Home > Mathematics home > Research > Profile > Publications
  1. Working paper › Research
  2. Submitted

    Balls-in-bins models with asymmetric feedback and reflection

    Shcherbakov, V. & Menshikov, M., Apr 2022, (Submitted) 22 p.

    Research output: Working paper

  3. Published

    Boolean Ring Cryptographic Equation Solving

    Murphy, S., Paterson, M. & Swart, C., 18 Sep 2020, Springer, p. 252-272, 21 p. (LNCS).

    Research output: Working paper

  4. Published

    Conflict of interest policies: A general approach

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  5. Submitted

    Discrete SIR model on a homogeneous tree and its continuous limit

    Gairat, A. & Shcherbakov, V., 13 Mar 2021, (Submitted) 18 p.

    Research output: Working paper

  6. Published

    Evaluating and improving access control

    Crampton, J., Loizou, G. & O'Shea, G., 1999.

    Research output: Working paper

  7. Published
  8. Unpublished

    Integral quadratic points of bounded height

    Widmer, M. & Dietmann, R., 2015, (Unpublished).

    Research output: Working paper

  9. Submitted

    Multiplicatively Badly Approximable Matrices up to Logarithmic Factors

    Fregoli, R., Jul 2020, (Submitted) 17 p.

    Research output: Working paper

  10. Unpublished
  11. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  12. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  13. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  14. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  15. Published

    Two partial orders on the set of antichains

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  16. Discussion paper › Research
  17. Published

    Zetafunktionen in der Gruppentheorie - mit Augenmerk auf p-adische Liegruppen

    Klopsch, B., 2004, (Mathematisches Institut, Seminars).

    Research output: Working paperDiscussion paper

  18. Other contribution › Research
  19. Published
  20. Unpublished
  21. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  22. Published

    Proceedings, Eurocrypt 2011

    Paterson, K., 2011, 628 p. Springer.

    Research output: Other contribution

  23. Doctoral Thesis › Research
  24. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  25. Unpublished

    Algorithmic Algebraic Techniques and their Application to Block Cipher Cryptanalysis

    Albrecht, M., 2010, (Unpublished) 176 p.

    Research output: ThesisDoctoral Thesis

  26. Unpublished

    Algorithmic, probabilistic, and physics-inspired methods for cuts and shortest paths in graphs

    Mezei, B., 2020, (Unpublished) 143 p.

    Research output: ThesisDoctoral Thesis

  27. Unpublished
  28. Unpublished

    Analyzing and Developing Role-Based Access Control Models

    Chen, L., 2011, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  29. Unpublished

    Anonymity and Time in Public-Key Encryption

    Quaglia, E., 2012, (Unpublished) 166 p.

    Research output: ThesisDoctoral Thesis

Previous 1 2 3 4 5 6 7 8 ...61 Next