Home > Mathematics home > Research > Profile > Publications
  1. Published

    (e, 2e) reactions in helium: calculations with correlated wavefunctions

    Furtado, F. M. & O'Mahony, P. F., 1987, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 20, 13, p. L405

    Research output: Contribution to journalArticlepeer-review

  2. Published

    (e,2e) triple differential cross sections for the simultaneous ionization and excitation of helium

    Dupre, C., Lahmam-Bennani, A., Duguet, A., Mota-Furtado, F., O'Mahony, P. F. & Cappello, C. D., 1992, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 25, 1, p. 259

    Research output: Contribution to journalArticlepeer-review

  3. Published

    2D problems in groups

    Kar, A. & Nikolov, N., 13 Jan 2018, In: arXiv.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A 2-isomorphism theorem for delta-matroids

    Moffatt, I. & Oh, J., May 2021, In: Advances in applied mathematics. 126, 102133.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    A Birch-Goldbach theorem

    Brüdern, J., Dietmann, R., Liu, J. Y. & Wooley, T. D., 2010, In: Archiv der Mathematik. 94, 1, p. 53-58 6 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    A bound on the size of separating hash families

    Blackburn, S. R., Etzion, T., Stinson, D. R. & Zaverucha, G. M., Oct 2008, In: Journal of Combinatorial Theory, Series A. 115, 7, p. 1246-1256 11 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  10. Published

    A Brief History of Provably-Secure Public-Key Encryption

    Dent, A. W., 2008, Progress in Cryptology -- Africacrypt 2008. Vaudenay, S. (ed.). Springer-Verlag, p. 357-370 14 p. (Lecture Notes in Computer Science; vol. 5023).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    A Brief Introduction to Certificateless Encryption Schemes and their Infrastructures

    Dent, A. W., 2009, Key Infrastructures – EuroPKI 2009. Martinelli, F. & Preneel, B. (eds.). Springer-Verlag, p. 1-16 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published

    A C++ library using quantum trajectories to solve quantum master equations

    Schack, R. & Brun, T. A., 1997, In: Comp. Phys. Comm.. 102, p. 210-228 19 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G., 2007, 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    A characterisation of anti-Löwner functions

    Audenaert, K. M. R., Dec 2011, In: Proceedings of the American Mathematical Society. 139, 12, p. 4217-4223

    Research output: Contribution to journalArticlepeer-review

  16. Published

    A characterization for sparse epsilon-regular pairs

    Gerke, S. & Steger, A., 3 Jan 2007, In: The Electronic Journal of Combinatorics. 14, 1, p. - 12 p.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    A Characterization of Partially Dual Graphs

    Moffatt, I., Jul 2011, In: Journal of Graph Theory. 67, 3, p. 198-217 20 p.

    Research output: Contribution to journalArticlepeer-review

  18. Published

    A characterization of posets that are nearly antichains.

    Ng, S-L., 2004, In: Order: a Journal on the Theory of Ordered Sets and its Applications. 21, 1, p. 1-5 5 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    A classification of all 1-Salem graphs

    McKee, J. & Gumbrell, L., 2014, In: LMS Journal of Computation and Mathematics. 17, 1, p. 582-594 13 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A Combinatorial Interpretation of Ramp Schemes

    Martin, K. M. & Jackson, W-A., 1996, In: Australasian Journal of Combinatorics. 14, p. 51-60 10 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    A combinatorial method for calculating the moments of Lévy area

    Levin, D. & Wildon, M., 24 Jul 2008, In: Transactions of the American Mathematical Society. 360, 12, p. 6695-6709 15 p.

    Research output: Contribution to journalArticlepeer-review

  23. E-pub ahead of print

    A combinatorial proof of a plethystic Murnaghan--Nakayama rule

    Wildon, M., 16 Aug 2016, (E-pub ahead of print) In: SIAM Journal on Discrete Mathematics. 30, 3, p. 1526–1533 108 p.

    Research output: Contribution to journalArticlepeer-review

  24. Published

    A comparative study on the spin asymmetry and integrated cross sections for the electron-impact ionization of atomic hydrogen

    Berakdar, J., O'Mahony, P. F. & Mota-Furtado, F., 1997, In: Zeitschrift für Physik D Atoms, Molecules and Clusters. 39, 1, p. 41-48 8 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G., 2003, PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

Previous 1 2 3 4 5 6 7 8 ...60 Next