Home > Mathematics home > Research > Profile > Publications
  1. 2012
  2. Published

    Trace inequalities for completely monotone functions and Bernstein functions

    Audenaert, K. M. R., 15 Jul 2012, In: Linear Algebra and Its Applications. 437, 2, p. 601-611

    Research output: Contribution to journalArticlepeer-review

  3. Published

    On equilibrium distribution of a reversible growth model

    Shcherbakov, V. & Yambartsev, A., Jul 2012, In: Journal of Statistical Physics. 148, 1, p. 53-66

    Research output: Contribution to journalArticlepeer-review

  4. Published

    On the Seifert graphs of a link diagram and its parallels

    Huggett, S., Moffatt, I. & Virdee, N., Jul 2012, In: Mathematical Proceedings of the Cambridge Philosophical Society. 153, p. 123-145 23 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Partial duals of plane graphs, separability and the graphs of knots

    Moffatt, I., 19 May 2012, In: Algebraic and geometric topology. 12, 2, p. 1099-1136 38 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Random Diophantine inequalities of additive type

    Brüdern, J. & Dietmann, R., 1 Apr 2012, In: Advances in Mathematics. 229, 6, p. 3079-3095

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  11. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Least zero of a cubic form

    Browning, T. D., Dietmann, R. & Elliott, P. D. T. A., Mar 2012, In: Mathematische Annalen. 352, 3, p. 745-778

    Research output: Contribution to journalArticlepeer-review

  13. Published

    On the Potts Model Partition Function in an External Field

    McDonald, L. M. & Moffatt, I., Mar 2012, In: Journal of Statistical Physics. 146, 6, p. 1288-1302 15 p.

    Research output: Contribution to journalArticlepeer-review

  14. Published

    Twisted Duality for Embedded Graphs

    Ellis-Monaghan, J. A. & Moffatt, I., Mar 2012, In: Transactions of the American Mathematical Society. 364, 3, p. 1529-1569 41 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    How to Counteract Systematic Errors in Quantum State Transfer

    Marletto, C., Kay, A. & Ekert, A., 14 Feb 2012, In: Quantum Information and Computation.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Fixed points of finite groups acting on generalised Thompson groups

    Kochloukova, D. H., Martínez-Pérez, C. & Nucinkis, B. E. A., Jan 2012, In: Israel Journal of Mathematics. 187, 1, p. 167-192

    Research output: Contribution to journalArticlepeer-review

  17. Published

    On the distribution of Galois groups

    Dietmann, R., Jan 2012, In: Mathematika. 58, 1, p. 35-44

    Research output: Contribution to journalArticlepeer-review

  18. Published

    The existence of k-radius sequences

    Blackburn, S. R., Jan 2012, In: Journal of Combinatorial Theory, Series A. 119, 1, p. 212-217

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  20. Published

    A model of point configurations given by a semi-parametric interaction

    Grabarnik, P. & Shcherbakov, V., 2012, In: Moscow University Mathematics Bulletin. 67, 2, p. 47-51

    Research output: Contribution to journalArticlepeer-review

  21. Published

    A note on generators of number fields

    Widmer, M. & Vaaler, J., 2012, In: Contemporary Mathematics. 587

    Research output: Contribution to journalArticlepeer-review

  22. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  24. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Unpublished

    Anonymity and Time in Public-Key Encryption

    Quaglia, E., 2012, (Unpublished) 166 p.

    Research output: ThesisDoctoral Thesis

  26. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Unpublished

    Arithmetic groups, base change and representation growth

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2012, (Unpublished) In: Preprint.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  30. Published

    Counting primes whose sum of digits is prime

    Harman, G., 2012, In: Journal of Integer Sequences. 15, p. 1 7 p., 12.2.2.

    Research output: Contribution to journalArticlepeer-review

  31. Unpublished

    Cyclotomic Matrices over Quadratic Integer Rings

    Greaves, G., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  32. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Unpublished

    Design and Analysis of Electronic Feedback Mechanisms

    Li, Q., 2012, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  34. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  36. Unpublished

    Efficient time propagation techniques for few-body quantum systems

    Frapacinni, A., Hamido, A., Schröter, S., Madronero, J., Eiglsperger, J., Mota-Furtado, F., O'Mahony, P., Hervieux, P-A. & Piraux, B., 2012, (Unpublished) In: Central European Journal of Physics.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-Marketplaces

    Li, Q., Zhang, J. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012) . IEEE Computer Society Press, p. 334-341

    Research output: Chapter in Book/Report/Conference proceedingChapter

  38. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Unpublished

    Generalised Key Distribution Patterns

    Novak, J., 2012, (Unpublished) 170 p.

    Research output: ThesisDoctoral Thesis

  40. Published

    Hilbert cubes in progression-free sets and in the set of squares

    Dietmann, R. & Elsholtz, C., 2012, In: Israel Journal of Mathematics. 192, 1, p. 59-66

    Research output: Contribution to journalArticlepeer-review

  41. Unpublished

    Information propagation through disordered quantum spin chains

    Burrell, C., 2012, (Unpublished) 133 p.

    Research output: ThesisDoctoral Thesis

  42. Published

    Integer symmetric matrices of small spectral radius and small Mahler measure

    McKee, J. & Smyth, C., 2012, In: International Mathematics Research Notices. 2012, 1, p. 102-136 35 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Lipschitz class, narrow class, and counting lattice points

    Widmer, M., 2012, In: Proceedings of the American Mathematical Society. 140, 2

    Research output: Contribution to journalArticlepeer-review

  44. Unpublished

    Managing Identity Management Systems

    Al-Sinani, H., 2012, (Unpublished) 423 p.

    Research output: ThesisDoctoral Thesis

  45. Unpublished

    Mitigating the Risk of Insider Threats When Sharing Credentials

    Alawneh, M., 2012, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  46. Published

    On norm sub-additivity and super-additivity inequalities for concave and convex functions

    Audenaert, K. & Aujla, J. S., 2012, In: Linear and Multilinear Algebra. 60, 11-12, p. 1369-1389

    Research output: Contribution to journalArticlepeer-review

  47. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Primes whose sum of digits is prime and metric number theory

    Harman, G., 2012, In: Bulletin of the London Mathematical Society. 44, 5, p. 1042-1049

    Research output: Contribution to journalArticlepeer-review

  51. Forthcoming

    Problems and conjectures in matrix and operator inequalities

    Audenaert, K. & Kittaneh, F., 2012, (Accepted/In press) Operator theory. (Banach Center Publications).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  52. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Quantum state discrimination bounds for finite sample size

    Audenaert, K., Mosonyi, M. & Verstraete, F., 2012, In: Journal of Mathematical Physics. 53, 122205.

    Research output: Contribution to journalArticlepeer-review

  54. Unpublished

    Random Graph Processes

    Makai, T., 2012, (Unpublished) 124 p.

    Research output: ThesisDoctoral Thesis

  55. Published

    Representation zeta functions of some compact p-adic analytic groups

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2012, Zeta Functions in Algebra and Geometry. Campillo, A., Cardona, G., Melle-Hernández, A., Veys, W. & Zúñiga-Galindo, W. A. (eds.). American Mathematical Society, p. 295-330 (Contemporary Mathematics; vol. 566).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  56. Published

    Salem numbers and Pisot numbers via interlacing

    McKee, J. & Smyth, C., 2012, In: Canadian Journal of Mathematics. 64, 2, p. 345-367

    Research output: Contribution to journalArticlepeer-review

  57. Published

    Salem numbers and Pisot numbers via interlacing

    McKee, J. & Smyth, C., 2012, In: Canadian Journal of Mathematics. 64, 2, p. 345-367 23 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Separability and the genus of a partial dual

    Moffatt, I., 2012, In: European Journal of Combinatorics. 34, 2, p. 355-378

    Research output: Contribution to journalArticlepeer-review

  60. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In: Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticlepeer-review

  61. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  62. 2011
  63. Published

    Capabilities of a Perturbed Toric Code as a Quantum Memory

    Kay, A., 29 Dec 2011, In: Physical Review Letters. 107, 27, 5 p., 270502.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    A characterisation of anti-Löwner functions

    Audenaert, K. M. R., Dec 2011, In: Proceedings of the American Mathematical Society. 139, 12, p. 4217-4223

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Continuity bounds on the quantum relative entropy - II

    Audenaert, K. & Eisert, J., Nov 2011, In: Journal of Mathematical Physics. 52, 7 p., 112201.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Set families and Foulkes modules

    Paget, R. & Wildon, M., Nov 2011, In: Journal of Algebraic Combinatorics. 34, 3, p. 525-544 20 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  69. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A permanent formula for the Jones polynomial

    Loebl, M. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 659-667 9 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Abstract commensurators of profinite groups

    Barnea, Y., Ershov, M. & Weigel, T., Oct 2011, In: Transactions of the American Mathematical Society. 363, 10, p. 5381-5417 37 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Expansions for the Bollobas-Riordan Polynomial of Separable Ribbon Graphs

    Huggett, S. & Moffatt, I., Oct 2011, In: Annals of combinatorics. 15, 4, p. 675-706 32 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    The Tutte-Potts connection in the presence of an external magnetic field

    Ellis-Monaghan, J. A. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 772-782 11 p.

    Research output: Contribution to journalArticlepeer-review

  74. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  75. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaperpeer-review

  77. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  78. Published

    Local Realism of Macroscopic Correlations

    Ramanathan, R., Paterek, T., Kay, A., Kurzynski, P. & Kaszlikowski, D., 3 Aug 2011, In: Physical Review Letters. 107, 6, 5 p., 060405.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Time scaling with efficient time-propagation techniques for atoms and molecules in pulsed radiation fields

    Hamido, A., Eiglsperger, J., Madronero, J., Mota-Furtado, F., O'Mahony, P. F., Frapiccini, A. & Piraux, B., 27 Jul 2011, In: Physical Review A. 84, 013422.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  81. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    A Characterization of Partially Dual Graphs

    Moffatt, I., Jul 2011, In: Journal of Graph Theory. 67, 3, p. 198-217 20 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In: Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticlepeer-review

  86. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  87. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  88. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Computing totally positive algebraic integers of small trace

    McKee, J., Apr 2011, In: Mathematics of Computation. 80, 274, p. 1041 1052 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Hidden Markov Models, Theory and Applications: Theory of Segmentation

    Lember, J., Kuljus, K. & Koloydenko, A., Apr 2011, Hidden Markov Models, Theory and Applications: Theory of Segmentation . Dymarski, P. (ed.). Rijeka, Croatia: InTech, p. 51-84 34 p. (Bioinformatics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  92. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In: International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Pegging graphs yields a small diameter

    Gerke, S., Steger, A. & Wormald, N., Mar 2011, In: Combinatorics, Probability and Computing. 20, 2, p. 239-248 9 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Threshold Anonymous Announcement in VANETs.

    Chen, LI., Ng, S-L. & Wang, G., Mar 2011, In: IEEE Journal on Selected Areas in Communications. 29, 3, p. 605-615

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Unsigned State Models for the Jones Polynomial

    Moffatt, I., Mar 2011, In: Annals of combinatorics. 15, 1, p. 127-146 20 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    New Most Efficient State Recovery Attacks on an eSTREAM Candidate F-FCSR-H v2 and F-FCSR-H Stream Ciphers

    Ali, A., 21 Feb 2011, p. 240--246. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  97. Published

    On w-maximal groups

    Gonzalez-Sanchez, J. & Klopsch, B., 15 Feb 2011, In: Journal of Algebra. 328, p. 155-166

    Research output: Contribution to journalArticlepeer-review

  98. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  100. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...15 Next