Home > Mathematics home > Research > Profile > Publications
  1. Published

    (e, 2e) reactions in helium: calculations with correlated wavefunctions

    Furtado, F. M. & O'Mahony, P. F., 1987, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 20, 13, p. L405

    Research output: Contribution to journalArticlepeer-review

  2. Published

    (e,2e) triple differential cross sections for the simultaneous ionization and excitation of helium

    Dupre, C., Lahmam-Bennani, A., Duguet, A., Mota-Furtado, F., O'Mahony, P. F. & Cappello, C. D., 1992, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 25, 1, p. 259

    Research output: Contribution to journalArticlepeer-review

  3. Published

    2D problems in groups

    Kar, A. & Nikolov, N., 13 Jan 2018, In: arXiv.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A 2-isomorphism theorem for delta-matroids

    Moffatt, I. & Oh, J., May 2021, In: Advances in applied mathematics. 126, 102133.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Birch-Goldbach theorem

    Brüdern, J., Dietmann, R., Liu, J. Y. & Wooley, T. D., 2010, In: Archiv der Mathematik. 94, 1, p. 53-58 6 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A bound on the size of separating hash families

    Blackburn, S. R., Etzion, T., Stinson, D. R. & Zaverucha, G. M., Oct 2008, In: Journal of Combinatorial Theory, Series A. 115, 7, p. 1246-1256 11 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  10. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A characterisation of anti-Löwner functions

    Audenaert, K. M. R., Dec 2011, In: Proceedings of the American Mathematical Society. 139, 12, p. 4217-4223

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A characterization for sparse epsilon-regular pairs

    Gerke, S. & Steger, A., 3 Jan 2007, In: The Electronic Journal of Combinatorics. 14, 1, p. - 12 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Characterization of Partially Dual Graphs

    Moffatt, I., Jul 2011, In: Journal of Graph Theory. 67, 3, p. 198-217 20 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A classification of all 1-Salem graphs

    McKee, J. & Gumbrell, L., 2014, In: LMS Journal of Computation and Mathematics. 17, 1, p. 582-594 13 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    A combinatorial method for calculating the moments of Lévy area

    Levin, D. & Wildon, M., 24 Jul 2008, In: Transactions of the American Mathematical Society. 360, 12, p. 6695-6709 15 p.

    Research output: Contribution to journalArticlepeer-review

  23. E-pub ahead of print

    A combinatorial proof of a plethystic Murnaghan--Nakayama rule

    Wildon, M., 16 Aug 2016, (E-pub ahead of print) In: SIAM Journal on Discrete Mathematics. 30, 3, p. 1526–1533 108 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A comparative study on the spin asymmetry and integrated cross sections for the electron-impact ionization of atomic hydrogen

    Berakdar, J., O'Mahony, P. F. & Mota-Furtado, F., 1997, In: Zeitschrift für Physik D Atoms, Molecules and Clusters. 39, 1, p. 41-48 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    A comparison of the entanglement measures negativity and concurrence

    Verstraete, F., Audenaert, K., Dehaene, J. & De Moor, B., 2001, In: Journal of Physics A: Mathematical and General. 34, 47, p. 10327-10332 6 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In: Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    A constructive proof of the existence of Viterbi processes

    Lember, J. & Koloydenko, A., Apr 2010, In: IEEE Transactions on Information Theory. 56, 4, p. 2017-2033 17 p.

    Research output: Contribution to journalArticlepeer-review

  30. Submitted

    A continuity bound for the expected number of connected components of a random graph: a model for epidemics

    Audenaert, K., Hanson, E. & Datta, N., 13 Dec 2019, (Submitted) In: ArXiv.org. 1912, 05599

    Research output: Contribution to journalArticlepeer-review

  31. Published

    A contraction theorem for the largest eigenvalue of a multigraph

    McKee, J., 15 Nov 2018, In: Linear Algebra and Its Applications. 557, p. 339-349 11 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    A Correlation Coprocessor for Accurate Real-Time Ultrasonic Ranging of Multiple Objects Using the Transputer

    Brunfaut, M., Peremans, H., Audenaert, K., Blomme, R. & Van Campenhout, J. M., 1993, In: Microprocessors and Microsystems. 17, 10, p. 571-578

    Research output: Contribution to journalArticlepeer-review

  33. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In: Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In: Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Unpublished

    A Determinantal Inequality for the Geometric Mean with an Application in Diffusion Tensor Imaging

    Audenaert, K., 25 Feb 2015, (Unpublished) In: ArXiv.org. 1502.06902, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  38. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In: International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticlepeer-review

  41. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In: Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  44. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In: Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticlepeer-review

  47. Unpublished

    A generalisation of Mirsky's singular value inequalities

    Audenaert, K., 21 Oct 2014, (Unpublished) In: ArXiv.org. 1410.4941

    Research output: Contribution to journalArticle

  48. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    A Generalised Rational Interpolation Problem and the Solution of the Welch--Berlekamp Key Equation

    Blackburn, S. R., 1997, In: Designs, Codes and Cryptography. 11, 3, p. 223-234 12 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    A Generalized SXP Rule Proved by Bijections and Involutions

    Wildon, M., Dec 2018, In: Annals of combinatorics. 22, 4, p. 885-905 21 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    A generic group key management framework for group communication in wireless mobile environments

    Martin, K. M. & Kiah, M. L. M., 2006, Proceedings of the 6th International Network Conference (INC2006).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  53. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In: Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticlepeer-review

  54. Published

    A Gutzwiller trace formula for large hermitian matrices

    Bolte, J., Egger, S. & Keppeler, S., 2017, In: Reviews in Mathematical Physics. 29, 8

    Research output: Contribution to journalArticlepeer-review

  55. Published

    A high-resolution sensor based on tri-aural perception

    Peremans, H., Audenaert, K. & Van Campenhout, J. M., 1993, In: Robotics and Automation, IEEE Transactions on. 9, 1, p. 36-48 13 p.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    A Lieb-Thirring inequality for singular values

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 11, p. 3053-3057 5 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A logic of access control

    Crampton, J., Loizou, G. & O'Shea, G., 2001, In: The Computer Journal. 44, 2, p. 137-149 13 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In: BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticlepeer-review

  61. Published

    A method for constructing decodable de Bruijn sequences

    Mitchell, C. J., Etzion, T. & Paterson, K. G., 1996, In: IEEE Transactions on Information Theory. 42, p. 1472-1478 7 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published

    A model of point configurations given by a semi-parametric interaction

    Grabarnik, P. & Shcherbakov, V., 2012, In: Moscow University Mathematics Bulletin. 67, 2, p. 47-51

    Research output: Contribution to journalArticlepeer-review

  63. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    A New Family of Extended Generalized Quadrangles of Order (q+1, q-1).

    Ng, S-L. & Wild, P., 2000, In: European Journal of Combinatorics. 21, p. 395-406

    Research output: Contribution to journalArticlepeer-review

  65. Published

    A new mean-value result for Dirichlet L-functions and polynomials

    Harman, G., Watt, N. & Wong, K., 2004, In: Quarterly J. Math. Oxford,. 55, p. 307-324 18 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    A NEW PROOF THAT ALTERNATING LINKS ARE NON-TRIVIAL

    Moffatt, I., Jun 2010, In: Journal of knot theory and its ramifications. 19, 6, p. 821-828 8 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published
  68. Published

    A non-abelian free pro-p group is not linear over a local field

    Barnea, Y. & Larsen, M., 1 Apr 1999, In: Journal of Algebra. 214, 1, p. 338-341 4 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    A norm compression inequality for block partitioned positive semidefinite matrices

    Audenaert, K. M. R., 2006, In: Linear Algebra and Its Applications. 413, 1, p. 155-176 22 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    A norm inequality for pairs of commuting positive semidefinite matrices

    Audenaert, K., 16 Feb 2015, In: Electronic Journal of Linear Algebra. 30, p. 80-84 5 p., 5.

    Research output: Contribution to journalArticlepeer-review

  71. E-pub ahead of print

    A Note on Bounded Exponential Sums

    Fregoli, R., 11 Nov 2020, (E-pub ahead of print) In: Bulletin of the London Mathematical Society. 10 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    A Note on Duality in Linear Secret Sharing Schemes

    Martin, K. M., van Dijk, M. & Jackson, W-A., 1997, In: Bulletin of the ICA. 19, p. 93-101 9 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    A Note on Game-Hopping Proofs

    Dent, A. W., 2006, In: Cryptology ePrint Archive: Report. 2006/260

    Research output: Contribution to journalArticlepeer-review

  74. Published

    A note on generators of number fields

    Widmer, M. & Vaaler, J., 2012, In: Contemporary Mathematics. 587

    Research output: Contribution to journalArticlepeer-review

  75. E-pub ahead of print

    A note on recognizing an old friend in a new place: list coloring and the zero-temperature Potts model

    A. Ellis-Monaghan, J. & Moffatt, I., 31 Dec 2014, (E-pub ahead of print) In: Annales de L’Institut Henri Poincaré D. 1, 4, p. 429–442 14 p.

    Research output: Contribution to journalArticlepeer-review

  76. Unpublished

    A note on scaling limits for truncated birth-and-death processes with interaction

    Shcherbakov, V. & Yambartsev, A., 2016, (Unpublished) In: ArXiv.org.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In: Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    A note on the metrical theory of continued fractions

    Harman, G. & Wong, K. C., 2000, In: American Mathematical Monthly. 107, p. 834-837 4 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    A note on the Mittag–Leffler condition for Bredon-modules

    Fluch, M. G., Gandini, G. & Nucinkis, B., Feb 2017, In: Archiv der Mathematik. 108, 2, p. 133–143 11 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    A note on the Möbius and Liouville functions

    Harman, G., Pintz, J. & Wolke, D., 1985, In: Studia Sci. Math. Hung.. 20, p. 295-299 5 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    A note on the number of divisors of quadratic polynomials, in Sieve Methods

    McKee, J., 1997, Exponential Sums and their Applications in Number Theory. Cambridge University Press, p. 275-281

    Research output: Chapter in Book/Report/Conference proceedingChapter

  82. Published

    A note on the p->q norms of 2-positive maps

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 4, p. 1436-1440 5 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A Penrose polynomial for embedded graphs

    A. Ellis-Monaghan, J. & Moffatt, I., 2013, In: European Journal of Combinatorics. 34, 2, p. 424-445

    Research output: Contribution to journalArticlepeer-review

  85. Published

    A permanent formula for the Jones polynomial

    Loebl, M. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 659-667 9 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    A point-distribution index and its application to sensor-grouping in wireless sensor networks

    Zhou, Y., Yang, H., Lyu, M. R. & Ngai, EC-H., 1 Jan 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. Vol. 2006. p. 1171-1176 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  88. E-pub ahead of print

    A Practical Cryptanalysis of the Algebraic Eraser

    Ben-Zvi, A., Blackburn, S. & Tsaban, B., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 179-189 11 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  90. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    A probabilistic counting lemma for complete graphs

    Gerke, S., Marciniszyn, M. & Steger, A., Dec 2007, In: Random Structures and Algorithms. 31, 4, p. 517-534 18 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    A problem in the metric theory of Diophantine approximation

    Harman, G., 1986, In: Quart. J. Math. Oxford (2). 37, p. 391-400 10 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    A problem of Hooley in Diophantine approximation

    Harman, G., 1996, In: Glasgow Math. J.. 38, p. 299-308 10 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    A Proof of the Murnaghan–Nakayama Rule Using Specht Modules and Tableau Combinatorics

    Kochhar, J. & Wildon, M., 20 Feb 2020, In: Annals of combinatorics. p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H., 2006, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  98. E-pub ahead of print

    A Random Walk on the Indecomposable Summands of Tensor Products of Modular Representations of SL2 (Fp)

    McDowell, E., 12 Mar 2021, (E-pub ahead of print) In: Algebras and Representation Theory.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...15 Next