Home > Mathematics home > Research > Profile > Publications
  1. E-pub ahead of print

    A note on recognizing an old friend in a new place: list coloring and the zero-temperature Potts model

    A. Ellis-Monaghan, J. & Moffatt, I., 31 Dec 2014, (E-pub ahead of print) In: Annales de L’Institut Henri Poincaré D. 1, 4, p. 429–442 14 p.

    Research output: Contribution to journalArticlepeer-review

  2. Unpublished

    A note on scaling limits for truncated birth-and-death processes with interaction

    Shcherbakov, V. & Yambartsev, A., 2016, (Unpublished) In: ArXiv.org.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    A Note on Sequences with the Shift and Add Property

    Blackburn, S. R., 1996, In: Designs, Codes and Cryptography. 9, p. 251-256 6 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    A note on the metrical theory of continued fractions

    Harman, G. & Wong, K. C., 2000, In: American Mathematical Monthly. 107, p. 834-837 4 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A note on the Mittag–Leffler condition for Bredon-modules

    Fluch, M. G., Gandini, G. & Nucinkis, B., Feb 2017, In: Archiv der Mathematik. 108, 2, p. 133–143 11 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A note on the Möbius and Liouville functions

    Harman, G., Pintz, J. & Wolke, D., 1985, In: Studia Sci. Math. Hung.. 20, p. 295-299 5 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    A note on the number of divisors of quadratic polynomials, in Sieve Methods

    McKee, J., 1997, Exponential Sums and their Applications in Number Theory. Cambridge University Press, p. 275-281

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Published

    A note on the p->q norms of 2-positive maps

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 4, p. 1436-1440 5 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Penrose polynomial for embedded graphs

    A. Ellis-Monaghan, J. & Moffatt, I., 2013, In: European Journal of Combinatorics. 34, 2, p. 424-445

    Research output: Contribution to journalArticlepeer-review

  11. Published

    A permanent formula for the Jones polynomial

    Loebl, M. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 659-667 9 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A point-distribution index and its application to sensor-grouping in wireless sensor networks

    Zhou, Y., Yang, H., Lyu, M. R. & Ngai, EC-H., 1 Jan 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. Vol. 2006. p. 1171-1176 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  14. E-pub ahead of print

    A Practical Cryptanalysis of the Algebraic Eraser

    Ben-Zvi, A., Blackburn, S. & Tsaban, B., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 179-189 11 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  16. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A probabilistic counting lemma for complete graphs

    Gerke, S., Marciniszyn, M. & Steger, A., Dec 2007, In: Random Structures and Algorithms. 31, 4, p. 517-534 18 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A problem in the metric theory of Diophantine approximation

    Harman, G., 1986, In: Quart. J. Math. Oxford (2). 37, p. 391-400 10 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A problem of Hooley in Diophantine approximation

    Harman, G., 1996, In: Glasgow Math. J.. 38, p. 299-308 10 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A Proof of the Murnaghan–Nakayama Rule Using Specht Modules and Tableau Combinatorics

    Kochhar, J. & Wildon, M., 20 Feb 2020, In: Annals of combinatorics. p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A provably secure refreshable partially anonymous token and its applications

    Shigetomi, R., Otsuka, A., Furukawa, J., Martin, K. M. & Imai, H., 2006, In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E89-A(5), p. 1396-1406 11 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  24. E-pub ahead of print

    A Random Walk on the Indecomposable Summands of Tensor Products of Modular Representations of SL2 (Fp)

    McDowell, E., 12 Mar 2021, (E-pub ahead of print) In: Algebras and Representation Theory.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...61 Next