Home > Mathematics home > Research > Profile > Publications
  1. Published

    (e, 2e) reactions in helium: calculations with correlated wavefunctions

    Furtado, F. M. & O'Mahony, P. F., 1987, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 20, 13, p. L405

    Research output: Contribution to journalArticlepeer-review

  2. Published

    (e,2e) triple differential cross sections for the simultaneous ionization and excitation of helium

    Dupre, C., Lahmam-Bennani, A., Duguet, A., Mota-Furtado, F., O'Mahony, P. F. & Cappello, C. D., 1992, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 25, 1, p. 259

    Research output: Contribution to journalArticlepeer-review

  3. Published

    2D problems in groups

    Kar, A. & Nikolov, N., 13 Jan 2018, In: arXiv.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A 2-isomorphism theorem for delta-matroids

    Moffatt, I. & Oh, J., May 2021, In: Advances in applied mathematics. 126, 102133.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Birch-Goldbach theorem

    Brüdern, J., Dietmann, R., Liu, J. Y. & Wooley, T. D., 2010, In: Archiv der Mathematik. 94, 1, p. 53-58 6 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A bound on the size of separating hash families

    Blackburn, S. R., Etzion, T., Stinson, D. R. & Zaverucha, G. M., Oct 2008, In: Journal of Combinatorial Theory, Series A. 115, 7, p. 1246-1256 11 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  10. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A characterisation of anti-Löwner functions

    Audenaert, K. M. R., Dec 2011, In: Proceedings of the American Mathematical Society. 139, 12, p. 4217-4223

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A characterization for sparse epsilon-regular pairs

    Gerke, S. & Steger, A., 3 Jan 2007, In: The Electronic Journal of Combinatorics. 14, 1, p. - 12 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Characterization of Partially Dual Graphs

    Moffatt, I., Jul 2011, In: Journal of Graph Theory. 67, 3, p. 198-217 20 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A classification of all 1-Salem graphs

    McKee, J. & Gumbrell, L., 2014, In: LMS Journal of Computation and Mathematics. 17, 1, p. 582-594 13 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    A combinatorial method for calculating the moments of Lévy area

    Levin, D. & Wildon, M., 24 Jul 2008, In: Transactions of the American Mathematical Society. 360, 12, p. 6695-6709 15 p.

    Research output: Contribution to journalArticlepeer-review

  23. E-pub ahead of print

    A combinatorial proof of a plethystic Murnaghan--Nakayama rule

    Wildon, M., 16 Aug 2016, (E-pub ahead of print) In: SIAM Journal on Discrete Mathematics. 30, 3, p. 1526–1533 108 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A comparative study on the spin asymmetry and integrated cross sections for the electron-impact ionization of atomic hydrogen

    Berakdar, J., O'Mahony, P. F. & Mota-Furtado, F., 1997, In: Zeitschrift für Physik D Atoms, Molecules and Clusters. 39, 1, p. 41-48 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  26. Published

    A comparison of the entanglement measures negativity and concurrence

    Verstraete, F., Audenaert, K., Dehaene, J. & De Moor, B., 2001, In: Journal of Physics A: Mathematical and General. 34, 47, p. 10327-10332 6 p.

    Research output: Contribution to journalArticlepeer-review

  27. Published

    A Construction for Multisecret Threshold Schemes

    Martin, K. M., Jackson, W-A. & O'Keefe, C. M., 1996, In: Designs, Codes and Cryptography. 9, p. 287-303 17 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    A construction method for point divisible designs

    Beker, H. J. & Mitchell, C. J., 1978, In: Journal of Statistical Planning and Inference. 2, 3, p. 293-306 14 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    A constructive proof of the existence of Viterbi processes

    Lember, J. & Koloydenko, A., Apr 2010, In: IEEE Transactions on Information Theory. 56, 4, p. 2017-2033 17 p.

    Research output: Contribution to journalArticlepeer-review

  30. Submitted

    A continuity bound for the expected number of connected components of a random graph: a model for epidemics

    Audenaert, K., Hanson, E. & Datta, N., 13 Dec 2019, (Submitted) In: ArXiv.org. 1912, 05599

    Research output: Contribution to journalArticlepeer-review

  31. Published

    A contraction theorem for the largest eigenvalue of a multigraph

    McKee, J., 15 Nov 2018, In: Linear Algebra and Its Applications. 557, p. 339-349 11 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    A Correlation Coprocessor for Accurate Real-Time Ultrasonic Ranging of Multiple Objects Using the Transputer

    Brunfaut, M., Peremans, H., Audenaert, K., Blomme, R. & Van Campenhout, J. M., 1993, In: Microprocessors and Microsystems. 17, 10, p. 571-578

    Research output: Contribution to journalArticlepeer-review

  33. Published

    A critical review of the epidemiological evidence of effects of air pollution on dementia, cognitive function and cognitive decline in adult population

    Delgado-Saborit, J. M., Guercio, V., Gowers, A. M., Shaddick, G., Fox, N. C. & Love, S., 25 Feb 2021, In: Science of The Total Environment. 757, 143734.

    Research output: Contribution to journalReview articlepeer-review

  34. Published

    A cryptographic tour of the IPsec standards

    Paterson, K. G., 2006, In: Information Security Technical Report. 11, 2, p. 72-81 10 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    A de Finetti Representation Theorem for Quantum Process Tomography

    Fuchs, C. A., Schack, R. & Scudo, P. F., 2004, In: Physical Review A. 69, p. 062305 1 p.

    Research output: Contribution to journalArticlepeer-review

  36. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    A Designer's Guide to KEMs

    Dent, A. W., 2003, Cryptography and Coding: 9th IMA International Conference. Paterson, K. G. (ed.). Springer-Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Unpublished

    A Determinantal Inequality for the Geometric Mean with an Application in Diffusion Tensor Imaging

    Audenaert, K., 25 Feb 2015, (Unpublished) In: ArXiv.org. 1502.06902, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  39. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A fast modular exponentiation for RSA on systolic arrays

    Han, Y., Mitchell, C. J. & Gollmann, D., 1997, In: International Journal of Computer Mathematics. 63, p. 215-226 12 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    A finite de Finetti theorem for infinite-dimensional systems

    D'Cruz, C., Osborne, T. J. & Schack, R., 2007, In: Physical Review Letters. 98, p. 160406 1 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A framework for design and analysis of asymmetric fingerprinting protocols

    Martin, K. M. & Poh, G. S., 2007, Proceedings of Third International Symposium on Information Assurance and Security IAS 2007. IEEE Computer Society Press, p. 457-461 5 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A general approach to robust web metering

    Barwick, S. G., Jackson, W-A. & Martin, K. M., 2005, In: Designs, Codes and Cryptography. 36, 1, p. 5-27 23 p.

    Research output: Contribution to journalArticlepeer-review

  47. Published

    A General Decomposition Construction for Incomplete Secret Sharing Schemes

    van Dijk, M., Jackson, W-A. & Martin, K. M., 1998, In: Designs, Codes and Cryptography. 15, 3, p. 301-321 21 p.

    Research output: Contribution to journalArticlepeer-review

  48. Unpublished

    A generalisation of Mirsky's singular value inequalities

    Audenaert, K., 21 Oct 2014, (Unpublished) In: ArXiv.org. 1410.4941

    Research output: Contribution to journalArticle

  49. Published

    A Generalisation of the Discrete Fourier Transform

    Blackburn, S. R., 1996, Applications of Finite Fields, Proceedings of a conference held at Royal Holloway, University of London, Surrey U.K.. Gollmann, D. (ed.). Oxford: Oxford University Press, p. 111-116 6 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    A Generalisation of the Discrete Fourier Transform: Determining the Minimal Polynomial of a Periodic Sequence

    Blackburn, S. R., 1994, In: IEEE Transactions on Information Theory. 40, 5, p. 1702-1704 3 p.

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...31 Next