow schemas: deciding realizability through $\mathsf{LTL }(\mathsf{F })$ model checking

    Crampton, J., Huth, M. & Huan-Pu Kuo, J., 2014, In : International Journal on Software Tools for Technology Transfer. 16, 1, p. 31-48

    Research output: Contribution to journalArticle

  114. Published

    Automating the assessment of ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, In : Journal of Information Security and Applications. 19, 3, p. 182-193 12 p.

    Research output: Contribution to journalArticle

  115. Published

    Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Sarkar, P. & Iwata, T. (eds.). Springer, p. 398-419 22 p. (Lecture Notes in Computer Science; vol. 8873).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  116. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  117. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  118. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Cordeiro De Amorim, R., 2014, p. 334-338. 5 p.

    Research output: Contribution to conferencePaper

  119. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Amorim, R. C. D., 2014, Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. p. 334 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    CheR: Cheating resilience in the cloud via smart resource allocation

    Roberto, D. P., Lombardi, F., Martinelli, F. & Sgandurra, D., 2014, Foundations and Practice of Security - 6th International Symposium, FPS 2013, Revised Selected Papers. Springer-Verlag, Vol. 8352 LNCS. p. 339-352 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8352 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  121. Published

    Classifying android malware through subgraph mining

    Martinelli, F., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  122. Published

    Consumer-Centric Protection for Online Social Networks

    Akram, R. N., Ko, R. K. L. & Law, T. F., 2014, 1st Workshop on Social Network Security (SocialSec 2014) in conjunction with 15th IEEE International Conference on Information Reuse and Integration (IEEE IRI 2014). Hasan, R. (ed.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  123. Published

    Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns

    Amorim, R. C. & Komisarczuk, P., 2014, Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Blackwell, C. & Zhu, H. (eds.). Cham: Springer International Publishing, p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  124. Published

    Digital Trust - Trusted Computing and Beyond A Position Paper

    Akram, R. N. & Ko, R. K. L., 2014, The 7th IEEE International Symposium on Security, Privacy and Anonymity in Internet of Things (IEEE SpaIoT 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Marmol, F. G., Tapiador, J. E. & Dong, M. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  125. Published

    Drawing out interaction: Lines around shared space.

    Heath, C. P., 2014, 382 p.

    Research output: ThesisDoctoral Thesis

  126. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  127. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  128. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  129. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  130. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2014, In : SAIEE Africa Research Journal. 105, 2, p. 21 28 p.

    Research output: Contribution to journalArticle

  131. Published

    Formalization of Validation Extension Metamodel for Enterprise Architecture Frameworks

    Oussena, S., Essien, J. & Komisarczuk, P., 2014, ICEIS 2014 - Proceedings of the 16th International Conference on Enterprise Information Systems, Volume 3, Lisbon, Portugal, 27-30 April, 2014. p. 427-434 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Incentive Engineering for Outsourced Computation in the Face of Collusion

    Rezaei Khouzani, M., Pham, V. & Cid, C., 2014, Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security,. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  133. Published

    Introducing probabilities in contract-based approaches for mobile application security

    Dini, G., Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 284-299 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  134. Published

    Logical LEGO: Co-constructed perspectives on service design.

    Heath, C. P., Coles-Kemp, L. & Hall, P. A., 2014, In : NordDesign 2014, Proceedings.

    Research output: Contribution to journalArticle

  135. Published

    Logical Lego? Co-constructed perspectives on service design

    Heath, C., Coles-Kemp, L. & Hall, P., 2014, Proceedings of NordDesign 2014. Aalto Design Factory, p. 416 425 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  137. Published

    Mitigation of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE 2014). IEEE Computer Society Press, p. 478 483 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Monotonicity and Completeness in Attribute-Based Access Control

    Crampton, J. & Morisset, C., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 33-48

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Unpublished

    Non-Interactive Key Exchange and Key Assignment Schemes

    Freire, E. S. V., 2014, (Unpublished)

    Research output: ThesisDoctoral Thesis

  140. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  141. Unpublished

    On the Design and Implementation of Secure Network Protocols

    Alfardan, N., 2014, (Unpublished) 186 p.

    Research output: ThesisDoctoral Thesis

  142. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  143. Published

    Partitional Clustering of Malware Using K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2014, Cyberpatterns, Unifying Design Patterns with Security and Attack Patterns. p. 223-233 11 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  144. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  145. Published

    Plaintext Recovery Attacks Against WPA/TKIP

    Paterson, K. G., Poettering, B. & Schuldt, J. C. N., 2014, Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. p. 325-349 25 p. (Lecture Notes in Computer Science; vol. 8540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  146. Unpublished

    Public-Key Cryptography with Joint and Related-Key Security

    Thomson, S., 2014, (Unpublished) 192 p.

    Research output: ThesisDoctoral Thesis

  147. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  148. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  149. Published

    Recovery of Structural Controllability for Process Control Systems

    Alcaraz, C. & Wolthusen, S. D., 2014, Proceedings of the 8th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47 63 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  150. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  151. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  152. Published

    Remote E-Voting Using the Smart Card Web Server

    Cobourne, S., Kyrillidis, L., Mayes, K. & Markantonakis, K., 2014, In : International Journal of Secure Software Engineering (IJSSE). 5, 1, p. 39-60

    Research output: Contribution to journalArticle

  153. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  154. Published

    Secure Smart, Embedded Devices, Platforms and Applications

    Mayes, K. & Markantonakis, K., 2014, Springer. 568 p.

    Research output: Book/ReportBook

  155. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  156. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  157. Published

    Security Standardisation Research: First International Conference, SSR 2014, London, UK, December 16-17, 2014. Proceedings

    Chen, LI. (ed.) & Mitchell, C. J. (ed.), 2014, Springer-Verlag. 257 p. (Lecture Notes in Computer Science; vol. 8893)

    Research output: Book/ReportAnthology

  158. Published

    Simulating Attack Plans Against ICT Infrastructures

    Baiardi, F., Corò, F., Tonelli, F., Guidi, L. & Sgandurra, D., 2014, Vulnerability, Uncertainty, and Risk: Quantification, Mitigation, and Management - Proceedings of the 2nd International Conference on Vulnerability and Risk Analysis and Management, ICVRAM 2014 and the 6th International Symposium on Uncertainty Modeling and Analysis, ISUMA 2014. American Society of Civil Engineers (ASCE), p. 627-637 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  159. Published

    Stability of Power Network State Estimation Under Attack

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference Asia (ISGT Asia 2014). IEEE Press, p. 441 446 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    Sticking and Making: Technology as glue for families separated by prison

    Coles-Kemp, L. & Kotova, A., 2014, UK Academy for Information Systems Conference Proceedings 2014. p. 1-28 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  161. Published

    The BIOS and Rootkits

    Hili, G., Mayes, K. & Markantonakis, K., 2014, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, D. K. (eds.). Springer, p. 369-381 13 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  162. Published

    The Militarisation of Cyberspace: Implications for the Private Sector

    Macropoulos, C. & Martin, K. M., 2014, ISSA Journal. 11 ed. ISSA, Vol. 12. p. 32-36

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  163. Published

    Toward Effective Malware Clustering: Reducing False Negatives through Feature Weighting and the Lp Metric

    de Amorim, R. C. & Komisarczuk, P., 2014, Case Studies in Secure Computing: Achievements and Trends. 1st ed. CRC Press, p. 295 1 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  164. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Unpublished

    Towards a Multidisciplinary Framework for the Design and Analysis of Security Ceremonies

    Carlos, M., 2014, (Unpublished) 200 p.

    Research output: ThesisDoctoral Thesis

  166. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  167. Published

    Unpicking PLAID

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Guenther, F., Marson, G. A., Mittelbach, A. & Paterson, K. G., 2014, Security Standardisation Research. Chen, L. & Mitchell, C. (eds.). Springer International Publishing, Vol. 8893. p. 1-25 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  168. Published

    Who says personas can't dance? The use of comic strips to design information security personas

    Lewis, M. & Coles-Kemp, L., 2014, CHI EA '14 : CHI '14 Extended Abstracts on Human Factors in Computing Systems . ACM, p. 2485 2490 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  169. 2013
  170. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  171. Published

    AntiCheetah: An Autonomic Multi-round Approach for Reliable Computing

    Pietro, R. D., Lombardi, F., Martinelli, F. & Sgandurra, D., 1 Dec 2013, 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing. p. 371-379 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  172. Published

    Smart Cards: State-of-the-Art to Future Directions, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Dec 2013, IEEE International Symposium on Signal Processing and Information Technology (ISSPIT 2013). Douligeris, C. & Serpanos, D. (eds.). Athens, Greece: IEEE Computer Science

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In : Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticle

  174. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Recovering from Lost Digital Wallet

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 4th IEEE International Symposium on Trust, Security, and Privacy for Emerging Applications (TSP-13). Y. Xiang, F. G. M. & Ruj, S. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  176. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  177. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  178. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  180. Published

    Obfuscation and Formal Grammars Revisited

    Repel, D. & Stengel, I., 13 Sep 2013, Fifth International Conference on Internet Technologies and Applications. p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  181. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Probabilistic Contract Compliance for Mobile Applications

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 1 Sep 2013, 2013 International Conference on Availability, Reliability and Security. p. 599-606 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  183. Published

    ASICS: Authenticated Key Exchange Security Incorporating Certification Systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D., Sep 2013, ESORICS 2013. Springer, Vol. 8134. p. 381-399 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  184. Published

    On the Security of RC4 in TLS

    Alfardan, N., Bernstein, D. J., Paterson, K., Poettering, B. & Schuldt, J., Aug 2013, USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingChapter

  185. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  186. Published

    Programmable Hash Functions in the Multilinear Setting

    Freire, E. S. V., Hofheinz, D., Paterson, K. G. & Striecks, C., Aug 2013, CRYPTO 2013 (1). Canetti, R. & J. G. (eds.). Springer, Vol. 8042. p. 513-530 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  187. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  188. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  189. Published

    Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification

    Tomlinson, A. & Yap, J. Y., 14 Jul 2013, p. 39-45. 6 p.

    Research output: Contribution to conferencePaper

  190. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. Published

    Evaluating the Trust of Android Applications through an Adaptive and Distributed Multi-criteria Approach

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 1 Jul 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. p. 1541-1546 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  192. Published

    Practical Automated Vulnerability Monitoring Using Program State Invariants

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 23 Jun 2013, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '13). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  193. Published

    On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem

    Crampton, J., Gutin, G. & Yeo, A., Jun 2013, In : ACM Transactions on Information and System Security. 16, 1, 4.

    Research output: Contribution to journalArticle

  194. Published

    A collaborative framework for generating probabilistic contracts

    Martinelli, F., Saracino, A., Sgandurra, D. & Aldini, A., 1 May 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS). p. 139-142 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    Signal-flow-based analysis of wireless security protocols

    Capar, C., Paterson, K., Goeckel, D., Quaglia, E., Towsley, D. & Zafer, M., May 2013, In : Information and Computation. 226, p. 37–56

    Research output: Contribution to journalArticle

  196. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  197. Published

    A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors

    Reina, A., Fattori, A. & Cavallaro, L., 14 Apr 2013, ACM European Workshop on Systems Security (EuroSec). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  198. Published

    A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G. & Mayes, K., Mar 2013, In : International Journal of RFID Security and Cryprography (IJRFIDSC). 2, 1-4, p. 92-106 14 p.

    Research output: Contribution to journalArticle

  199. Published

    Distance Bounding: A Practical Security Solution for Industrial Real-Time Location Systems?

    Abu-Mahfouz, A. & Hancke, G., Feb 2013, In : IEEE Transactions on Industrial Informatics. 9, 1, p. 16 27 p.

    Research output: Contribution to journalArticle

  200. Published

    Multi-Client Non-Interactive Verifiable Computation

    Choi, S. G., Katz, J., Kumaresan, R. & Cid, C., Feb 2013, Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Sahai, A. (ed.). Springer, p. 499-518 20 p. (Lecture Notes in Computer Science; vol. 7785).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  201. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  202. Published

    A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection

    Xu, Z. & Martin, K. M., 2013, The 15th IEEE International Conference on High Performance Computing and Communications. IEEE, p. 1593-1598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  203. Published

    A privacy-aware reputation-based announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. M. & Ng, S-L., 2013, Wireless Vehicular Communications (WiVeC), 2013 IEEE 5th International Symposium on. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  204. Published

    A Survey on Security for Mobile Devices

    Polla, M. L., Martinelli, F. & Sgandurra, D., 2013, In : IEEE Communications Surveys and Tutorials. 15, 1, p. 446-471 26 p.

    Research output: Contribution to journalArticle

  205. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. Published

    An NFC based consumer-level counterfeit detection framework

    Saeed, Q., Walter, C. & Bilal, Z., 2013, The 11th International Conference on Privacy, Security and Trust (PST 2013). IEEE, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Analysing the IOBC Authenticated Encryption Mode

    Mitchell, C. J., 2013, Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, QLD, Australia, July 2013, Proceedings. Boyd, C. & Simpson, L. (eds.). Springer-Verlag, Vol. 7959. p. 1-12 12 p. (Lecture Notes in Computer Science; vol. 7959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  208. Published

    Anatomy of Drive-by Download Attack

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013. p. 49-58 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    Anomaly Detection for Ephemeral Cloud IaaS Virtual Machines

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 7th International Conference on Network and System Security (NSS 2013. Springer-Verlag, p. 321-335

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Asynchronous Message-Passing Binary Consensus over Non-Complete Graphs

    Weldehawaryat, G. & Wolthusen, S. D., 2013, Proceedings of the 2013 IEEE 2nd International Workshop on Network Science (NSW 2013). IEEE Computer Society Press, p. 9-15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  211. Published

    Building general-purpose security services on EMV payment cards

    Chen, C., Tang, S. & Mitchell, C. J., 2013, Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer-Verlag, p. 29-44 16 p. (LNICST; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  212. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Unpublished

    Combinatorial Aspects of Key Predistribution for Resource-Constrained Networks

    Kendall, M., 2013, (Unpublished) 194 p.

    Research output: ThesisDoctoral Thesis

  214. Published

    Complex Event as an Core Aspect of Enterprise Architecture - EDEMF: Event Driven Enterprise Architecture Modeling Framework

    Kim, H., Oussena, S. & Komisarczuk, P., 2013, ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information Systems, Volume 3, Angers, France, 4-7 July, 2013. p. 292-301 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  215. Published

    Constraint Expressions and Workflow Satisability

    Crampton, J. & Gutin, G., 2013, 18th ACM SACMAT. p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  216. Unpublished

    Context Based Anomaly Detection in Critical Infrastructures

    Mcevoy, T. R., 2013, (Unpublished) 224 p.

    Research output: ThesisDoctoral Thesis

  217. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  218. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  219. Published

    Detecting heap-spray attacks in drive-by downloads: Giving attackers a hand

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2013, 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013. p. 300-303 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    Determining Home Users' Vulnerability to Universal Plug and Play (UPnP) Attacks

    Esnaashari, S., Welch, I. & Komisarczuk, P., 2013, 27th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2013, Barcelona, Spain, March 25-28, 2013. p. 725-729 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In : Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticle

  222. Published
  223. Published

    Fixed-Parameter Tractability of Workflow Satisability in the Presence of Seniority Constraints

    Crampton, J., Crowston, R., Gutin, G., Jones, M. & Ramanujan, M. S., 2013, FAW-AAIM 2013: Lecture Notes in Computer Science. Vol. 7924. p. 198-209

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  224. Published

    Forensic Entropy Analysis of Microsoft Windows Storage Volumes

    Weston, P. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  225. Published

    Granddaughter beware! An intergenerational case study of managing trust issues in the use of Facebook

    Light, A. & Coles-Kemp, L., 2013, International Conference on Trust and Trustworthy Computing. Springer Berlin / Heidelberg, p. 196-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  226. Published

    Graphical user interfaces in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, 4th International Workshop on Product LinE Approaches in Software Engineering, PLEASE 2013, San Francisco, CA, USA, May 20, 2013. p. 25-28 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  227. Unpublished

    Improvements and Generalisations of Signcryption Schemes

    Zhang, W., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  228. Published

    Letting Go: Working with the Rhythm of Participants

    Coles-Kemp, L., Angus, A. & Stang, F., 2013, CHI '13 Extended Abstracts on Human Factors in Computing Systems. 2013: ACM, p. 373-378 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Locating Subverted Processes using Random Packet Comparison in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2013, In : International Journal of Critical Infrastructures. 9, 1/2, p. 32-51

    Research output: Contribution to journalArticle

  230. Published

    Lucky Thirteen: Breaking the TLS and DTLS Record Protocols

    Al Fardan, N. J. & Paterson, K. G., 2013, 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, p. 526-540 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  231. Published

    Malicious False Data Injection in Hierarchical Electric Power Grid State Estimation Systems

    Feng, Y., Foglietta, C., Baiocco, A., Panzieri, S. & Wolthusen, S. D., 2013, Proceedings of the fourth international conference on Future energy systems (ACM e-Energy 2013). ACM Press, p. 183-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  232. Published

    Memory Access Pattern Protection for Resource-Constrained Devices

    Nakano, Y., Cid, C., Kiyomoto, S. & Miyake, Y., 2013, Proceedings of CARDIS 2012. Springer, Vol. 7771. p. 188-202 15 p. (Lecture Notes in Computer Science; no. 7771).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  233. Forthcoming

    Monoidal Computer I: Basic Computability by String Diagrams

    Pavlovic, D., 2013, (Accepted/In press) In : Information and Computation. 38 p.

    Research output: Contribution to journalArticle

  234. Forthcoming

    Multi-Round Attacks on Structural Controllability Properties for Non-Complete Random Graphs

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, (Accepted/In press) Proceedings of the 16th Information Security Conference (ISC 2013). Springer-Verlag, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  235. Published

    NetVis: a visualization tool enabling multiple perspectives of network traffic data

    Peters, D., Slawinski, A., Spoor, T., Vicol, S., Happa, J., Goldsmith, M. & Creese, S., 2013, Proceedings of the 31st conference on Theory and Practice of Computer Graphics, Eurographics UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  237. Published

    Not So Liminal Now: The Importance of Designing Privacy Features Across a Spectrum of Use

    Coles-Kemp, L. & Reddington, J., 2013, Digital Enlightenment Yearbook 2013. Hildebrandt, M., O'Hara, K. & Waidnder, M. (eds.). IOS Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  238. Published

    On drive-by-download attacks and malware classification

    Puttaroo, M., Komisarczuk, P. & De Amorim, R. C., 2013, Proceedings of the 5th International Conference on Internet Technologies and Applications, ITA 2013. Glyndwr University, p. 217-225 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Published

    Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IDMAN 2013. London, UK, April 8-9, 2013. Proceedings

    Fischer-Hübner, S. (ed.), de Leeuw, E. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. (IFIP Advances in Information and Communications Technology; no. 396)

    Research output: Book/ReportAnthology

  241. Published

    Public Key Infrastructures, Services and Applications: 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers

    De Capitani di Vimercati, S. (ed.) & Mitchell, C. J. (ed.), 2013, Springer-Verlag. 195 p. (Lecture Notes in Computer Science; vol. 7868)

    Research output: Book/ReportBook

  242. Published

    Remote Policy Enforcement for Trusted Application Execution in Mobile Environments

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2013, Trusted Systems: 5th International Conference, INTRUST 2013, Graz, Austria, December 4-5, 2013, Proceedings. Bloem, R. & Lipp, P. (eds.). Cham: Springer International Publishing, p. 70-84 15 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  243. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  244. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  245. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  246. Published

    Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

    Yau, K-L. A., Poh, G. S. & Komisarczuk, P., 2013, In : IJAHUC. 12, 3, p. 157-176 20 p.

    Research output: Contribution to journalArticle

  247. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  248. Published

    Structural Controllability of Networks for Non-Interactive Adversarial Vertex Removal

    Alcaraz, C., Etchevés Miciolino, E. & Wolthusen, S. D., 2013, Proceedings of the 8th International Workshop on Critical Information Infrastructures Security. Springer-Verlag, p. 120-132

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection

    Legg, P. A., Moffat, N., Nurse, J. R. C., Happa, J., Agrafiotis, I., Goldsmith, M. & Creese, S., 2013, In : Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications. 4, 4, p. 20-37 18 p.

    Research output: Contribution to journalArticle

  250. Published

    Ubiquitous one-time password service using the Generic Authentication Architecture

    Chen, C., Mitchell, C. J. & Tang, S., 2013, In : Mobile Networks and Applications. 18, 5, p. 738-747 10 p.

    Research output: Contribution to journalArticle

  251. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  252. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  253. Published

    Using the Smart Card Web Server in Secure Branchless Banking

    Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Network and System Security: 7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings. Lopez, J., Huang, X. & Sandhu, R. (eds.). Springer-Verlag, Vol. 7873. p. 250-263 14 p. (Lecture Notes In Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  254. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  255. 2012
  256. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  257. Published

    When Hardware Meets Software: a Bulletproof Solution to Forensic Memory Acquisition

    Reina, A., Fattori, A., Pagani, F., Cavallaro, L. & Bruschi, D., Dec 2012, Annual Computer Security Application Conference (ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  258. E-pub ahead of print

    A new description of orthogonal bases

    Coecke, B., Vicary, J. & Pavlovic, D., 9 Nov 2012, In : Mathematical Structures in Computer Science.

    Research output: Contribution to journalArticle

  259. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  260. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Forthcoming

    Distance Bounding for RFID: Effectiveness of Terrorist Fraud

    Hancke, G., Nov 2012, (Accepted/In press) IEEE RFID-TA. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  262. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  263. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  264. Forthcoming

    Tag Group Authentication using Bit Collisions

    Leng, X., Hancke, G., Mayes, K. & Markantonakis, K., Oct 2012, (Accepted/In press) Information Security South Africa (ISSA). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  265. Published

    Memory Errors: the Past, the Present, and the Future

    van der Veen, V., dutt-Sharma, N., Bos, H. J. & Cavallaro, L., 12 Sep 2012, 15th International Symposium on Research in Attacks, Intrusions and Defenses (RAID).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Community-centric engagement: lessons learned from privacy awareness intervention design

    Coles-Kemp, L. & Ashenden, D., 1 Sep 2012, Proceedings of BCS HCI 2012 Workshops: Designing Interactive Secure Systems. p. 4:1-4:4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  267. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  268. Published

    On the relation between the MXL family of algorithms and Groebner basis algorithms

    Albrecht, M., Cid, C., Faugere, J-C. & Perret, L., Aug 2012, In : Journal of Symbolic Computation. 47, 8, p. 926-941 16 p.

    Research output: Contribution to journalArticle

  269. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In : IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticle

  270. Published

    Geometry of abstraction in quantum computation

    Pavlovic, D., 19 Jul 2012, Proceedings of Symposia in Applied Mathematics. Abramsky, S. & Mislove, M. (eds.). AMS, Vol. 71. p. 233-267 (Proceedings of Symposia in Applied Mathematics; vol. 71).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  271. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  272. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  273. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In : International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticle

  274. Published

    Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

    Wolthusen, S. D. (ed.), Lopez, J. (ed.) & Setola, R. (ed.), 2 Mar 2012, Heidelberg, Germany: Springer-Verlag. 357 p.

    Research output: Book/ReportAnthology

  275. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  276. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In : International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticle

  277. Published

    The eSTREAM Portfolio in 2012: ECRYPT II report D.SYM.10

    Cid, C. & Robshaw, M. J. B., 16 Jan 2012, ECRYPT II. 18 p.

    Research output: Book/ReportOther report

  278. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In : NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  279. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D., 2012, ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 386-403 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  280. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  281. Published

    A Multi-criteria-Based Evaluation of Android Applications

    Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D., 2012, Trusted Systems: 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Mitchell, C. J. & Tomlinson, A. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 67-82 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  282. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  283. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  284. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  285. Published

    Actor-Network Procedures

    Pavlovic, D. & Meadows, C., 2012, Distributed Computing and Internet Technology: 8th International Conference, ICDCIT 2012, Bhubaneswar, India, February 2-4, 2012: Proceedings. Ramanujam, R. & Ramaswamy, S. (eds.). Springer-Verlag, p. 7-26 (Lecture Notes in Computer Science; vol. 7154).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  286. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  287. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  288. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  289. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  290. Published

    Building general purpose security services on trusted computing

    Chen, C., Mitchell, C. J. & Tang, S., 2012, Trusted Systems: Third International Conference, INTRUST 2011, Beijing, China, November 27-29, 2011, Revised Selected Papers. Chen, L., Yung, M. & Zhu, L. (eds.). Springer-Verlag, Vol. 7222. p. 16-31 16 p. (Lecture Notes in Computer Science; no. 7222).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  291. Published

    Comparison of Messaging Protocols for Emerging Wireless Networks

    Bagale, J. N., Moore, J. P. T., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  292. Published

    Context-aware content-centric collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P. & Clark, T., 2012, Proceedings of the 2nd International Conference on Advanced Collaborative Networks, Systems and Applications (COLLA?12). p. 54-57 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  293. Published

    Cultural Heritage Predictive Rendering

    Happa, J., Bashford-Rogers, T., Wilkie, A., Artusi, A., Debattista, K. & Chalmers, A., 2012, In : Computer Graphics Forum.

    Research output: Contribution to journalArticle

  294. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  295. Forthcoming

    Deriving ephemeral authentication using channel axioms

    Pavlovic, D. & Meadows, C., 2012, (Accepted/In press) Proceedings of the Cambridge Workshop on Security Protocols 2009. Christianson, B. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  296. Unpublished

    Design and Analysis of Electronic Feedback Mechanisms

    Li, Q., 2012, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  297. Published

    Design of a secure distance-bounding channel for RFID

    Hancke, G., 2012, In : Journal of Network and Computer Applications. 34, 3, p. 877-887

    Research output: Contribution to journalArticle

  298. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  299. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  300. Published

    Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-Marketplaces

    Li, Q., Zhang, J. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012) . IEEE Computer Society Press, p. 334-341

    Research output: Chapter in Book/Report/Conference proceedingChapter

  301. Published

    Fingerprinting Seismic Activity across an Internet of Things

    Moore, J. P. T., Bagale, J. N., Kheirkhahzadeh, A. D. & Komisarczuk, P., 2012, 5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  302. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  303. Published

    Generating certification authority authenticated public keys in ad hoc networks

    Kounga, G., Mitchell, C. J. & Walter, T., 2012, In : Security and Communication Networks. 5, 1, p. 87-106 20 p.

    Research output: Contribution to journalArticle

  304. Forthcoming

    Introduction to Industrial Control Networks

    Galloway, B. & Hancke, G., 2012, (Accepted/In press) In : IEEE Communications Surveys and Tutorials.

    Research output: Contribution to journalArticle

  305. Published

    Layered Analysis of Security Ceremonies

    Bella, G. & Coles-Kemp, L., 2012, Information Security and Privacy Research: IFIP Advances in Information and Communication Technology. Boston: Springer, Vol. 376. p. 273-286 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    MADAM: A Multi-level Anomaly Detector for Android Malware

    Dini, G., Martinelli, F., Saracino, A. & Sgandurra, D., 2012, Computer Network Security: 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings. Kotenko, I. & Skormin, V. (eds.). Berlin, Heidelberg: Springer Berlin / Heidelberg, p. 240-253 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  307. Unpublished

    Managing Identity Management Systems

    Al-Sinani, H., 2012, (Unpublished) 423 p.

    Research output: ThesisDoctoral Thesis

  308. Unpublished

    Mitigating the Risk of Insider Threats When Sharing Credentials

    Alawneh, M., 2012, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  309. Published

    Off-line NFC Tag Authentication

    Saeed, Q. & Walter, C., 2012, p. 730-735.

    Research output: Contribution to conferencePaper

  310. Published

    On Initializations for the Minkowski Weighted K-Means

    Amorim, R. C. D. & Komisarczuk, P., 2012, Advances in Intelligent Data Analysis XI - 11th International Symposium, IDA 2012, Helsinki, Finland, October 25-27, 2012. Proceedings. p. 45-55 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  311. Published

    On partitional clustering of malware

    de Amorim, R. C. & Komisarczuk, P., 2012, Cyberpatterns 2012. p. 47-51 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  312. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  313. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  314. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  315. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  316. Published

    Privacy in identity and access management systems

    Pashalidis, A. & Mitchell, C. J., 2012, Digital Identity and Access Management: Technologies and Frameworks. Sharman, R., Smith, S. D. & Gupta, M. (eds.). IGI Global, p. 316-328

    Research output: Chapter in Book/Report/Conference proceedingChapter

  317. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  318. Published

    Quantitative Concept Analysis

    Pavlovic, D., 2012, Formal Concept Analysis: 10th International Conference, ICFCA 2012, Leuven, Belgium, May 7-10, 2012: Proceedings. Domenach, F., Ignatov, D. I. & Poelmans, J. (eds.). Springer, p. 260-277 18 p. (Lecture Notes in Computer Science; vol. 7278).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2012, In : Journal of Network and Computer Applications. 35, 1, p. 253-267 15 p.

    Research output: Contribution to journalArticle

  320. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  321. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Published

    Security server-based architecture for mobile ad hoc networks

    Darwish, S., Taylor, S. J. E. & Ghinea, G., 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 926-930 5 p. 6296071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  323. Published

    Smartphones as a Platform for Advanced Measurement and Processing

    Opperman, C. & Hancke, G., 2012, IEEE Instrumentation and Measurement Technology Conference. IEEE, p. 703 706 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  324. Published

    Ten reasons WHY IRIS Needed 20:20 Foresight: Some Lessons for Introducing Biometric Border Control Systems

    Palmer, A. & Hurrey, C., 2012, Proceedings of the 2012 European Intelligence and Security Informatics Conference. Washington: IEEE Computer Society, p. 311-316 6 p. Palmer:2012:TRW:2373856.2372920

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  325. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In : Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticle

  326. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  327. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  328. 2011
  329. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  331. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  333. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  334. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaper

  335. Published

    Human-Computer Interaction for Security Research: The Case of EU E-Banking Systems

    Moeckel, C. & Faulkner, X., 5 Sep 2011, p. 406-409. 4 p.

    Research output: Contribution to conferencePaper

  336. Published

    Usability and Security in EU E-Banking Systems - Towards an Integrated Evaluation Framework

    Moeckel, C., 30 Aug 2011. 4 p.

    Research output: Contribution to conferencePaper

  337. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  338. Published

    An Obfuscation-Based Approach against Injection Attacks

    Baiardi, F. & Sgandurra, D., 1 Aug 2011, 2011 Sixth International Conference on Availability, Reliability and Security. p. 51-58 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  339. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaper

  340. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Systems Security at VU University Amsterdam

    Bos, H. J. & Cavallaro, L., 1 Jul 2011, 1st SysSec Workshop on Systems Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  342. Published

    Trap Hunting: Finding Personal Data Management Issues in Next Generation AAC Devices

    Reddington, J. & Coles-Kemp, L., 1 Jul 2011, Proceedings of the Second Workshop on Speech and Language Processing for Assistive Technologies. Edinburgh, Scotland, UK: Association for Computational Linguistics, p. 32-42 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  343. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  345. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In : Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticle

  346. Published

    NFC mobile payment with Citizen Digital Certificate

    Chen, W., Mayes, K., Lien, Y-H. & Chiu, J-H., 1 Jun 2011, Next Generation Information Technology (ICNIT), 2011 The 2nd International Conference on. Gyeongju: IEEE COMPUTER SOC, p. 120 -126

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  347. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  349. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  350. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In : ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticle

  351. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In : ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticle

  352. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  353. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In : International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticle

  354. Published

    Threshold Anonymous Announcement in VANETs.

    Chen, LI., Ng, S-L. & Wang, G., Mar 2011, In : IEEE Journal on Selected Areas in Communications. 29, 3, p. 605-615

    Research output: Contribution to journalArticle

  355. Published

    New Most Efficient State Recovery Attacks on an eSTREAM Candidate F-FCSR-H v2 and F-FCSR-H Stream Ciphers

    Ali, A., 21 Feb 2011, p. 240--246. 7 p.

    Research output: Contribution to conferencePaper

  356. Published

    Smart card web server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 1 Jan 2011, Electrical Engineering and Applied Computing. Ao, S-I. & Gelman, L. (eds.). Springer, p. 221-232 12 p. (Lecture Notes in Electrical Engineering; vol. 90).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  357. Published

    End-to-end Cryptographic Security Systems for Payments

    Cid, C., Jan 2011, E-finance & Payments Law & Policy newsletter, 5, 01.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  358. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  360. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In : Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticle

  361. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  363. Published

    Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 210-215 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  364. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  365. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  366. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  367. Published

    Attestation of integrity of overlay networks

    Baiardi, F. & Sgandurra, D., 2011, In : Journal of Systems Architecture. 57, 4, p. 463 - 473

    Research output: Contribution to journalArticle

  368. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  369. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  370. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  371. Published

    Considerations for Mobile Authentication in the Cloud

    Mayes, K., Markantonakis, K., Ahmad, Z. & Dong, S., 2011, In : Information Security Technical Report. 16, p. 123-130

    Research output: Contribution to journalArticle

  372. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In : Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticle

  373. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  374. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  375. Published

    Exploring new and emerging applications of cognitive radio systems: Preliminary insights and framework

    Yau, K-L. A., Tan, F-A. G., Komisarczuk, P. & Teal, P. D., 2011, Humanities, Science and Engineering (CHUSER), 2011 IEEE Colloquium on. p. 153-157 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  377. Published

    Fast Scalar Multiplication for ECC over GF(it p) using Division Chains

    Walter, C. D., 2011, WISA 2010. Chung, Y. & Yung, M. (eds.). Springer, Vol. 6513. p. 61-75 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  378. Published

    Gaming security by obscurity

    Pavlovic, D., 2011, NSPW '11 Proceedings of the 2011 workshop on New security paradigms workshop. Gates, C. & Hearley, C. (eds.). New York, NY, USA: ACM, p. 125-140 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  379. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  380. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  381. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K., 2011, In : International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticle

  382. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  383. Published

    Internet Users' Security and Privacy While They Interact with Amazon

    Bella, G. & Coles-Kemp, L., 2011, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, p. 878-883 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  384. Published

    Learning mechanisms for achieving context awareness and intelligence in Cognitive Radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, IEEE 36th Conference on Local Computer Networks, LCN 2011, Bonn, Germany, October 4-7, 2011. p. 738-745 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  385. Published

    Looking at clouds from both sides: The advantages and disadvantages of placing personal narratives in the cloud

    Coles-Kemp, L., Reddington, J. & Williams, P. A. H., 2011, In : Information Security Technical Report. 16, 3-4, p. 115-122

    Research output: Contribution to journalArticle

  386. Published

    Modular Arithmetic

    Contini, S., Koç, Ç. K. & Walter, C. D., 2011, Encyclopedia of Cryptography and Security (2nd Ed.). Tilborg, H. C. A. V. & Jajodia, S. (eds.). Springer, p. 795-798 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  387. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In : Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  388. Unpublished

    New Attacks on FCSR-based Stream Ciphers

    Ali, A., 2011, (Unpublished) 248 p.

    Research output: ThesisDoctoral Thesis

  389. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2011, E-business and Telecommunications. 3 ed. Springer, Vol. 130. p. 174-185 (Communications in Computer and Information Science ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  390. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G., 2011, Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733. p. 128-145 (Lecutre Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  392. Published

    ON THE DISTRIBUTION OF THE SUBSET SUM PSEUDORANDOM NUMBER GENERATOR ON ELLIPTIC CURVES

    Blackburn, S. R., Ostafe, A. & Shparlinski, I. E., 2011, In : Uniform Distribution Theory. 6, 1, p. 127-142 16 p.

    Research output: Contribution to journalArticle

  393. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  395. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Published

    Performance Analysis of Reinforcement Learning for Achieving Context Awareness and Intelligence in Mobile Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  397. Published

    Practical eavesdropping and skimming attacks on high-frequency RFID tokens

    Hancke, G., 2011, In : Journal of Computer Security. p. 259 288 p.

    Research output: Contribution to journalArticle

  398. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  399. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  400. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G., 2011, In : IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticle

  401. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In : ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticle

  403. Published

    Putting dots in triangles

    Blackburn, S., Paterson, M. & Stinson, D. R., 2011, In : Journal of Combinatorial Mathematics and Combinatorial Computing. 78, p. 23-32

    Research output: Contribution to journalArticle

  404. Published

    Quantifying and qualifying trust: Spectral decomposition of trust networks

    Pavlovic, D., 2011, Proceedings of FAST 2010. Degano, P., Etalle, S. & Guttman, J. (eds.). Springer-Verlag, Vol. 6561. p. 1-17 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  405. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  406. Published

    Relating toy models of quantum computation: comprehension, complementarity and dagger autonomous categories

    Pavlovic, D., 2011, In : Electronic Notes in Theoretical Computer Science. 270, 2, p. 121-139 19 p.

    Research output: Contribution to journalArticle

  407. Published

    Rendering Interior Cultural Heritage Scenes Using Image-Based Shooting

    Happa, J., Bashford-Rogers, T., Debattista, K. & Chalmers, A., 2011, In : Eurographics, Heritage Area Paper.

    Research output: Contribution to journalArticle

  408. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  409. Published
  410. Published

    Scalable RFID security protocols supporting tag ownership transfer

    Song, B. & Mitchell, C. J., 2011, In : Computer Communications. 34, 4, p. 556-566 11 p.

    Research output: Contribution to journalArticle

  411. Published

    Security and Resilience for Smart Devices and Applications

    Sauveron, D. (Guest ed.), Markantonakis, K. (Guest ed.), Mayes, K. (Guest ed.) & Verikoukis, C. (Guest ed.), 2011, In : EURASIP Journal on Wireless Communications and Networking. 2011

    Research output: Contribution to journalSpecial issue

  412. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  413. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  414. Published

    SSL/TLS session-aware user authentication using a GAA bootstrapped key

    Chen, C., Mitchell, C. J. & Tang, S., 2011, Information Security Theory and Practice: Security and Privacy of Mobile Devices in Wireless Communication, 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011, Proceedings. Ardagna, C. & Zhou, J. (eds.). Springer-Verlag, Vol. 6633. p. 54-68 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  415. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  417. Published

    Taint-Enhanced Anomaly Detection

    Cavallaro, L. & Sekar, R., 2011, ICISS. p. 160-174 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  419. Published

    Theoretical Analysis of Security Attacks from a Swarm-like Perspective

    George, C., Goo, S. K. & Tomlinson, A., 2011.

    Research output: Contribution to conferencePaper

  420. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  421. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  422. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  423. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  424. Published
  425. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  426. Published

    Understanding the Value and Potential of Threat Modeling for Application Security Design - An E-Banking Case Study

    Moeckel, C. & Abdallah, A. E., 2011, In : Journal of Information Assurance and Security. 6, 5, p. 346-356 11 p.

    Research output: Contribution to journalArticle

  427. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In : International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticle

  428. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  429. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In : Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticle

  430. 2010
  431. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  432. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 1 Dec 2010, In : International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticle

  433. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  434. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Published

    Extending trusted computing as a security service

    Chen, C., Mitchell, C. J. & Tang, S., Dec 2010. 1 p.

    Research output: Contribution to conferencePoster

  436. Published

    Traceability codes

    Blackburn, S., Etzion, T. & Ng, S-L., Nov 2010, In : Journal of Combinatorial Theory, Series A. 117, 8, p. 1049-1057

    Research output: Contribution to journalArticle

  437. Published

    Ubiquitous one-time password service using generic authentication architecture

    Chen, C., Mitchell, C. J. & Tang, S., Nov 2010. 8 p.

    Research output: Contribution to conferencePaper

  438. Published

    Threat modeling approaches and tools for securing architectural designs of an e-banking application

    Moeckel, C. & Abdallah, A. E., 14 Oct 2010, p. 149-154. 6 p.

    Research output: Contribution to conferencePaper

  439. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  440. Published

    Approach for selecting the most suitable Automated Personal Identification Mechanism

    Palmer, A., 1 Oct 2010, In : Computers and Security. 29, 7, p. 785-806 22 p., Palmer:2010:ASM:2622679.2622943.

    Research output: Contribution to journalArticle

  441. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaper

  442. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Published

    Teeth Segmentation and Feature Extraction for Odontological Biometrics

    Mairaj, D., Busch, C. & Wolthusen, S. D., Oct 2010, Proceedings of the 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE Computer Society Press, p. 323-328

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  444. Published

    Live and Trustworthy Forensic Analysis of Commodity Production Systems

    Martignoni, L., Fattori, A., Paleari, R. & Cavallaro, L., 15 Sep 2010, Recent Advances in Intrusion Detection: 13th International Symposium, RAID 2010, Ottawa, Ontario, Canada, September 15-17, 2010: Proceedings. Springer, p. 297-316 (Lecture Notes in Computer Science; vol. 6307).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  446. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  447. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In : IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticle

  448. Published

    Key predistribution for homogeneous wireless sensor networks with group deployment of nodes

    Martin, K. M., Paterson, M. B. & Stinson, D. R., Aug 2010, In : ACM Transactions on Sensor Networks. 7, 2, 11.

    Research output: Contribution to journalArticle

  449. Published

    The cost of observation for intrusion detection: Performance impact of concurrent host observation

    Seeger, M., Busch, C., Baier, H. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2012 (ISSA). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  450. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  451. Published

    Take a Deep Breath: a Stealthy, Resilient and Cost-Effective Botnet Using Skype

    Nappa, A., Fattori, A., Balduzzi, M., Dell'Amico, M. & Cavallaro, L., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  452. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  453. Published

    Securing a Community Cloud

    Baiardi, F. & Sgandurra, D., 1 Jun 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. p. 32-41 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  454. Published

    MINIX 3: Status Report and Current Research

    Tanenbaum, A. S., Appuswamy, R., Bos, H. J., Cavallaro, L., Giuffrida, C., Hruby, T., Herder, J., van der Kouwe, E. & van Moolenbroek, D., Jun 2010, ;login: The USENIX Magazine, 35, 3.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  455. Published

    Constraints on autonomous use of standard GPU components for asynchronous observations and intrusion detection

    Seeger, M., Baier, H., Busch, C. & Wolthusen, S. D., 26 May 2010, Proc. 2010 2nd International Workshop on Security and Communication Networks (IWSCN). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  456. Published
  457. Published

    Identity theft and reconstruction

    Ciechanowicz, C., 1 May 2010, In : Information Security Technical Report. 15, 2, p. 41

    Research output: Contribution to journalArticle

  458. Published

    Privacy Threats in a Mobile Enterprise Social Network

    Tomlinson, A., Yau, P-W. & MacDonald, J. A., 1 May 2010, In : Information Security Technical Report. 15, 2, p. 57 - 66

    Research output: Contribution to journalArticle

  459. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  461. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  462. Published

    Is security a lost cause?

    Mitchell, C. J., May 2010. 8 p.

    Research output: Contribution to conferencePaper

  463. Published

    Observation Mechanism and Cost Model for Tightly Coupled Asymmetric Concurrency

    Seeger, M. & Wolthusen, S. D., May 2010, Proceedings, 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 158-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  464. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  465. Published

    Security challenges for user-oriented RFID applications within the "Internet of things"

    Hancke, G., Markantonakis, K. & Mayes, K., May 2010, In : Journal of Internet Technology. 11, 3, p. 307 313 p.

    Research output: Contribution to journalArticle

  466. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  467. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  468. Published

    NFC Mobile Transactions and Authentication Based on GSM Network

    Chen, W., Hancke, G. P., Mayes, K. E., Lien, Y. & Chiu, J-H., 1 Apr 2010, Near Field Communication (NFC), 2010 Second International Workshop on. p. 83 -89

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  470. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In : International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticle

  471. Published

    Detecting Sensor Signal Manipulations in Non-Linear Chemical Processes

    Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 81-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  472. Published

    Interactive Visualization of Interdependencies and Vulnerabilities in Constrained Environments

    Lunden, N., Sveen, R., Lund, H., Svendsen, N. & Wolthusen, S. D., Mar 2010, Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 171-183

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  473. Published

    Two-dimensional patterns with distinct differences - constructions, bounds, and maximal anticodes

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Mar 2010, In : IEEE Transactions on Information Theory. 56, 3, p. 1216-1229 14 p.

    Research output: Contribution to journalArticle

  474. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  475. Published

    Protocols and cryptography

    Ciechanowicz, C., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 1

    Research output: Contribution to journalArticle

  476. Published

    The status of national PKIs - A European overview

    Patsos, D., Ciechanowicz, C. & Piper, F., 1 Feb 2010, In : Information Security Technical Report. 15, 1, p. 13-20 8 p.

    Research output: Contribution to journalArticle

  477. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  478. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  479. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In : Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticle

  480. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  481. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M., 2010, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  482. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  483. Published

    Achieving context awareness and intelligence in cognitive radio networks using reinforcement learning for stateful applications

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, School of Engineering and Computer Science, Victoria University of Wellington.

    Research output: Book/ReportBook

  484. Published

    Achieving Efficient and Optimal Joint Action in Distributed Cognitive Radio Networks Using Payoff Propagation

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Proceedings of IEEE International Conference on Communications, ICC 2010, Cape Town, South Africa, 23-27 May 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  485. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    An Analysis of DepenDNS

    Alfardan, N. & Paterson, K., 2010, Information Security. Springer, Vol. 6531. p. 31-37 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  487. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  488. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  489. Published

    Analysis and implementation of reinforcement learning on a GNU Radio cognitive radio platform

    Ren, Y., Dmochowski, P. A. & Komisarczuk, P., 2010, 5th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2010, Cannes, France, June 9-11, 2010. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  490. Published

    Applications of reinforcement learning to cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Workshops (ICC), 2010 IEEE International Conference on. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  491. Published

    Assessing a virtual baby feeding training system

    Petrasova, A., Czanner, G., Happa, J., Czanner, S., Wolke, D. & Chalmers, A., 2010, In : Proceedings of AFRIGRAPH: International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa.

    Research output: Contribution to journalArticle

  492. Published

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol

    Pavlovic, D. & Meadows, C., 2010, In : Electronic Notes in Theoretical Computer Science. 265, p. 97 - 122

    Research output: Contribution to journalArticle

  493. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  494. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al.

    Chen, L. & Ng, S-L., 2010, In : IEEE Transaction on Vehicular Technology. 59, 3, p. 1503-1505 3 p.

    Research output: Contribution to journalComment/debate

  496. Published

    Confidential Signatures and Deterministic Signcryption

    Dent, A. W., Fischlin, M., Maulis, M., Stam, M. & Schroder, D., 2010, Public Key Cryptography -- PKC 2010. Nguyen, P. & Pointcheval, D. (eds.). p. 462-479 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  497. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  498. Published

    Context-awareness and intelligence in distributed cognitive radio networks: A reinforcement learning approach

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, Communications Theory Workshop (AusCTW), 2010 Australian. p. 35-42 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  499. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  500. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  501. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  502. Published

    Formal derivation of concurrent garbage collectors

    Pavlovic, D., Pepper, P. & Smith, D. R., 2010, Proceedings of MPC 2010. Desharnais, J. (ed.). Springer-Verlag, Vol. 6120. p. 353-376 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  503. Published

    High Dynamic Range Video for Cultural Heritage Documentation and Experimental Archaeology

    Happa, J., Artusi, A., Czanner, S. & Chalmers, A., 2010, In : Proceedings of VAST: International Symposium on Virtual Reality, Archaeology and Intelligent Cultural Heritage. p. 17-24 8 p.

    Research output: Contribution to journalArticle

  504. Published

    High occupancy resource allocation for grid and cloud systems, a study with DRIVE

    Chard, K., Bubendorfer, K. & Komisarczuk, P., 2010, Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, HPDC 2010, Chicago, Illinois, USA, June 21-25, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  505. Published

    Honeycomb arrays

    Blackburn, S. R., Panoui, A., Paterson, M. B. & Stinson, D. R., 2010, In : The Electronic Journal of Combinatorics. 17, R172, p. 1 1 p.

    Research output: Contribution to journalArticle

  506. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H., 2010, In : Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticle