Home > Mathematics home > Research > Profile > Publications
  1. 2011
  2. Unpublished

    Analyzing and Developing Role-Based Access Control Models

    Chen, L., 2011, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    Applications of galois geometry to cryptology

    Martin, K. M., 2011, Current Research Topics in Galois Geometry. Nova science, p. 215-244 (Mathematics Research Developments: Cryptography, Steganography and Data Security).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Asymptotic normality of the maximum likelihood estimator for cooperative sequential adsorption

    Penrose, M. D. & Shcherbakov, V., 2011, In: Advances in Applied Probability. 43, 3, p. 636-648

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Centralisers of finite subgroups in soluble groups of type $FP_n$

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2011, In: Forum Mathematicum.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Cohomological finiteness conditions in Bredon cohomology

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2011, In: Bulletin of the London Mathematical Society.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Cryptanalysis of three matrix-based key establishment protocols

    Blackburn, S., Cid, C. & Mullan, C., 2011, In: Journal of Mathematical Cryptology. 5, 2, p. 159–168 11 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Design of a multiagent-based e-marketplace to secure service trading on the Internet

    Li, Q., Martin, K. M. & Zhang, J., 2011, Proceedings of the 13th International Conference on Electronic Commerce (ICEC 2011) .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Discrimination between basal cell carcinoma and hair follicles in skin tissue sections by Raman micro-spectroscopy

    Larraona-Puy, M., Ghita, A., Zoladek, A., Varma, S., Koloydenko, A., Perkins, W., Leach, I., Williams, H. & Notingher, I., 2011, In: Journal of Molecular Structure. 993, 1, p. 57-61 5 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Extending the Scope of CardSpace

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of the 4th International Conference on Security of Information and Networks, SIN 2011, Sydney, NSW, Australia, November 14-19, 2011. Orgun, M. A., Elci, A., Makarevich, O. B., Huss, S. A., Pieprzyk, J., Babenko, L. K., Chefranov, A. G. & Shankaran, R. (eds.). New York: ACM, p. 235-238 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    Forensic Tracking and Surveillance: Algorithms for Homogeneous and Heterogeneous Settings

    Al-Kuwari, S., 2011, (Unpublished) 168 p.

    Research output: ThesisDoctoral Thesis

  16. Published

    Group Theory in Cryptography

    Blackburn, S., Cid, C. & Mullan, C., 2011, Group St Andrews 2009 in Bath. The London Mathematical Society, Vol. 387. p. 133-149 17 p. (LMS Lecture Note Series; vol. 387).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Identity-Based Cryptography for Grid Security

    Lim, H. W. & Paterson, K., 2011, In: International Journal of Information Security. 10, 1, p. 15-32

    Research output: Contribution to journalArticlepeer-review

  18. Published

    Integrating OAuth with Information Card Systems

    Al-Sinani, H. S., 2011, Proceedings of IAS '11: 7th International Conference on Information Assurance and Security, Malacca, Malaysia, 5-8 December 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Lectures on Profinite Topics in Group Theory

    Klopsch, B., Nikolov, N. & Voll, C., 2011, Cambridge University Press. 158 p. (London Mathematical Society Student Texts; no. 77)

    Research output: Book/ReportBook

  20. Published

    Near Field Technology in Challenging Environments

    Mayes, K., Cobourne, S. & Markantonakis, K., 2011, In: Smart Card Technology International. NFC and Contactless, p. 65-69

    Research output: Contribution to journalArticle

  21. Unpublished

    New Attacks on FCSR-based Stream Ciphers

    Ali, A., 2011, (Unpublished) 248 p.

    Research output: ThesisDoctoral Thesis

  22. Published

    No dense subgraphs appear in the triangle-free graph process

    Gerke, S. & Makai, T., 2011, In: The Electronic Journal of Combinatorics. 18, 1, 7 p., 168.

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Offline Peer-to-Peer Broadcast with Anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2011, E-business and Telecommunications. 3 ed. Springer, Vol. 130. p. 174-185 (Communications in Computer and Information Science ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    On certain infinite extensions of the rationals with Northcott property

    Widmer, M., 2011, In: Monatshefte für Mathematik. 162, 3

    Research output: Contribution to journalArticlepeer-review

  25. Published

    On Cipher-Dependent Related-Key Attacks in the Ideal Cipher Model

    Albrecht, M., Farshim, P., Paterson, K. & Watson, G., 2011, Fast Software Encryption (FSE). Joux, A. (ed.). Springer, Vol. 6733. p. 128-145 (Lecutre Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    On number fields with nontrivial subfields

    Widmer, M., 2011, In: International Journal of Number Theory. 7, 3

    Research output: Contribution to journalArticlepeer-review

  27. Published

    On the distribution of the coefficients of normal forms for Frobenius expansions

    McKee, J., Galbraith, S., Avanzi, R. & Benits, W., 2011, In: Designs, Codes and Cryptography. 61, 1, p. 71-89

    Research output: Contribution to journalArticlepeer-review

  28. Published

    ON THE DISTRIBUTION OF THE SUBSET SUM PSEUDORANDOM NUMBER GENERATOR ON ELLIPTIC CURVES

    Blackburn, S. R., Ostafe, A. & Shparlinski, I. E., 2011, In: Uniform Distribution Theory. 6, 1, p. 127-142 16 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    On the gaps between values of binary quadratic forms

    Brüdern, J. & Dietmann, R., 2011, In: Proceedings of the Edinburgh Mathematical Society (Series 2). 54, 2, p. 25 32 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    On the rank of compact p-adic Lie groups

    Klopsch, B., 2011, In: Archiv der Mathematik. 96, p. 321-333

    Research output: Contribution to journalArticlepeer-review

  34. Published

    On types and classes of commuting matrices over finite fields

    Britnell, J. R. & Wildon, M., 2011, In: Journal of the London Mathematical Society. 83, 2, p. 470-492 23 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    Practice Makes Perfect: Motivating Confident Privacy Protection Practices

    Coles-Kemp, L. & Kani-Zabihi, E., 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). IEEE, p. 866-871 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Unpublished

    Preemptive mobile code protection using spy agents

    Kalogridis, G., 2011, (Unpublished) 299 p.

    Research output: ThesisDoctoral Thesis

  37. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  38. Published

    Pro-p groups with constant generating number on open subgroups

    Klopsch, B. & Snopce, I., 2011, In: Journal of Algebra. 331, p. 263-270

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Provable Security in the Real World

    Degabriele, J. P., Paterson, K. & Watson, G., 2011, In: IEEE Security and Privacy Magazine. 9, 3, p. 33-41

    Research output: Contribution to journalArticlepeer-review

  40. Published

    Provably Secure Key Assignment Schemes from Factoring

    Freire, E. S. V. & Paterson, K. G., 2011, ACISP. Parampalli, U. & Hawkes, P. (eds.). Springer, Vol. 6812. p. 292-309 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Provably secure multisignature scheme with document decomposition and signer anonymity

    Martin, K. M., Tsai, K-Y., Wu, T-Z. & Hsu, C-L., 2011, In: ICIC Express Letters. 5, 9, p. 3579-3583

    Research output: Contribution to journalArticlepeer-review

  42. Published

    Putting dots in triangles

    Blackburn, S., Paterson, M. & Stinson, D. R., 2011, In: Journal of Combinatorial Mathematics and Combinatorial Computing. 78, p. 23-32

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published
  45. Published

    Smart Card Web Server

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2011, Electrical Engineering and Applied Computing. Ao, S. & Gelman, L. (eds.). Springer Netherland, Vol. 90. p. 221-232 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Unpublished

    Some Results in Group-Based Cryptography

    Mullan, C., 2011, (Unpublished)

    Research output: ThesisDoctoral Thesis

  47. Published

    Synthesizing and Verifying Plans for Constrained Workflows: Transferring Tools from Formal Methods

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 Workshop on Verification and Validation of Planning and Scheduling Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol

    Paterson, K. G., Ristenpart, T. & Shrimpton, T., 2011, Advances in Cryptology – ASIACRYPT 2011: 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011: Proceedings. Lee, D. H. & Wang, X. (eds.). Springer, p. 372-389 (Lecture Notes in Computer Science; vol. 7073).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    The rise and fall and rise of combinatorial key predistribution

    Martin, K. M., 2011, Selected Areas in Cryptography. Springer, Vol. 6544. p. 93-98 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Unpublished

    Topology-Aware Vulnerability Mitigation Worms: Defensive Worms

    Al-Salloum, Z., 2011, (Unpublished) 211 p.

    Research output: ThesisDoctoral Thesis

  52. Published
  53. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2011, In: International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticlepeer-review

  54. Published

    Wildcarded identity-based encryption

    Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Schuldt, J. C. N. & Smart, N. P., 2011, In: Journal of Cryptology. 24, 1, p. 42-82

    Research output: Contribution to journalArticlepeer-review

  55. 2010
  56. Unpublished

    Implementing PassCard, a CardSpace-based Password Manager

    Al-Sinani, H. & Mitchell, C., 20 Dec 2010, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2010-15)

    Research output: Book/ReportOther report

  57. Published

    Impressions of convexity - An illustration for commutator bounds

    Wenzel, D. & Audenaert, K., 1 Dec 2010, In: Linear Algebra and Its Applications. 433, 11-12, p. 1726-1759 34 p.

    Research output: Contribution to journalArticlepeer-review

  58. Published

    On the security issues of NFC enabled mobile phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 1 Dec 2010, In: International Journal of Internet Technology and Secured Transactions. 2, p. 336-356 21 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Simulator Problem in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Dec 2010, 6th IEEE/IFIP International Symposium on Trusted Computing and Communications (TrustCom-10). Tang, H. Y. & Fu, X. (eds.). HongKong, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Traceability codes

    Blackburn, S., Etzion, T. & Ng, S-L., Nov 2010, In: Journal of Combinatorial Theory, Series A. 117, 8, p. 1049-1057

    Research output: Contribution to journalArticlepeer-review

  61. Published

    Separating Hypervisor Trusted Computing Base Supported by Hardware.

    Gebhardt, C., Dalton, C. I. & Tomlinson, A., 1 Oct 2010, p. 79-84. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  62. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Counting primitive points of bounded height

    Widmer, M., Sep 2010, In: Transactions of the American Mathematical Society. 362, 9, p. 4793-4829 38 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    On sums of squares of primes II

    Harman, G. & Kumchev, A., Sep 2010, In: Journal of Number Theory. 130, 9, p. 1969-2002 34 p.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    Strongly subadditive functions

    Audenaert, K., Hiai, F. & Petz, D., Sep 2010, In: Acta Mathematica Hungarica. 128, 4, p. 386-394 9 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    Agent-based host enumeration and vulnerability scanning using dynamic topology information

    Al-Salloum, Z. & Wolthusen, S. D., Aug 2010, Information Security for South Africa 2010 (ISSA). IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Distinct difference configurations: multihop paths and key predistribution in sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Aug 2010, In: IEEE Transactions on Information Theory. 56, 8, p. 3961-3972 12 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Key predistribution for homogeneous wireless sensor networks with group deployment of nodes

    Martin, K. M., Paterson, M. B. & Stinson, D. R., Aug 2010, In: ACM Transactions on Sensor Networks. 7, 2, 11.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A NEW PROOF THAT ALTERNATING LINKS ARE NON-TRIVIAL

    Moffatt, I., Jun 2010, In: Journal of knot theory and its ramifications. 19, 6, p. 821-828 8 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    Stability of a growth process generated by monomer filling with nearest-neighbour cooperative effects

    Shcherbakov, V. & Volkov, S., Jun 2010, In: Stochastic Processes and Their Applications. 120, 6, p. 926-948

    Research output: Contribution to journalArticlepeer-review

  72. Published
  73. Published

    Privacy Threats in a Mobile Enterprise Social Network

    Tomlinson, A., Yau, P-W. & MacDonald, J. A., 1 May 2010, In: Information Security Technical Report. 15, 2, p. 57 - 66

    Research output: Contribution to journalArticlepeer-review

  74. Published

    Algorithms for Advanced Clandestine Tracking in Short-Range Ad Hoc Networks

    Wolthusen, S. D. & Al-Kuwari, S., May 2010, Security and Privacy in Mobile Information and Communication Systems: Second International ICST Conference (MobiSec 2010). Springer-Verlag, p. 67-79

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    An Algebra for the Detection and Prediction of Malicious Activity in Concurrent Systems

    Mcevoy, R. & Wolthusen, S. D., May 2010, Proceedings of the 2010 Fifth International Conference on Systems (ICONS 2010). IEEE Computer Society Press, p. 125-133

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data Fusion

    Al-Kuwari, S. & Wolthusen, S. D., May 2010, Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference (CMS 2010). Springer-Verlag, p. 16-27

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Firewall Mechanism in a User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Apr 2010, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010. Gollmann, D., Lanet, J-L. & Iguchi-Cartigny, J. (eds.). Passau, Germany: Springer, Vol. 6035/2010. p. 118-132 15 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    A constructive proof of the existence of Viterbi processes

    Lember, J. & Koloydenko, A., Apr 2010, In: IEEE Transactions on Information Theory. 56, 4, p. 2017-2033 17 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    On representation zeta functions of groups and a conjecture of Larsen-Lubotzky

    Avni, N., Klopsch, B., Onn, U. & Voll, C., Apr 2010, In: Comptes Rendus Mathematique. 348, 7-8, p. 363-367 5 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    An RFID grouping proof protocol exploiting anti-collision algorithm for subgroup dividing

    Leng, X., Lien, Y-H., Mayes, K. & Markantonakis, K., 1 Mar 2010, In: International Journal of Security and Networks. 5, p. 79-86 8 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Two-dimensional patterns with distinct differences - constructions, bounds, and maximal anticodes

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., Mar 2010, In: IEEE Transactions on Information Theory. 56, 3, p. 1216-1229 14 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Variance bounds, with an application to norm bounds for commutators

    Audenaert, K. M. R., 15 Feb 2010, In: Linear Algebra and Its Applications. 432, 5, p. 1126-1143 18 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Automorphism groups of cyclic codes

    Bienert, R. & Klopsch, B., Feb 2010, In: Journal of Algebraic Combinatorics. 31, 1, p. 33-52 20 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    Partial duality and Bolloba's and Riordan's ribbon graph polynomial

    Moffatt, I., 6 Jan 2010, In: Discrete Mathematics. 310, 1, p. 174-183 10 p.

    Research output: Contribution to journalArticlepeer-review

  88. Published

    Spectral radius of Hadamard product versus conventional product for non-negative matrices

    Audenaert, K. M. R., 1 Jan 2010, In: Linear Algebra and Its Applications. 432, 1, p. 366-368 3 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Computation on spin chains with limited access

    Kay, A. & Pemberton-Ross, P. J., Jan 2010, In: Physical Review A. 81, 1, p. - 4 p., 010301.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    Galois theory of Salem polynomials

    Christopoulos, C. & Mckee, J., Jan 2010, In: Mathematical Proceedings of the Cambridge Philosophical Society. 148, p. 47-54 8 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    NFC Security Threats

    Francis, L., Mayes, K., Markantonakis, K. & Hancke, G., Jan 2010, Near Field Communications: Smart Card Technology International. Courtney, T. (ed.). p. 42-47

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  92. Published

    A Birch-Goldbach theorem

    Brüdern, J., Dietmann, R., Liu, J. Y. & Wooley, T. D., 2010, In: Archiv der Mathematik. 94, 1, p. 53-58 6 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    A guide to trust in mobile ad hoc networks

    Balfe, S., Paterson, K. & Yau, P-W., 2010, In: Security and Communication Networks. 3, 6, p. 503-516

    Research output: Contribution to journalArticlepeer-review

  95. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M., 2010, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A viable grid marketplace

    Li, Q. & Martin, K. M., 2010, Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2010). IEEE Computer Society Press, p. 427-432

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Algebraic Precomputations in Differential and Integral Cryptanalysis

    Albrecht, M., Cid, C., Dullien, T., Faugere, J-C. & Perret, L., 2010, Information Security and Cryptology - 6th International Conference, Inscrypt 2010. Springer, Vol. 6584. p. 387-403 17 p. (Lecture Notes in Computer Science - LNCS; vol. 6584).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Unpublished

    Algorithmic Algebraic Techniques and their Application to Block Cipher Cryptanalysis

    Albrecht, M., 2010, (Unpublished) 176 p.

    Research output: ThesisDoctoral Thesis

  100. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Broadcast Encryption with Multiple Trust Authorities

    Boklan, K. D., Dent, A. W. & Seaman, C. A., 2010, Latincrypt 2010. Abdalla, M. & Baretto, P. S. L. M. (eds.). Springer-Verlag, p. 1-19 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 12 3 4 5 6 7 8 9 ...15 Next