Home > Mathematics home > Research > Profile > Publications
  1. E-pub ahead of print

    α-z-Rényi relative entropies

    Audenaert, K. & Datta, N., 18 Feb 2015, (E-pub ahead of print) In: Journal of Mathematical Physics. 56, 2, p. 1-16 16 p., 022202.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Zitterbewegung and semiclassical observables for the Dirac equation

    Bolte, J. & Glaser, R., 2004, In: Journal of Physics A: Mathematical and General. 37, 24, p. 6359-6373

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Zetafunktionen in der Gruppentheorie - mit Augenmerk auf p-adische Liegruppen

    Klopsch, B., 2004, (Mathematisches Institut, Seminars).

    Research output: Working paperDiscussion paper

  4. Published

    Zeta functions related to the pro-p group SL1(Delta(p))

    Klopsch, B., Jul 2003, In: Mathematical Proceedings of the Cambridge Philosophical Society. 135, p. 45-57 13 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Zeta functions of three-dimensional p-adic Lie algebras

    Klopsch, B. & Voll, C., Sep 2009, In: Mathematische Zeitschrift. 263, 1, p. 195-210 16 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Zero/positive capacities of two-dimensional runlength constrained arrays

    Etzion, T. & Paterson, K. G., 2005, In: IEEE Transactions on Information Theory. 51, 9, p. 3186-3199 14 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Zero Modes of Quantum Graph Laplacians and an Index Theorem

    Bolte, J., Egger, S. & Steiner, F., May 2015, In: Annales Henri Poincare. 16, 5, p. 1155-1189 35 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In: Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticlepeer-review

  9. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  10. Published

    Why we should take a second look at access control in Unix

    Crampton, J., 2008, Proceedings of 13th Nordic Workshop on Secure IT Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    White hat vs. white hat: a new approach to managing business risk

    Martin, K. M. & MacKinnon, I. D., 2008, In: ISSA Journal. April, p. 10-15 and cover

    Research output: Contribution to journalArticlepeer-review

  12. Published

    When are correlations quantum? -- Verification and quantification of entanglement by simple measurements

    Audenaert, K. M. R. & Plenio, M. B., 8 Aug 2006, In: New Journal of Physics. 8, p. 266

    Research output: Contribution to journalArticlepeer-review

  13. Published

    What Can Identity-Based Cryptography Offer to Web Services?

    Crampton, J., Lim, H. W. & Paterson, K. G., 2007, Proceedings of the 5th ACM Workshop on Secure Web Services (SWS 2007), Alexandria, Virginia, USA.. ACM Press, p. 26-36 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Weyl's theorem in the measure theory of numbers

    Harman, G., Baker, R. & Coatney, R., 2010, Dependence in probability, analysis and number theory. Berkes, I., Bradley, R., Dehling, H., Peligrad, M. & Tichy, R. (eds.). Heber city: Kendrick Press, p. 51-72

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  15. Published

    Weyl's inequality and systems of forms

    Dietmann, R., 1 Mar 2015, In: Quarterly Journal of Mathematics. 66, 1, p. 97-110 14 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Weaknesses of protocols for updating the parameters of an established threshold scheme

    Martin, K. M. & Nakahara Jr, J., 2001, In: IEE Proc. Computers and Digital Techniques. 148, 1, p. 45-48 4 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Weaknesses in shared RSA key generation protocols

    Blackburn, S. R., Blake-Wilson, S., Burmester, M. & Galbraith, S. D., 1999, Cryptography and Coding, 7th IMA International Conference, Cirencester. Walker, M. (ed.). Berlin: Springer, p. 300-306 7 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Weak admissibility, primitivity, o-minimality, and Diophantine approximation

    Widmer, M., 17 Apr 2018, In: Mathematika. 64, 2, p. 475-496 22 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Wavefunction localisation for the hydrogen atom in parallel electric and magnetic fields

    Bivona, S., Schweizer, W., O'Mahony, P. F. & Taylor, K. T., 1988, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 21, 20, p. L617

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Watt's mean value theorem and Carmichael numbers

    Harman, G., 2008, In: International Journal of Number Theory. 4, p. 241-–248

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Wannier threshold law and the classical-quantum correspondence in three-body Coulomb breakup

    Chocian, P., Ihra, W. & O'Mahony, P. F., Jul 2000, In: Physical Review A. 62, 1, p. art. no.-014704 4 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Virtually soluble groups of type FP∞

    Martinez-Pérez, C. & Nucinkis, B. E. A., 2010, In: Commentarii Mathematici Helvetici. 85, 1, p. 135-150 16 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Vertices of Specht modules and blocks of the symmetric group

    Wildon, M., 2010, In: Journal of Algebra. 323, 8, p. 2243-2256 14 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...61 Next