Home > Mathematics home > Research > Profile > Publications
  1. 2014
  2. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  3. Published

    Explicit schemes for time propagating many-body wavefunctions

    Frapiccini, A., Hamido, A., Schroter, S., Pyke, D., Mota-Furtado, F., O'Mahony, P., Madronero, J., Eiglsperger, J. & Piraux, B., 14 Feb 2014, In: Physical Review A. 89, 023418.

    Research output: Contribution to journalArticlepeer-review

  4. E-pub ahead of print

    The Potts model and chromatic functions of graphs

    Klazar, M., Loebl, M. & Moffatt, I., 4 Feb 2014, (E-pub ahead of print) In: Annales de L’Institut Henri Poincaré D. 1, 1, p. 47–60 14 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Decoherence-assisted transport in quantum networks

    Marais, A., Sinayskiy, I., Kay, A., Petruccione, F. & Ekert, A., 26 Jan 2014, In: New Journal of Physics.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Bridging Viterbi and Posterior Decoding: A Generalized Risk Approach to Hidden Path Inference Based on Hidden Markov Models

    Lember, J. & Koloydenko, A. A., Jan 2014, In: Journal of Machine Learning Research. 15, p. 1-58 58 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Photonic coherent state transfer with Hamiltonian dynamics

    Kay, A., Jan 2014, In: Optics Letters. 39, p. 123 4 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A classification of all 1-Salem graphs

    McKee, J. & Gumbrell, L., 2014, In: LMS Journal of Computation and Mathematics. 17, 1, p. 582-594 13 p.

    Research output: Contribution to journalArticlepeer-review

  9. Unpublished

    Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks

    Malip, A., 2014, (Unpublished) 156 p.

    Research output: ThesisDoctoral Thesis

  10. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  12. Published

    Comparisons between quantum state distinguishability measures

    Audenaert, K., 2014, In: Quantum Inf. Comput.. 14, 1&2, p. 31-38

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Maximal Subgroups of Branch Groups

    Alexoudas, T., 2014, (Unpublished)

    Research output: ThesisDoctoral Thesis

  15. Published

    Non-Bipartite Graphs of Small Mahler Measure

    McKee, J., Cooley, J. & Smyth, C., 2014, In: Journal of Combinatorics and Number Theory. 5, 2, p. 53-64 12 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Orbit coherence in permutation groups

    Wildon, M. & Britnell, J. R., 2014, In: Journal of Group Theory. 17, p. 73 109 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Quantum Measurement and the Paulian Idea

    Fuchs, C. A. & Schack, R., 2014, The Pauli-Jung Conjecture : And its impact today. Atmanspacher, H. & Fuchs, C. A. (eds.). Exeter: Imprint Academic, p. 93-108 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  19. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Unpublished

    Spanning Structures of Graphs

    Mcdowell, A., 2014, (Unpublished) 151 p.

    Research output: ThesisDoctoral Thesis

  23. Published

    Telescopic Relative Entropy

    Audenaert, K., 2014, Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid. Springer, Vol. LNCS 6745. p. 39-52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    The density of twins of $k$-free numbers

    Dietmann, R. & Marmon, O., 2014, In: Bulletin of the London Mathematical Society. 46, 4, p. 818-826 9 p.

    Research output: Contribution to journalArticlepeer-review

  25. 2013
  26. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In: Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Schur multiplier norms for Loewner matrices

    Audenaert, K., 1 Nov 2013, In: Linear Algebra and Its Applications. 439, 9, p. 2598-2608

    Research output: Contribution to journalArticlepeer-review

  30. Published

    Heat kernel asymptotics for magnetic Schrödinger operators

    Bolte, J. & Keppeler, S., Nov 2013, In: Journal of Mathematical Physics. 54, 11, 112104.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    The Duffin-Schaeffer Conjecture with extra divergence II

    Harman, G., Beresnevich, V., Haynes, A. & Velani, S., 1 Oct 2013, In: Math. Zeit.. 275, p. 127–133 7 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Diagnosis of tumors during tissue-conserving surgery with integrated autofluorescence and Raman scattering microscopy

    Kong, K., Rowlands, C., Varma, S., Perkins, W., Leach, I., Koloydenko, A., Williams, H. & Notingher, I., 17 Sep 2013, In: Proceedings of the National Academy of Sciences of the United States of America. 110, 38, p. 15189-15194 6 p.

    Research output: Contribution to journalArticlepeer-review

  34. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    On matrix inequalities between the power means: counterexamples

    Audenaert, K. & Hiai, F., 1 Sep 2013, In: Linear Algebra and Its Applications. 439, 5, p. 1590-1604

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Optimal Asymmetric Quantum Cloning

    Kay, A., Ramanathan, R. & Kaszlikowski, D., Sep 2013, In: Quantum Information and Computation. 13, p. 880

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  39. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    On p-deficiency in groups

    Barnea, Y. & Schlage-Puchta, J. C., Jul 2013, In: Journal of Group Theory. 16, 4, p. 497-517 21 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Counting lattice points and o-minimal structures

    Barroero, F. & Widmer, M., 10 Jun 2013, In: International Mathematics Research Notices.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Single polynomials that correspond to pairs of cyclotomic polynomials with interlacing zeros

    McKee, J. & Smyth, C., 1 May 2013, In: Central European Journal of Mathematics. 11, 5, p. 882-899

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Limited measurement dependence in multiple runs of a Bell test

    E. Pope, J. & Kay, A., 17 Apr 2013, In: Physical Review A. 88, 032110.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Bipartite partial duals and circuits in medial graphs

    Huggett, S. & Moffatt, I., Apr 2013, In: Combinatorica. 33, 2, p. 231-252 22 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Bipartite partial duals and circuits in medial graphs

    Huggett, S. & Moffatt, I., Apr 2013, In: Combinatorica. 33, 2, p. 231-252

    Research output: Contribution to journalArticlepeer-review

  47. Published

    Coherent Quantum Transport in Photonic Lattices

    Perez-Leija, A., Keil, R., Kay, A., Moya-Cessa, H., Nolte, S., Kwek, L-C., M. Rodríguez-Lara, B., Szameit, A. & N. Christodoulides, D., Jan 2013, In: Physical Review A. 87, 012309.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    On the Montgomery-Hooley Theorem in Short Intervals

    Harman, G., Jan 2013, In: Mathematika. 59, p. 129-139 11 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    A Penrose polynomial for embedded graphs

    A. Ellis-Monaghan, J. & Moffatt, I., 2013, In: European Journal of Combinatorics. 34, 2, p. 424-445

    Research output: Contribution to journalArticlepeer-review

  50. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Bredon cohomological finiteness conditions for generalisations of Thompson's groups

    Martinez-Perez, C. & Nucinkis, B., 2013, In: Groups, Geometry, and Dynamics. 7, 4

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Cohomological finiteness properties of the Brin-Thompson-Higman groups 2V and 3V

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2013, In: Proceedings of the Edinburgh Mathematical Society (Series 2). 56, 03, p. 777-804 28 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Comment on "Adiabatic quantum computation with a one-dimensional projector Hamiltonian"

    Kay, A., 2013, In: Physical Review A. 88, 046301.

    Research output: Contribution to journalArticlepeer-review

  56. Published

    Counting points of fixed degree and given height over function fields

    Thunder, J. L. & Widmer, M., 2013, In: Bulletin of the London Mathematical Society. 45, 2, p. 283-300 24 p.

    Research output: Contribution to journalArticlepeer-review

  57. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  58. Published

    Deformations and rigidity of lattices in solvable Lie groups

    Baues, O. & Klopsch, B., 2013, In: Journal of Topology.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Finding a princess in a palace: a pursuit–evasion problem

    Wildon, M. & Britnell, J. R., 2013, In: The Electronic Journal of Combinatorics. 20, 1, 8 p., 25.

    Research output: Contribution to journalArticlepeer-review

  61. Unpublished

    Fingerprinting Codes and Separating Hash Families

    Rochanakul, P., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  62. Published

    Graphs on Surfaces: Dualities, Polynomials, and Knots

    Moffatt, I. & Ellis-Monaghan, J. A., 2013, Springer.

    Research output: Book/ReportBook

  63. Unpublished

    Hereditarily Just Infinite Profinite Groups that are Not Virtually Pro-p

    Middleton, S., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  64. Unpublished

    Improvements and Generalisations of Signcryption Schemes

    Zhang, W., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  65. Published

    In-betweenness: a geometrical monotonicity property for operator means

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 4, p. 1769-1778

    Research output: Contribution to journalArticlepeer-review

  66. Unpublished

    Interacting many-particle systems on general compact quantum graphs

    Kerner, J., 2013, (Unpublished) 152 p.

    Research output: ThesisDoctoral Thesis

  67. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    On gaps between primitive roots in the Hamming metric

    Dietmann, R., Elsholtz, C. & Shparlinski, I. E., 2013, In: Quarterly Journal of Mathematics. 64, 4, p. 1043-1055 13 p.

    Research output: Contribution to journalArticle

  69. Published

    On gaps between quadratic non-residues in the Euclidean and Hamming metrics

    Dietmann, R., Elsholtz, C. & Shparlinski, I. E., 2013, In: Indag. Math. (N.S.). 24, 4, p. 930-938 9 p.

    Research output: Contribution to journalArticle

  70. Unpublished

    On spectral constructions for Salem graphs

    Gumbrell, L., 2013, (Unpublished) 102 p.

    Research output: ThesisDoctoral Thesis

  71. Published

    On the asymmetry of the relative entropy

    Audenaert, K., 2013, In: Journal of Mathematical Physics. 54, 073506.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    On the classifying space for the family of virtually cyclic subgroups for elementary amenable groups

    Fluch, M. & Nucinkis, B., 2013, In: Proceedings of the American Mathematical Society. 141 , 11

    Research output: Contribution to journalArticlepeer-review

  73. Published

    On the Erdős–Falconer distance problem for two sets of different size in vector spaces over finite fields

    Dietmann, R., 2013, In: Monatshefte für Mathematik. 170, 3-4, p. 343-359

    Research output: Contribution to journalArticlepeer-review

  74. Published

    On the Northcott property and other properties related to polynomial mappings

    Widmer, M. & Checcoli, S., 2013, In: Mathematical Proceedings of the Cambridge Philosophical Society. 155, 1

    Research output: Contribution to journalArticlepeer-review

  75. Published

    On the representation of quadratic forms by quadratic forms

    Dietmann, R. & Harvey, M., 2013, In: Michigan Math. J.. 62, 4, p. 869-889 21 p.

    Research output: Contribution to journalArticle

  76. Forthcoming

    On types of matrices and centralizers of matrices and permutations

    Wildon, M. & Britnell, J. R., 2013, (Accepted/In press) In: Journal of Group Theory.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Probabilistic Galois theory

    Dietmann, R., 2013, In: Bulletin of the London Mathematical Society. 45, 3, p. 453-462 10 p.

    Research output: Contribution to journalArticle

  79. Published

    Quantum graphs with singular two-particle interactions

    Bolte, J. & Kerner, J., 2013, In: Journal of Physics A: Mathematical and Theoretical. 46, 4, 045206.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Quantum graphs with two-particle contact interactions

    Bolte, J. & Kerner, J., 2013, In: Journal of Physics A: Mathematical and Theoretical. 46, 4, 18 p., 045207.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Representation zeta functions of compact p-adic analytic groups and arithmetic groups

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2013, In: Duke Mathematical Journal. 162, 1, p. 111-197

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  84. Published

    Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

    Yau, K-L. A., Poh, G. S. & Komisarczuk, P., 2013, In: IJAHUC. 12, 3, p. 157-176 20 p.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Small zeros of homogeneous cubic congruences

    Dietmann, R., 2013, Diophantine methods, lattices, and arithmetic theory of quadratic forms. Amer. Math. Soc., Providence, RI, Vol. 587. p. 59-68 10 p. (Contemp. Math.).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  87. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Unpublished

    Variational Simulation of Continuous Quantum Systems

    Harrison-Schmidt, S., 2013, (Unpublished) 175 p.

    Research output: ThesisDoctoral Thesis

  89. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. 2012
  91. Published

    Cyclotomic matrices over the Eisenstein and Gaussian integers

    Greaves, G., 15 Dec 2012, In: Journal of Algebra. 372, p. 560-583 24 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Cyclotomic matrices over real quadratic integer rings

    Greaves, G., 1 Nov 2012, In: Linear Algebra and Its Applications. 437, 9, p. 2252-2261 10 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    The effects of reduced "free will" on Bell-based randomness expansion

    Enshan Koh, D., J. W. Hall, M., [No Value], S., E. Pope, J., Marletto, C., Kay, A., Scarani, V. & Ekert, A., 18 Oct 2012, In: Physical Review Letters. 109, 160404.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    Constructing k-radius sequences

    R. Blackburn, S. & F. McKee, J., Oct 2012, In: Mathematics of Computation. 81, 280, p. 2439-2459

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  100. Published

    Implications of ignorance for quantum-error-correction thresholds

    Kay, A., 24 Aug 2012, In: Physical Review A. 89, 032328.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    Using Separable Bell-Diagonal States to Distribute Entanglement

    Kay, A., 21 Aug 2012, In: Physical Review Letters. 109, 8, 080503.

    Research output: Contribution to journalArticlepeer-review

  102. Published

    On the relation between the MXL family of algorithms and Groebner basis algorithms

    Albrecht, M., Cid, C., Faugere, J-C. & Perret, L., Aug 2012, In: Journal of Symbolic Computation. 47, 8, p. 926-941 16 p.

    Research output: Contribution to journalArticlepeer-review

  103. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In: IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticlepeer-review

Previous 1 2 3 4 5 6 7 8 ...15 Next