Home > Mathematics home > Research > Profile > Publications
  1. 2009
  2. Published

    Privacy-aware location database service for granular queries

    Kiyomoto, S., Martin, K. M. & Fukushima, K., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 28-37 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Procrustes Analysis of Diffusion Tensor Data

    Zhou, D., Dryden, IL., Koloydenko, A. & Bai, L., 2009, Proceedings 17th Scientific Meeting, International Society for Magnetic Resonance in Medicine.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Properties of the Error Linear Complexity Spectrum

    Etzion, T., Kalouptsidis, N., Kolokotronis, N., Limniotis, K. & Paterson, K. G., 2009, In: IEEE Transactions on Information Theory. 55, 10, p. 4681-4686 6 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    Secret Public Key Protocols Revisited

    Lim, H. W. & Paterson, K. G., 2009, Security Protocols. Christianson, B. (ed.). Springer, p. 237-256 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  6. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Small zeros of quadratic forms avoiding a finite number of prescribed hyperplanes

    Dietmann, R., 2009, In: Canadian Mathematical Bulletin. 52, 1, p. 63-65 3 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Solubility of Fermat equations

    Browning, T. D. & Dietmann, R., 2009, Quadratic forms---algebra, arithmetic, and geometry. Vol. 493. p. 99-106 8 p. (Contemp. Math.; vol. 493).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  10. Published

    Statistical Inference from Imperfect Photon Detection

    Audenaert, K. M. R. & Scheel, S., 2009, In: New Journal of Physics. 11, p. 113052

    Research output: Contribution to journalArticlepeer-review

  11. Published

    The RAKAPOSHI Stream Cipher

    Cid, C., Kiyomoto, S. & Kurihara, J., 2009, Information and Communications Security, 11th International Conference, ICICS 2009. Springer, Vol. 5927. p. 32-46 15 p. (Lecture Notes in Computer Sciences - LNCS; vol. 5927).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Threats to the Swarm: Security Considerations for Swarm Robotics

    Higgins, F., Tomlinson, A. & Martin, K. M., 2009, In: International Journal on Advances in Security. 2, 2&3, p. 288 - 297

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Ultra-lightweight key predistribution in wireless sensor networks for monitoring linear infrastructure

    Martin, K. M. & Paterson, M. B., 2009, Information Security Theory and Practice: Smart Devices, Pervasive Systems and Ubiquitous Networks (WISTP 2009). Springer, Vol. 5746. p. 143-152 10 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Using trusted computing to secure mobile ubiquitous environments

    Leung, A., Yau, P-W. & Mitchell, C., 2009, Security and Privacy in Mobile & Wireless Networking. Gritzalis, S., Karaygiannis, T. & Skianis, C. (eds.). Leicester, UK: Troubador, p. 303-335 33 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. 2008
  18. Published

    Connectivity augmentation in tactical mobile ad hoc networks

    Reidt, S. & Wolthusen, S. D., 16 Nov 2008, Proc. 2008 IEEE Military Communications Conference. IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    The Steinberg Symbol and Special Values of L-Functions

    Busuioc, C., Nov 2008, In: Transactions of the American Mathematical Society. 360, 11, p. 5999–6015 17 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETs

    Gennaro, R., Halevi, S., Krawczyk, H., Rabin, T., Reidt, S. & Wolthusen, S. D., 6 Oct 2008, Computer Security - ESORICS 2008: Proc. 13th European Symposium on Research in Computer Security. Springer-Verlag, p. 49-65

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A bound on the size of separating hash families

    Blackburn, S. R., Etzion, T., Stinson, D. R. & Zaverucha, G. M., Oct 2008, In: Journal of Combinatorial Theory, Series A. 115, 7, p. 1246-1256 11 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Secure virtual disk images for grid computing

    Gebhardt, C. & Tomlinson, A., Oct 2008, p. 19-29. 11 p.

    Research output: Contribution to conferencePaperpeer-review

  23. Published

    The number of graphs not containing K3,3 as a minor

    Gerke, S., Giménez, O., Noy, M. & Weissl, A., 8 Sep 2008, In: The Electronic Journal of Combinatorics. 15, 20 p., R114.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Inequalities for quantum skew information

    Audenaert, K., Cai, L. & Hansen, F., Sep 2008, In: Letters in Mathematical Physics. 85, 2-3, p. 135-146 12 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A combinatorial method for calculating the moments of Lévy area

    Levin, D. & Wildon, M., 24 Jul 2008, In: Transactions of the American Mathematical Society. 360, 12, p. 6695-6709 15 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Securing Grid Workflows with Trusted Computing

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 1 Jun 2008, p. 510-519. 10 p.

    Research output: Contribution to conferencePaper

  27. Published

    Connectivity of addable graph classes

    Balister, P., Bollobás, B. & Gerke, S., May 2008, In: Journal of Combinatorial Theory, Series B. 98, 3, p. 577-584 8 p.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    HB-MP+ Protocol: An Improvement on the HB-MP Protocol

    Leng, X., Mayes, K. & Markantonakis, K., 1 Apr 2008, In: IEEE International Conference on RFID -- IEEE RFID 2008. p. 118-124 7 p.

    Research output: Contribution to journalArticlepeer-review

  29. Published

    Asymptotic Error Rates in Quantum Hypothesis Testing

    Audenaert, K. M. R., Nussbaum, M., Szkola, A. & Verstraete, F., Apr 2008, In: Communications in Mathematical Physics. 279, 1, p. 251-283

    Research output: Contribution to journalArticlepeer-review

  30. Published

    The chromatic polynomial of fatgraphs and its categorification

    Loebl, M. & Moffatt, I., 1 Mar 2008, In: Advances in Mathematics. 217, 4, p. 1558-1587 30 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    The random planar graph process

    Gerke, S., Schlatter, D., Steger, A. & Taraz, A., Mar 2008, In: Random Structures and Algorithms. 32, 2, p. 236-261 26 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Securing Financially Sensitive Environments with OpenBSD

    Humphrey, N. C. P., 18 Jan 2008

    Research output: ThesisMaster's Thesis

  33. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  35. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A delegation framework for Liberty

    Alrodhan, W. & Mitchell, C. J., 2008, Proceedings: 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008), 10-11 July 2008, Liverpool, UK. Haggerty, J. & Merabti, M. (eds.). p. 67-73 7 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  37. Published

    A mathematical walk in Surrey

    Blackburn, S. R., 2008, In: BSHM Bulletin: Journal of the British Society for the History of Mathematics. 23, p. 178-180 3 p.

    Research output: Contribution to journalArticlepeer-review

  38. Published

    A Survey of Certificateless Encryption Schemes and Security Models

    Dent, A. W., 2008, In: International Journal of Information Security. 7, 9, p. 349-377 29 p.

    Research output: Contribution to journalArticlepeer-review

  39. Published

    An Access-Control Framework for WS-BPEL

    Paci, F., Bertino, E. & Crampton, J., 2008, In: International Journal of Web Services Research. 5, 3, p. 20-43 24 p.

    Research output: Contribution to journalArticlepeer-review

  40. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  41. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Augmenting Internet-based Card-not-present Transactions with Trusted Computing: An Analysis

    Balfe, S. & Paterson, K. G., 2008, Financial Cryptography. Tsudik, G. (ed.). Springer, p. 171-175 5 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  43. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Certificateless Encryption Schemes Strongly Secure in the Standard Model

    Dent, A. W., Libert, B. & Paterson, K. G., 2008, Public Key Cryptography. Cramer, R. (ed.). Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  45. Published

    Challenges for Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, In: IEEE Security and Privacy Magazine. Nov./Dec., p. 60-66 7 p.

    Research output: Contribution to journalArticlepeer-review

  46. Published

    Challenging the adversary model in secret sharing schemes

    Martin, K. M., 2008, Coding and Cryptography II. Proceedings of the Royal Flemish Academy of Belgium for Science and the Arts. p. 45-63 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  47. Published

    Character values and decomposition matrices of symmetric groups

    Wildon, M., 2008, In: Journal of Algebra. 319, 8, p. 3382-3397 16 p.

    Research output: Contribution to journalArticlepeer-review

  48. Published

    Conjugate algebraic numbers on conics: a survey

    McKee, J., 2008, Number Theory and Polynomials. McKee, J. & Smyth, C. (eds.). Cambridge University Press, p. 211-240 (LMS Lecture Note Series; vol. 352).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    Counting partitions on the abacus

    Wildon, M., 2008, In: Ramanujan Journal. 17, 3, p. 355-367 13 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    Crimeware and Trusted Computing

    Balfe, S., Gallery, E., Mitchell, C. J. & Paterson, K. G., 2008, Crimeware: Understanding New Attacks and Defenses. Jacobsson, M. & Ramzan, Z. (eds.). Addison-Wesley/Symantec Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. Published

    Delegation and satisfiability in workflow systems

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 31-40 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Delegation in role-based access control

    Crampton, J. & Khambhammettu, H., 2008, In: International Journal of Information Security. 7, 2, p. 123-136 14 p.

    Research output: Contribution to journalArticlepeer-review

  53. Published

    e-EMV: Emulating EMV for Internet Payments with Trusted Computing Technologies

    Balfe, S. & Paterson, K. G., 2008, Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing (STC 2008). Xu, S., Nita-Rotaru, C. & Seifert, J. P. (eds.). ACM, p. 81-92 12 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  54. Published

    Efficient key predistribution for grid-based wireless sensor networks

    Blackburn, S. R., Etzion, T., Martin, K. M. & Paterson, M. B., 2008, Information Theoretic Security. Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 54-69 16 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  55. Published

    Efficient one round key exchange in the standard model

    Boyd, C., Cliff, Y., Nieto, J. M. G. & Paterson, K. G., 2008, ACISP. Mu, Y., Susilo, W. & Seberry, J. (eds.). Springer, p. 69-83 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  56. Published

    Flexible and Secure Communications in an Identity-Based, Coalition Environment.

    Boklan, K. D., Klagsbrun, Z., Paterson, K. G. & Srinivasan., S., 2008, IEEE Milcom, 2008..

    Research output: Chapter in Book/Report/Conference proceedingChapter

  57. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2008, SCN. Ostrovsky, R., Prisco, R. D. & Visconti, I. (eds.). Springer, Vol. 5229. p. 340-357 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  59. Published

    Infinite Viterbi alignments in the two-state hidden Markov models

    Koloydenko, A. & Lember, J., 2008, In: Acta et Commentationes Universitatis Tartuensis de Mathematica. 12, p. 109-124 16 p.

    Research output: Contribution to journalArticlepeer-review

  60. Published

    Key refreshing in wireless sensor networks

    Blackburn, S. R., Martin, K. M., Paterson, M. B. & Stinson, D. R., 2008, Information Theoretic Security: Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008: Proceedings . Safavi-Naini, R. (ed.). Berlin: Springer, Vol. 5155. p. 156-170 15 p. (Lecture Notes in Computer Science; vol. 5155).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  61. Published

    Labelling the character tables of symmetric and alternating groups

    Wildon, M., 2008, In: Quarterly Journal of Mathematics. 59, 1, p. 123-135 13 p.

    Research output: Contribution to journalArticlepeer-review

  62. Published
  63. Published

    Notes on multiplicativity of maximal output purity for completely positive qubit maps

    Audenaert, K. M. R., 2008, In: Journal of Physics: Conference Series. 104, 1

    Research output: Contribution to journalArticlepeer-review

  64. Published

    Number Theory and Polynomials: Proceedings of a conference in Bristol, April 2006

    McKee, J. (ed.) & Smyth, C. J. (ed.), 2008, Cambridge University Press. 360 p. (LMS Lecture Notes Series; vol. 352)

    Research output: Book/ReportBook

  65. Published

    On a norm compression inequality for 2xN partitioned block matrices

    Audenaert, K. M. R., 2008, In: Linear Algebra and Its Applications. 428, 4, p. 781-795 15 p.

    Research output: Contribution to journalArticlepeer-review

  66. Published

    On delegation and workflow execution models

    Crampton, J. & Khambhammettu, H., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. ACM Press, p. 2137-2144 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    On Random Unitary Channels

    Audenaert, K. M. R. & Scheel, S., 2008, In: New Journal of Physics. 10, p. 023011

    Research output: Contribution to journalArticlepeer-review

  68. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    On the (In)security of Two Buyer-Seller Watermarking Protocols

    Martin, K. M. & Poh, G. S., 2008, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, July 26-29. INSTICC Press, p. 253-260 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  70. Published

    On the Araki-Lieb-Thirring inequality

    Audenaert, K. M. R., 2008, In: International Journal of Information and Systems Sciences. 4, 1, p. 78-83

    Research output: Contribution to journalArticlepeer-review

  71. Published

    On the average energy of circulant graphs

    Blackburn, S. R. & Shparlinski, I. E., 2008, In: Linear Algebra and Its Applications. 428, p. 1956-1963 8 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    On the distribution of conjugacy classes between the cosets of a finite group in a cyclic extension

    Britnell, J. R. & Wildon, M., 2008, In: Bulletin of the London Mathematical Society. 40, 5, p. 897-906 10 p.

    Research output: Contribution to journalArticlepeer-review

  73. Published

    On the representation of integers by quadratic forms

    Browning, T. D. & Dietmann, R., 2008, In: Proceedings of the London Mathematical Society. 96, 2, p. 389-416 28 p.

    Research output: Contribution to journalArticlepeer-review

  74. Published

    On values of n2 + 1 free of large prime factors

    Harman, G., 2008, In: Archiv der Mathematik. 90, p. 239-245 7 p.

    Research output: Contribution to journalArticlepeer-review

  75. Published

    Pairing 2008

    Galbraith, S. D. (ed.) & Paterson, K. G. (ed.), 2008, Springer. (Lecture Notes in Computer Science)

    Research output: Book/ReportBook

  76. Published

    Pairings for Cryptographers

    Galbraith, S. D., Paterson, K. G. & Smart, N. P., 2008, In: Discrete Applied Mathematics. 156, p. 3113-3121.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Parameter Estimation Procedures in Time Series Models

    Sharia, T. ., 2008, In: Inference and Estimation in Probabilistic Time-Series Models, Isaac Newton Institute for Mathematical Sciences, Cambridge. p. 57-66 10 p.

    Research output: Contribution to journalArticlepeer-review

  78. Published

    Periodic cohomology and subgroups with bounded Bredon cohomological dimension

    Jo, J. H. & Nucinkis, B., 2008, In: Mathematical Proceedings of the Cambridge Philosophical Society. 144, 2, p. 329-336 8 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    Point-weight designs with design conditions on t points

    Dent, A. W., 2008, In: Discrete Mathematics. 308, 11, p. 2080-2093 14 p.

    Research output: Contribution to journalArticlepeer-review

  80. Published

    Prime divisors of quadratic sequences

    Harman, G. & Everest, G., 2008, Number Theory and Polynomials,. p. 142-155 14 p. (LMS Lecture Notes).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    Primes with preassigned digits II

    Harman, G. & Kátai, I., 2008, In: Acta Arithmetica. 133, 2, p. 171-184 14 p.

    Research output: Contribution to journalArticlepeer-review

  82. Published

    Prolific codes with the identifiable parent property

    Blackburn, S. R., Etzion, T. & Ng, S-L., 2008, In: SIAM Journal on Discrete Mathematics. 22, 4, p. 1393-1410 18 p.

    Research output: Contribution to journalArticlepeer-review

  83. Published

    RBAC administration in distributed systems

    Dekker, M., Crampton, J. & Etalle, S., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 93--102 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Reading order independent grouping proof for RFID tags

    Lien, Y., Leng, X., Mayes, K. & Chiu, J-H., 2008, ISI. p. 128-136 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Recursive parameter estimation: Convergence

    Sharia, T., 2008, In: Statistical Inference for Stochastic Processes. 11, 2, p. 343-362 19 p.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Relations Among Notions of Plaintext Awareness

    Birkett, J. & Dent, A. W., 2008, Public Key Cryptography -- PKC 2008. Cramer, R. (ed.). Springer-Verlag, p. 47-64 18 p. (Lecture Notes in Computer Science; vol. 4939).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  87. Published

    Representation Zeta functions of compact p-adic Lie groups

    Klopsch, B., 2008, Unkown Publisher. (Oberwolfach Reports; no. 28)

    Research output: Book/ReportOther report

  88. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Securing Grid Workflows with Trusted Computing (Extended Abstract)

    Yau, P-W., Tomlinson, A., Balfe, S. & Gallery, E., 2008, p. 700. 1 p.

    Research output: Contribution to conferenceAbstract

  90. Published

    Security and Anonymity of Identity-based Encryption with Multiple Trusted Authorities

    Paterson, K. G. & Srinivasan, S., 2008, Pairing 2008. Galbraith, S. D. & Paterson, K. G. (eds.). Springer, p. 354-375 22 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  91. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  92. Published

    Semimartingale Stochastic Approximation Procedures and Recursive Estimation

    Sharia, T., Lazrieva, N. & Toronjadze, T., 2008, In: Journal of Mathematical Sciences. 153, 3, p. 211- 261 50 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Sequences with changing dependencies

    Balister, P., Bollobás, B. & Gerke, S., 2008, In: SIAM Journal on Discrete Mathematics. 22, 3, p. 1149-1154 6 p.

    Research output: Contribution to journalArticlepeer-review

  94. Published

    Simultaneous Diophantine approximation by square-free numbers

    Dietmann, R., 2008, In: Quarterly Journal of Mathematics. 59, 3, p. 311-319 9 p.

    Research output: Contribution to journalArticlepeer-review

  95. Published

    Some problems of analytic number theory on arithmetic semigroups

    Harman, G. & Matomäki, K., 2008, In: Functiones et Approximatio Commentarii Mathematici. 38, p. 21-40 20 p.

    Research output: Contribution to journalArticlepeer-review

  96. Published

    Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems

    Rupp, A., Leander, G., Bangerter, E., Dent, A. W. & Sadeghi, A-R., 2008, Advances in Cryptology -- Asiacrypt 2008. Pieprzyk, J. (ed.). Springer-Verlag, p. 489-505 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. Published

    Sums of two squares and one biquadrate

    Dietmann, R. & Elsholtz, C., 2008, In: Functiones et Approximatio Commentarii Mathematici. 38, , part 2, p. 233-234 2 p.

    Research output: Contribution to journalArticlepeer-review

  98. Published

    Symmetric measures via moments

    Koloydenko, A., 2008, In: Bernoulli. 14, 2, p. 362-390 29 p.

    Research output: Contribution to journalArticlepeer-review

  99. Published

    Systems of cubic forms

    Dietmann, R., 2008, In: Journal of the London Mathematical Society. 77, 3, p. 666-686 21 p.

    Research output: Contribution to journalArticlepeer-review

  100. Published

    The adjusted Viterbi training for hidden Markov models

    Lember, J. & Koloydenko, A., 2008, In: Bernoulli. 14, 1, p. 180-206 27 p.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    Trace formulae for quantum graphs

    Bolte, J. & Endres, S., 2008, Analysis on Graphs and Its Applications. Exner, P., Keating, J. P., Kuchment, P., Sunada, T. & Teplyaev, A. (eds.). American Mathematical Society, p. 247-259 13 p. (Proceedings of Symposia in Pure Mathematics; vol. 77).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1...4 5 6 7 8 9 10 11 ...15 Next