Home > Mathematics home > Research > Profile > Publications
  1. Published

    Access control in a distributed object environment using XML and roles

    Crampton, J. & Khambhammettu, H., 2003, In: South African Computer Journal. 31, p. 2-8 7 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    Accurate ranging of multiple objects using ultrasonic sensors: Proceedings. IEEE International Conference on Robotics and Automation, 1992.

    Audenaert, K., Peremans, H., Kawahara, Y. & Van Campenhout, J., 1992.

    Research output: Contribution to conferenceOther

  3. Published

    Action of generalized symmetric groups on symmetric and exterior powers of their natural representations

    O'Donovan, W., 2017, In: COMMUNICATIONS IN ALGEBRA. 45, 3, p. 1314-1322 9 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Adapting the weaknesses of the random oracle model to the generic group model

    Dent, A. W., 2002, Advances in Cryptology -- Asiacrypt 2002. Zheng, Y. (ed.). Springer-Verlag, p. 100-109 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Addressing privacy issues in CardSpace

    Alrodhan, W. & Mitchell, C. J., 2007, Proceedings of IAS '07, Third International Symposium on Information Assurance and Security, Manchester, UK, August 2007. IEEE Computer Society Press, p. 285-291 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Adjusted Viterbi training. Proof of Concept

    Lember, J. & Koloydenko, A., 2007, In: Probability in the Engineering and Informational Sciences. 21, 3, p. 451-475 25 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Administrative scope and hierarchy operations

    Crampton, J. & Loizou, G., 2002, Proceedings of 7th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 145-154 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Administrative Scope: A Foundation for Role-Based Administrative Models

    Crampton, J. & Loizou, G., 2003, In: ACM Transactions on Information and System Security. 6, 2, p. 201-231 31 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Advances in spatiotemporal models for non-communicable disease surveillance

    Blangiardo, M., Boulieri, A., Diggle, P., Piel, F. B., Shaddick, G. & Elliott, P., 1 Apr 2020, In: International Journal of Epidemiology. 49, p. I26-I37

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Adversarial resilience of matchings in bipartite random graphs

    Balister, P., Gerke, S. & McDowell, A., 2 Dec 2016, In: Journal of Combinatorics. 8, 1, p. 79-92 14 p.

    Research output: Contribution to journalArticlepeer-review

  11. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Algebraic Aspects of the Advanced Encryption Standard

    Cid, C., Murphy, S. & Robshaw, M., 2006, Springer.

    Research output: Book/ReportBook

  14. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Unpublished

    Algorithmic Algebraic Techniques and their Application to Block Cipher Cryptanalysis

    Albrecht, M., 2010, (Unpublished) 176 p.

    Research output: ThesisDoctoral Thesis

  17. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Algorithmic information and simplicity in statistical physics

    Schack, R., 1 Jan 1997, In: Int. J. Theor. Phys.. 36, p. 209-226 18 p.

    Research output: Contribution to journalArticlepeer-review

  19. Unpublished

    Algorithmic, probabilistic, and physics-inspired methods for cuts and shortest paths in graphs

    Mezei, B., 2020, (Unpublished) 143 p.

    Research output: ThesisDoctoral Thesis

  20. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Algorithms for generating convex sets in acyclic digraphs

    Balister, P., Gerke, S., Gutin, G., Johnstone, A., Reddington, J., Scott, E., Soleimanfallah, A. & Yeo, A., Dec 2009, In: Journal of Discrete Algorithms. 7, 4, p. 509–518 10 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Almost-primes in short intervals

    Harman, G., 1981, In: Mathematische Annalen. 258, p. 107-112 6 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J., 2009, Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In: International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticlepeer-review

Previous 12 3 4 5 6 7 8 9 ...61 Next