Home > Mathematics home > Research > Profile > Publications
  1. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    An Upper Bound on the Size of a Code with the k-Identifiable Parent Property

    Blackburn, S. R., 2003, In: Journal of Combinatorial Theory, Series A. 102, p. 179-185 7 p.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Analysis of 3gpp-MAC and two-key 3gpp-MAC

    Knudsen, L. R. & Mitchell, C. J., May 2003, In: Discrete Applied Mathematics. 128, 1, p. 181-191

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Analysis of a hash-function of Yi and Lam

    Martin, K. M. & Mitchell, C. J., 1998, In: Electronics Letters. 34, 24, p. 2327-2328 2 p.

    Research output: Contribution to journalArticlepeer-review

  5. Unpublished
  6. Published

    Analysis of integrated cross sections and spin asymmetries for the electron-impact ionization of one and two-electron atomic system

    Berekdar, J., buckman, S. J., O'Mahony, P. & Mota-Furtado, F., 1997, Coincidence Studies of Electron and Photon Impact Ionization. Whelan, C. T. & Walters, H. R. J. (eds.). Plenum, p. 65-69

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Analytic groups over general pro-p domains

    Jaikin-Zapirain, A. & Klopsch, B., Oct 2007, In: Journal of the London Mathematical Society. 76, p. 365-383 19 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Analytic pro-p groups of small dimensions

    González-Sánchez, J. & Klopsch, B., Apr 2009, In: Journal of Group Theory. 12, 5, p. 711-734 24 p.

    Research output: Contribution to journalArticlepeer-review

  10. Unpublished

    Analyzing and Developing Role-Based Access Control Models

    Chen, L., 2011, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  11. Unpublished

    Anonymity and Time in Public-Key Encryption

    Quaglia, E., 2012, (Unpublished) 166 p.

    Research output: ThesisDoctoral Thesis

  12. Unpublished

    Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks

    Malip, A., 2014, (Unpublished) 156 p.

    Research output: ThesisDoctoral Thesis

  13. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Another postage stamp problem

    Mitchell, C. J., 1989, In: The Computer Journal. 32, p. 374-376 3 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Aperiodic and semi-periodic perfect maps

    Mitchell, C. J., Jan 1995, In: IEEE Transactions on Information Theory. 41, 1, p. 88-95 8 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Applications of Combinatorial Mathematics: Proceedings of the IMA Conference, Oxford, December 1994

    Mitchell, C. J. (ed.), 1997, Oxford University Press. 241 p.

    Research output: Book/ReportAnthology

  19. Published

    Applications of Combinatorics to Security

    Blackburn, S. R. & Piper, F. C., 1997, Proceedings of 'The Applications of Combinatorial Mathematics', Oxford, 14-16 December 1994. Mitchell, C. (ed.). Oxford: Oxford University Press, p. 31-47 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Applications of Exponential Sums in Communications Theory

    Paterson, K. G., 1999, Cryptography and Coding. Walker, M. (ed.). Springer, p. 1-24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Published

    Applications of the oriented permission role-based access control model

    Crampton, J. & Chen, L., 2007, Proceedings of the 26th IEEE International Performance Computing and Communications Conference. IEEE Computer Society Press, p. 387-394 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Applying Cryptography within the ASPeCT Project, Information Security Technical Report

    Martin, K. M., 1998, In: Elsevier Advanced Technology. 2, 4, p. 41-53 13 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Applying hierarchial and role-based access control to XML documents

    Crampton, J., 2004, Proceedings of 2004 ACM Workshop on Secure Web Services. ACM Press, p. 37-46 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Applying hierarchical and role-based access control to XML documents

    Crampton, J., 2006, In: Computer Science and System Engineering. 21, 5, p. 325-338 14 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1...4 5 6 7 8 9 10 11 ...61 Next