Home > Mathematics home > Research > Profile > Publications
  1. 2010
  2. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Comments on "Proving Reliability of Anonymous Information in VANETs" by Kounga et al.

    Chen, L. & Ng, S-L., 2010, In: IEEE Transaction on Vehicular Technology. 59, 3, p. 1503-1505 3 p.

    Research output: Contribution to journalComment/debatepeer-review

  4. Published

    Confidential Signatures and Deterministic Signcryption

    Dent, A. W., Fischlin, M., Maulis, M., Stam, M. & Schroder, D., 2010, Public Key Cryptography -- PKC 2010. Nguyen, P. & Pointcheval, D. (eds.). p. 462-479 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  5. Published

    Constructing Key Assignment Schemes from Chain Partitions

    Crampton, J., Daud, R., Martin, K. M., Foresti, S. (ed.) & Jajodia, S. (ed.), 2010, Data and Applications Security and Privacy XXIV. Springer, Vol. 6166. p. 130-145 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Counting points of fixed degree and bounded height on linear varieties

    Widmer, M., 2010, In: Journal of Number Theory. 130, 8

    Research output: Contribution to journalArticlepeer-review

  7. Published

    Cryptographic Enforcement of Role-Based Access Control

    Crampton, J., 2010, Proceedings of 7th International Workshop on Formal Aspects of Security and Trust. Springer, p. 191-205 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Diophantine approximation with multiplicative functions

    Harman, G., 2010, In: Monatshefte für Mathematik. 160, p. 51-57 7 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Efficient On-Line Estimation of Autoregressive Parameters

    Sharia, T. ., 2010, In: Mathematical Methods of Statistics. 19, 2, p. 163-186 24 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Honeycomb arrays

    Blackburn, S. R., Panoui, A., Paterson, M. B. & Stinson, D. R., 2010, In: The Electronic Journal of Combinatorics. 17, R172, p. 1 1 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Identity crisis: on the problem of namespace design for ID-PKC and MANETs

    Balfe, S., McDonald, A., Paterson, K. & Phillips, H., 2010, In: Security and Communication Networks. 3, 6, p. 535-545

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Key establishment using signcryption techniques

    Dent, A. W., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 217-240

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    Knights, spies, games and ballot sequences

    Wildon, M., 2010, In: Discrete Mathematics. 310, 21, p. 2974-2983 10 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    Linear spaces on rational hypersurfaces of odd degree

    Dietmann, R., 2010, In: Bulletin of the London Mathematical Society. 42, 5, p. 891-895 5 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    Misuse cases for an Instant Knowledge system

    Yau, P-W. & Tomlinson, A., 2010.

    Research output: Contribution to conferencePaper

  17. Published

    Nonlinear Equivalence of Stream Ciphers

    Rønjom, S. & Cid, C., 2010, Fast Software Encryption: 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Springer, p. 40-54 15 p. (Lecture Notes in Computer Science; vol. 6147).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    On groups acting on contractible spaces with stabilizers of prime-power order

    Leary, I. & Nucinkis, B., 2010, In: Journal of Group Theory.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    One-time-password-authenticated key exchange

    Paterson, K. G. & Stebila, D., 2010, ACISP. Steinfeld, R. & Hawkes, P. (eds.). Springer, p. 264-281 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Plaintext-Dependent Decryption: A Formal Security Treatment of SSH-CTR

    Paterson, K. G. & Watson, G. J., 2010, Advances in Cryptology – EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 – June 3, 2010: Proceedings. Gilbert, H. (ed.). Springer, p. 345-361 17 p. (Lecture Notes in Computer Science; vol. 6110).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Practical NFC Peer-to-Peer Relay Attack Using Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., 2010, Radio Frequency Identification: Security and Privacy Issues: RFIDSec 2010. Ors Yalcin, S. (ed.). Springer Berlin / Heidelberg, Vol. 6370. p. 35-49 15 p. (Lecture Notes in Computer Science; vol. 6370).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Practical Signcryption

    Dent, A. W. (ed.) & Zheng, Y. (ed.), 2010, Springer-Verlag.

    Research output: Book/ReportBook

  24. Published

    Queueing with neighbours

    Shcherbakov, V. & Volkov, S., 2010, In: London Mathematical Society Lecture Note Series. 378, p. 463-481

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Recursive parameter estimation: Asymptotic expansion

    Sharia, T. ., 2010, In: Annals of the Institute of Statistical Mathematics. 62, 2, p. 343-362 20 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Signcryption schemes based on the RSA problem

    Dent, A. W. & Malone-Lee, J., 2010, Practical Signcryption. Dent, A. W. & Zheng, Y. (eds.). Springer-Verlag, p. 99-120

    Research output: Chapter in Book/Report/Conference proceedingChapter

  27. Published

    Small generators of function fields

    Widmer, M., 2010, In: Journal de Theorie des Nombres de Bordeaux. 22, 3

    Research output: Contribution to journalArticlepeer-review

  28. Published

    Small-span characteristic polynomials of integer symmetric matrices

    McKee, J., 2010, ANTS IX. p. 272-286 (Lecture Notes in Computer Science; vol. 6197).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    The discrete logarithm problem modulo one: cryptanalysing the Ariffin-Abu cryptosystem

    Blackburn, S. R., 2010, In: Journal of Mathematical Cryptology. 4, 2, p. 193-198 6 p.

    Research output: Contribution to journalArticlepeer-review

  30. Published

    The Principal Principle and Probability in the Many-Worlds interpretation

    Schack, R., 2010, Many Worlds? Everett, Quantum Theory, and Reality. S., S., J., B., A., K. & D., W. (eds.). Oxford: Oxford University Press, p. 467-475

    Research output: Chapter in Book/Report/Conference proceedingChapter

  31. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Towards an Access-Control Framework for Countering Insider Threats

    Crampton, J. & Huth, M., 2010, Insider Threats in Cyber Security and Beyond. Bishop, M., Gollmann, D., Hunker, J. & Probst, C. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  34. Published

    Towards Automated Diagnosis of Basal Cell Carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Koloydenko, A., Perkins, W., Leach, I., Varma, S., Williams, H. & Notingher, I., 2010, American Institute of Physics Conference Series. Vol. 1267. p. 364-365 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Variations on the Koksma-Hlawka Inequality

    Harman, G., 2010, In: Uniform Distribution Theory. 5, p. 65-78 14 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    Vertices of Specht modules and blocks of the symmetric group

    Wildon, M., 2010, In: Journal of Algebra. 323, 8, p. 2243-2256 14 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    Virtually soluble groups of type FP∞

    Martinez-Pérez, C. & Nucinkis, B. E. A., 2010, In: Commentarii Mathematici Helvetici. 85, 1, p. 135-150 16 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    Web Server on a SIM Card

    Kyrillidis, L., Mayes, K. & Markantonakis, K., 2010, Proceedings of the World Congress on Engineering: International Conference of Computer Science and Engineering. Ao, S. I., Gelman, L., Hukins, D. WL., Hunter, A. & Korsunsky, A. M. (eds.). Newswood Limited, Vol. I. p. 253-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Weyl's theorem in the measure theory of numbers

    Harman, G., Baker, R. & Coatney, R., 2010, Dependence in probability, analysis and number theory. Berkes, I., Bradley, R., Dehling, H., Peligrad, M. & Tichy, R. (eds.). Heber city: Kendrick Press, p. 51-72

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  41. 2009
  42. Published

    Algorithms for generating convex sets in acyclic digraphs

    Balister, P., Gerke, S., Gutin, G., Johnstone, A., Reddington, J., Scott, E., Soleimanfallah, A. & Yeo, A., Dec 2009, In: Journal of Discrete Algorithms. 7, 4, p. 509–518 10 p.

    Research output: Contribution to journalArticlepeer-review

  43. Published

    Location Based Application Availability

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2009, On the Move to Meaningful Internet Systems: OTM 2009 Workshops. Meersman, R., Herrero, P. & Dillon, T. (eds.). Vilamoura, Portugal: Springer, Vol. 5872/2009. p. 128 - 138 (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Sums of smooth squares

    Blomer, V., Brüdern, J. & Dietmann, R., Nov 2009, In: Compositio Mathematica. 145, 6, p. 1401-1441 41 p.

    Research output: Contribution to journalArticlepeer-review

  45. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Zeta functions of three-dimensional p-adic Lie algebras

    Klopsch, B. & Voll, C., Sep 2009, In: Mathematische Zeitschrift. 263, 1, p. 195-210 16 p.

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Connectivity of the uniform random intersection graph

    Blackburn, S. R. & Gerke, S., 28 Aug 2009, In: Discrete Mathematics. 309, 16, p. 5130-5140 11 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    How Long Can a Quantum Memory Withstand Depolarizing Noise?

    Pastawski, F., Kay, A., Schuch, N. & Cirac, I., 20 Aug 2009, In: Physical Review Letters. 103, 8, 4 p., 080501.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Application Management Framework in User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Aug 2009, The 10th International Workshop on Information Security Applications (WISA09). YOUM, H. Y. & Yung, M. (eds.). Busan, Korea: Springer, Vol. 5932/2009. p. 20-35 16 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Igusa-type functions associated to finite formed spaces and their functional equations

    Klopsch, B. & Voll, C., Aug 2009, In: Transactions of the American Mathematical Society. 361, 8, p. 4405-4436 32 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    Optimal Cloning and Singlet Monogamy

    Kay, A., Kaszlikowski, D. & Ramanathan, R., 27 Jul 2009, In: Physical Review Letters. 103, 5, 4 p., 050501.

    Research output: Contribution to journalArticlepeer-review

  54. Published
  55. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  56. Published

    Multiplicity-free representations of symmetric groups

    Wildon, M., Jul 2009, In: Journal of Pure and Applied Algebra. 213, 7, p. 1464-1477 14 p.

    Research output: Contribution to journalArticlepeer-review

  57. Published

    Instant Knowledge: a Secure Mobile Context-Aware Distributed Recommender System

    Helmhout, M., Saunders, C., Tomlinson, A., MacDonald, J. A., Irvine, J. M. & McDiarmid, A., 1 Jun 2009.

    Research output: Contribution to conferencePaper

  58. Published

    The dynamics of protein and metal metabolism in acclimated and Cd-exposed freshwater crabs (Potamonautes warreni)

    Schuwerack, P. M. M., Lewis, J. W. & Jones, P., 1 May 2009, In: Ecotoxicology and Environmental Safety. 72, 4, p. 1220-1227 8 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    Analytic pro-p groups of small dimensions

    González-Sánchez, J. & Klopsch, B., Apr 2009, In: Journal of Group Theory. 12, 5, p. 711-734 24 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Survey on Security Challenges for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., Apr 2009, p. 307- 312.

    Research output: Contribution to conferencePaperpeer-review

  61. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Convex Sets in Acyclic Digraphs

    Balister, P., Gerke, S. & Gutin, G., Mar 2009, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 26, 1, p. 95-100 6 p.

    Research output: Contribution to journalArticlepeer-review

  63. Published

    The trace formula for quantum graphs with general self adjoint boundary conditions

    Bolte, J. & Endres, S., Mar 2009, In: Annales Henri Poincare. 10, 1, p. 189-223 35 p.

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Quantum tomographic reconstruction with error bars: a Kalman filter approach

    Audenaert, K. M. R. & Scheel, S., 13 Feb 2009, In: New Journal of Physics. 11, 2, 56 p., 023028.

    Research output: Contribution to journalArticlepeer-review

  65. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Pro-p groups with few normal subgroups

    Barnea, Y., Gavioli, N., Jaikin-Zapirain, A., Monti, V. & Scoppola, C. M., 15 Jan 2009, In: Journal of Algebra. 321, 2, p. 429-449 21 p.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Generating abelian groups by addition only

    Klopsch, B. & Lev, V. F., Jan 2009, In: Forum Mathematicum. 21, 1, p. 23-41 19 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  69. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A Lieb-Thirring inequality for singular values

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 11, p. 3053-3057 5 p.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    A note on the p->q norms of 2-positive maps

    Audenaert, K. M. R., 2009, In: Linear Algebra and Its Applications. 430, 4, p. 1436-1440 5 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    Algebraic Techniques in Differential Cryptanalysis

    Albrecht, M. & Cid, C., 2009, Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009: Revised Selected Papers. Dunkelman, O. (ed.). Springer, p. 193-208 16 p. (Lecture Notes in Computer Science - LNCS; vol. 5665).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    An Access Control Framework for WS-BPEL Processes

    Paci, F., Bertino, E. & Crampton, J., 2009, Web Services Research for Emerging Applications: Discoveries and Trends. Zhang, L-J. (ed.). Information Science Reference, p. 492-515 24 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  74. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  75. Published

    An offline peer-to-peer broadcasting scheme with anonymity

    Kiyomoto, S., Fukushima, K. & Martin, K. M., 2009, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2009), Milan, Italy, July 7-10. INSTICC Press, p. 75-82 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  76. Published

    Building key-private, public-key encryption schemes

    Paterson, K. G. & Srinivasan, S., 2009, ACISP. Boyd, C. & Neito, J. (eds.). Springer, p. 276-292 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  77. Published

    Classification framework for fair content tracing protocols

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 8th International Workshop (IWDW 2009). Springer, Vol. 5703. p. 252-267 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  78. Published

    Cohomological finiteness conditions for elementary amenable groups

    Kropholler, P. H., Martinez-Perez, C. & Nucinkis, B. E. A., 2009, In: Journal für die reine und angewandte Mathematik. 637, p. 49-62 13 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Commuting conjugacy classes: an application of Hall's marriage theorem to group theory

    Britnell, J. R. & Wildon, M., 2009, In: Journal of Group Theory. 12, 6, p. 795-802 8 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Counting points of fixed degree and bounded height

    Widmer, M., 2009, In: Acta Arithmetica. 140, 2

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Cryptanalysing the critical group: Efficiently solving Biggs's discrete logarithm problem

    Blackburn, S. R., 2009, In: Journal of Mathematical Cryptology. 3, p. 199-203 5 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Cryptanalysis of the MST3 public key cryptosystem

    Blackburn, S. R., Cid, C. & Mullan, C., 2009, In: Journal of Mathematical Cryptology. 3, 4, p. 321-338 18 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2009, In: Journal of Logic and Algebraic Programming. 78, 8, p. 690-700 11 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Design Flaws of A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection

    Martin, K. M. & Poh, G. S., 2009, In: International Journal of Cryptology Research. 1, 1, p. 55-64

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?

    Crampton, J. & Huth, M., 2009, Proceedings of 5th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Development of Raman microspectroscopy for automated detection and imaging of basal cell carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Perkins, W., Koloydenko, A., Williams, H., Notingher, I., Leach, I. & Varma, S., 2009, In: Journal of Biomedical Optics. 14, p. 054031 1 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation

    Yau, P-W. & Tomlinson, A., 2009, p. 113 - 119.

    Research output: Contribution to conferencePaperpeer-review

  88. Published

    Establishing the broadcast efficiency of the Subset Difference revocation scheme

    Martin, K. M., Martin, T. & Wild, P., 2009, In: Designs, Codes and Cryptography. 51, 3, p. 315-334 20 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    H-IBAS-H - Authentication System for University Student Portals Using Images

    Al-Sinani, H., Nguyen, C. & Vuksanovic, B., 2009, Proceedings of ICCCP-09: International Conference on Communication, Computing and Power, jointly organised with IEEE, Muscat, Oman, February 15-18 2009. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Improving the security of CardSpace

    Alrodhan, W. & Mitchell, C. J., 2009, In: EURASIP Journal on Information Security. 2009, 8 p.

    Research output: Contribution to journalArticlepeer-review

  92. Published

    Maximum likelihood estimation for cooperative sequential adsorption

    Penrose, M. D. & Shcherbakov, V., 2009, In: Advances in Applied Probability. 41, 4, p. 978-1001

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Non-Euclidean statistics for covariance matrices, with applications to diffusion tensor imaging

    Dryden, I. L., Koloydenko, A. A. & Zhou, D., 2009, In: Annals of Applied Statistics. 3, 3, p. 1102-1123 22 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Numbers with a large prime factor II

    Harman, G. & Baker, R. C., 2009, Analytic Number Theory: Essays in honour of Klaus Roth. Cambridge University Press, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Published

    On a model of sequential point patterns

    Shcherbakov, V., 2009, In: Annals of the Institute of Statistical Mathematics. 61, 2, p. 371-390

    Research output: Contribution to journalArticlepeer-review

  96. Published

    On exponential sums studied by Indlekofer and Kátai

    Harman, G., 2009, In: Acta Mathematica Hungarica. 124, p. 289-298 10 p.

    Research output: Contribution to journalArticlepeer-review

  97. Published

    On the applicability of combinatorial designs to key predistribution for wireless sensor networks

    Martin, K. M., 2009, Coding and Cryptology (IWCC2009). Springer, Vol. 5557. p. 124-145 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  98. Published

    On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups.

    Paterson, K. G. & Srinivasan, S., 2009, In: Designs, Codes and Cryptography. 52, p. 219-241 23 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    One-round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2009, In: International Journal of Applied Cryptography. 1, 3, p. 181-199 19 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    Plaintext Recovery Attacks Against SSH

    Albrecht, M. R., Paterson, K. G. & Watson, G. J., 2009, Proceedings of the 2009 30th IEEE Symposium on Security and Privacy: 17-20 May 2009 / Berkley, CA, US. IEEE Computer Society, p. 16-26 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.

    Francis, L., Hancke, G. P., Mayes, K. & Markantonakis, K., 2009, ICITST'09. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Priors in Quantum Bayesian Inference

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J. -A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 255-259

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...3 4 5 6 7 8 9 10 ...15 Next