Home > Mathematics home > Research > Profile > Publications
  1. Published

    Upper bounds on the error probabilities and asymptotic error exponents in quantum multiple state discrimination

    Audenaert, K. & Mosonyi, M., Oct 2014, In: Journal of Mathematical Physics. 55, 10, 39 p., 102201.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    User's guide to cryptography and standards

    Dent, A. W. & Mitchell, C. J., 2005, Artech House.

    Research output: Book/ReportBook

  5. Published

    Using a quantum computer to investigate quantum chaos

    Schack, R., 1998, In: Physical Review A. 57, p. 1634-1635 2 p.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  8. Unpublished

    Using Encoding to Reduce the Errors in Quantum Spin Chains

    Keele, C., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  9. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Using Separable Bell-Diagonal States to Distribute Entanglement

    Kay, A., 21 Aug 2012, In: Physical Review Letters. 109, 8, 080503.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Using Trusted Computing in Commercial Grids

    Yau, P-W. & Tomlinson, A., 1 Jul 2007, p. 31-36. 6 p.

    Research output: Contribution to conferencePaper

  14. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Utilisation de la méthode de la matrice R dans les calculs de l'ionisation d'atomes par impact d'électrons rapides

    Mota-Furtado, F., O'Mahony, P. & Hennecart, D. (ed.), 1989, Proceedings of Invited Lectures presented at 12ème Colloque sur la Physique des Collisions Atomiques et Electroniques (Caen, 21-24 June 1988), Conférences Invitées. Vol. 2. p. 101-117

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Variance bounds, with an application to norm bounds for commutators

    Audenaert, K. M. R., 15 Feb 2010, In: Linear Algebra and Its Applications. 432, 5, p. 1126-1143 18 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Variants of the second Borel-Cantelli lemma and their applications in Metric Number Theory

    Harman, G., 2000, Number Theory. Bambah, Dumir & Hans-Gill (eds.). Hindustan Book Agency, p. 121-140 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Published

    Variational Characterisations of Separability and Entanglement of Formation

    Audenaert, K., Verstraete, F. & De Moor, B., 2001, In: Physical Review A. 64, p. 052304

    Research output: Contribution to journalArticlepeer-review

  19. Unpublished

    Variational Simulation of Continuous Quantum Systems

    Harrison-Schmidt, S., 2013, (Unpublished) 175 p.

    Research output: ThesisDoctoral Thesis

  20. Published

    Variations on the Koksma-Hlawka Inequality

    Harman, G., 2010, In: Uniform Distribution Theory. 5, p. 65-78 14 p.

    Research output: Contribution to journalArticlepeer-review

  21. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Vertices of Modules and Decomposition Numbers of C2 ≀ Sn

    Kochhar, J., 20 Nov 2018, (E-pub ahead of print) In: Algebras and Representation Theory. p. 1-29 29 p.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Vertices of Specht modules and blocks of the symmetric group

    Wildon, M., 2010, In: Journal of Algebra. 323, 8, p. 2243-2256 14 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Virtually soluble groups of type FP∞

    Martinez-Pérez, C. & Nucinkis, B. E. A., 2010, In: Commentarii Mathematici Helvetici. 85, 1, p. 135-150 16 p.

    Research output: Contribution to journalArticlepeer-review