Home > Mathematics home > Research > Profile > Publications
  1. 2022
  2. Published

    Handbook of the Tutte Polynomial and Related Topics

    Moffatt, I. & Ellis-Monaghan, J. A., 6 Jul 2022, Chapman and Hall/CRC Press. 804 p.

    Research output: Book/ReportBook

  3. E-pub ahead of print

    Extended Path Partition Conjecture for Semicomplete and Acyclic Compositions

    Ai, J., Gutin, G., Gerke, S. & Zhou, Y., Nov 2022, In: Discrete Mathematics. 345, 11, 113019.

    Research output: Contribution to journalArticlepeer-review

  4. Forthcoming

    Irreducibility of the Tutte polynomial of an embedded graph

    Moffatt, I., Ellis-Monaghan, J., Goodall, A., Noble, S. & Vena, L., 6 Jun 2022, (Accepted/In press) In: Algebraic Combinatorics.

    Research output: Contribution to journalArticlepeer-review

  5. Forthcoming

    The Enumeration of Finite Rings

    Blackburn, S. & McLean, R., 23 May 2022, (Accepted/In press) In: Journal of the London Mathematical Society.

    Research output: Contribution to journalArticlepeer-review

  6. Published

    Involutive random walks on total orders and the anti-diagonal eigenvalue property

    Britnell, J. R. & Wildon, M., 15 May 2022, In: Linear Algebra and Its Applications. 641, p. 1-47 47 p.

    Research output: Contribution to journalArticlepeer-review

  7. E-pub ahead of print

    Skew Brownian motion with dry friction: joint density approach

    Shcherbakov, V. & Gairat, A., Aug 2022, In: Statistics and Probability Letters. 187, p. 1-4 4 p., 109511.

    Research output: Contribution to journalArticlepeer-review

  8. E-pub ahead of print

    Modular plethystic isomorphisms for two-dimensional linear groups

    McDowell, E. & Wildon, M., 15 Jul 2022, In: Journal of Algebra. 602, p. 441-483 24 p.

    Research output: Contribution to journalArticlepeer-review

  9. Submitted

    Balls-in-bins models with asymmetric feedback and reflection

    Shcherbakov, V. & Menshikov, M., Apr 2022, (Submitted) 22 p.

    Research output: Working paper

  10. Published

    Combatting the Effects of Disorder in Quantum State Transfer

    Keele, C. & Kay, A., 24 Mar 2022, 032612 ed., Physical Review A.

    Research output: Working paperPreprint

  11. Published

    Noise reducing encoding strategies for spin chains

    Keele, C. & Kay, A., 24 Mar 2022, 032613 ed., Physical Review A.

    Research output: Working paperPreprint

  12. Forthcoming

    Northcott numbers for the house and the Weil height

    Technau, N., Pazuki, F. & Widmer, M., 21 Feb 2022, (Accepted/In press) In: Bulletin of the London Mathematical Society.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Linear competition processes and generalised Pólya urns with removals

    Popov, S., Shcherbakov, V. & Volkov, S., Feb 2022, In: Stochastic Processes and Their Applications. 144, p. 125-152 28 p., SPA3886.

    Research output: Contribution to journalArticlepeer-review

  14. Forthcoming

    Irrational-slope versions of Thompson's groups T and V

    Burillo, J., Nucinkis, B. & Reeves, L., 12 Jan 2022, (Accepted/In press) In: Proceedings of the Edinburgh Mathematical Society (Series 2).

    Research output: Contribution to journalArticlepeer-review

  15. Unpublished

    Bieri-Strebel Groups With Irrational Slopes

    Winstone, N., 2022, (Unpublished) 190 p.

    Research output: ThesisDoctoral Thesis

  16. E-pub ahead of print

    Longer gaps between values of binary quadratic forms

    Dietmann, R., Elsholtz, C., Kalmynin, A., Konyagin, S. & Maynard, J., 2022, (E-pub ahead of print) In: International Mathematics Research Notices. 37 p.

    Research output: Contribution to journalArticlepeer-review

  17. Unpublished

    On Mahler Measures and Digraphs

    Coyston, J., 2022, (Unpublished) 258 p.

    Research output: ThesisDoctoral Thesis

  18. 2021
  19. E-pub ahead of print

    Neuropsychological and clinical findings of Cognitive Remediation Therapy feasibility randomised controlled trial in young people with anorexia nervosa

    Giombini, L., Nesbitt, S., Kusosa, R., Fabian, C., Sharia, T., Easter, A. & Tchanturia, K., 24 Nov 2021, (E-pub ahead of print) In: European Eating Disorders Review. 30, 1, p. 50-60 11 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    The image of the Specht module under the inverse Schur functor in arbitrary characteristic

    McDowell, E., 15 Nov 2021, In: Journal of Algebra. 586, p. 865-898 34 p.

    Research output: Contribution to journalArticlepeer-review

  21. E-pub ahead of print

    Small Mahler measures coming from digraphs

    Coyston, J. & McKee, J., 16 Oct 2021, (E-pub ahead of print) In: EXPERIMENTAL MATHEMATICS.

    Research output: Contribution to journalArticlepeer-review

  22. Forthcoming

    From matrix pivots to graphs in surfaces: exploring combinatorics through partial duals

    Moffatt, I., 2 Oct 2021, (Accepted/In press) European Congress of Mathematics Portorož, 20–26 June.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Plethysms of symmetric functions and highest weight representations

    de Boeck, M., Paget, R. & Wildon, M., 23 Aug 2021, (E-pub ahead of print) In: Transactions of the American Mathematical Society. 34 p.

    Research output: Contribution to journalArticlepeer-review

  24. E-pub ahead of print

    Kings in Multipartite Hypertournaments

    Ai, J., Gerke, S. & Gutin, G., 2 Aug 2021, (E-pub ahead of print) In: Journal of Graph Theory.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Iterative treatment of the Coulomb potential in laser–atom interactions

    Piraux, B., Galstyan, A., Popov, Y., Mota-Furtado, F. & O'Mahony, P., 5 Jul 2021, In: European Physical Journal D: Atomic, Molecular, Optical and Plasma Physics. 75, 196.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    Block-avoiding point sequencings

    Blackburn, S. & Etzion, T., Jun 2021, In: Journal of Combinatorial Designs. 29, 6, p. 339-366 28 p.

    Research output: Contribution to journalArticlepeer-review

  27. E-pub ahead of print

    Multiplicatively badly approximable matrices up to logarithmic factors

    Fregoli, R., 17 May 2021, (E-pub ahead of print) In: Mathematical Proceedings of the Cambridge Philosophical Society.

    Research output: Contribution to journalArticlepeer-review

  28. Published

    A 2-isomorphism theorem for delta-matroids

    Moffatt, I. & Oh, J., May 2021, In: Advances in applied mathematics. 126, 102133.

    Research output: Contribution to journalArticlepeer-review

  29. Submitted

    Discrete SIR model on a homogeneous tree and its continuous limit

    Gairat, A. & Shcherbakov, V., 13 Mar 2021, (Submitted) 18 p.

    Research output: Working paper

  30. E-pub ahead of print

    A Random Walk on the Indecomposable Summands of Tensor Products of Modular Representations of SL2 (Fp)

    McDowell, E., 12 Mar 2021, (E-pub ahead of print) In: Algebras and Representation Theory.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    Clinical Integration of Fast Raman spectroscopy for Mohs micrographic surgery of basal cell carcinoma

    Boitor, R., de Wolf, C., Weesie, F., Shipp, D., Varma, S., Veitch, D., Wernham, A., Koloydenko, A., Puppels, G., Nijsten, T., Williams, H. C., Caspers, P. & Notingher, I., 11 Mar 2021, In: Biomedical Optics Express. 12, 4, p. 2015-2026 12 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    Proximity and Remoteness in Directed and Undirected Graphs

    Ai, J., Gerke, S., Gutin, G. & Mafunda, S., Mar 2021, In: Discrete Mathematics. 344, 3, 112252.

    Research output: Contribution to journalArticlepeer-review

  33. Published

    Bertini and Northcott

    Pazuki, F. & Widmer, M., 25 Jan 2021, In: Research in Number Theory. 7, 18 p., 12.

    Research output: Contribution to journalArticlepeer-review

  34. Unpublished

    Private Information Retrieval Using Regenerating Codes

    Dorkson, C., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  35. Unpublished

    Representations of the general linear group with multilinear constructions

    McDowell, E., 2021, (Unpublished) 216 p.

    Research output: ThesisDoctoral Thesis

  36. Unpublished

    SEMICLASSICAL ANALYSIS OF MAGNETIC WEYL OPERATORS ON A TORUS PHASE SPACE

    Proctor, L., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  37. Unpublished

    Using Encoding to Reduce the Errors in Quantum Spin Chains

    Keele, C., 2021, (Unpublished)

    Research output: ThesisDoctoral Thesis

  38. 2020
  39. Published

    Averages and higher moments for the ℓ-torsion in class groups

    Frei, C. & Widmer, M., 23 Dec 2020, In: Mathematische Annalen. p. 1-25 25 p.

    Research output: Contribution to journalArticlepeer-review

  40. E-pub ahead of print

    MAP segmentation in Bayesian hidden Markov models: a case study

    Koloydenko, A., Kuljus, K. & Lember, J., 10 Dec 2020, (E-pub ahead of print) In: Journal of Applied Statistics. p. 1-32 32 p.

    Research output: Contribution to journalArticlepeer-review

  41. E-pub ahead of print

    A Note on Bounded Exponential Sums

    Fregoli, R., 11 Nov 2020, (E-pub ahead of print) In: Bulletin of the London Mathematical Society. 10 p.

    Research output: Contribution to journalArticlepeer-review

  42. Published

    An estimate for narrow operators on Lp([0,1])

    Shargorodsky, E. & Sharia, T., 5 Nov 2020, In: Archiv der Mathematik. 6 p.

    Research output: Contribution to journalArticlepeer-review

  43. E-pub ahead of print

    Successive shortest paths in complete graphs with random edge weights

    Gerke, S., Mezei, B. & Sorkin, G., 13 Oct 2020, (E-pub ahead of print) In: Random Structures and Algorithms. 57, 4, p. 1205-1247 43 p.

    Research output: Contribution to journalArticlepeer-review

  44. Published

    Enumerative Galois theory for cubics and quartics

    Chow, S. & Dietmann, R., 7 Oct 2020, In: Advances in Mathematics. 372, p. 1-37 37 p., 107282.

    Research output: Contribution to journalArticlepeer-review

  45. E-pub ahead of print

    Nuclearity of Semigroup C*-algebras

    an Huef, A., Nucinkis, B., Sehnem, C. F. & Yang, D., 28 Sep 2020, (E-pub ahead of print) In: Journal of Functional Analysis. 280, 2, p. 1-46 46 p., 108793.

    Research output: Contribution to journalArticlepeer-review

  46. Forthcoming

    Boolean Ring Cryptographic Equation Solving

    Murphy, S., Paterson, M. & Swart, C., 18 Sep 2020, (Accepted/In press).

    Research output: Working paper

  47. Published

    Counting lattice points and weak admissibility of a lattice and its dual

    Technau, N. & Widmer, M., 2 Sep 2020, In: Israel Journal of Mathematics. p. 1-19 19 p.

    Research output: Contribution to journalArticlepeer-review

  48. Forthcoming

    An Irrational-slope Thompson's Group

    Burillo, J., Nucinkis, B. & Reeves, L., 1 Sep 2020, (Accepted/In press) In: Publicacions Matemàtiques .

    Research output: Contribution to journalArticlepeer-review

  49. Published

    Symmetrizable matrices, quotients, and the trace problem

    McKee, J. & Smyth, C., 1 Sep 2020, In: Linear Algebra and Its Applications. 600, p. 60-81 22 p.

    Research output: Contribution to journalArticlepeer-review

  50. E-pub ahead of print

    The Saturation Game: Teaching Protein–Ligand Binding with a Playing Card Analogy

    McEvoy, J. & Kay, A., 1 Sep 2020, (E-pub ahead of print) In: Journal of Chemical Education. 4 p.

    Research output: Contribution to journalArticlepeer-review

  51. Published

    Types of embedded graphs and their Tutte polynomials

    Huggett, S. & Moffatt, I., Sep 2020, In: Mathematical Proceedings of the Cambridge Philosophical Society. 169, 2, p. 255-297 43 p.

    Research output: Contribution to journalArticlepeer-review

  52. Published

    Respecting One’s Fellow: QBism’s Analysis of Wigner’s Friend

    DeBrota, J. B., Fuchs, C. A. & Schack, R., 18 Aug 2020, In: Foundations of Physics. 16 p.

    Research output: Contribution to journalArticlepeer-review

  53. Submitted

    Multiplicatively Badly Approximable Matrices up to Logarithmic Factors

    Fregoli, R., Jul 2020, (Submitted) 17 p.

    Research output: Working paper

  54. E-pub ahead of print

    Symmetrizable integer matrices having all their eigenvalues in the interval [-2,2]

    McKee, J. & Smyth, C., 2 Jun 2020, (E-pub ahead of print) In: Algebraic Combinatorics. 3, 3, p. 775-789 15 p.

    Research output: Contribution to journalArticlepeer-review

  55. Published

    Branch groups, orbit growth, and subgroup growth types for pro-p groups

    Barnea, Y. & Schlage-Puchta, J-C., 26 May 2020, In: Forum of Mathematics, Pi. 8, p. 1-26 26 p., e10.

    Research output: Contribution to journalArticle

  56. Published

    On a counting theorem for weakly admissible lattices

    Fregoli, R., 19 May 2020, In: International Mathematics Research Notices. 35 p., rnaa102.

    Research output: Contribution to journalArticlepeer-review

  57. E-pub ahead of print

    Rational lines on cubic hypersurfaces

    Brandes, J. & Dietmann, R., 24 Apr 2020, (E-pub ahead of print) In: Mathematical Proceedings of the Cambridge Philosophical Society. p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  58. E-pub ahead of print

    Proper orientation number of triangle-free bridgeless outerplanar graphs

    Ai, J., Gerke, S., Gutin, G., Shi, Y. & Taoqiu, Z., 20 Apr 2020, (E-pub ahead of print) In: Journal of Graph Theory. p. 1-11 11 p.

    Research output: Contribution to journalArticlepeer-review

  59. Published

    A Proof of the Murnaghan–Nakayama Rule Using Specht Modules and Tableau Combinatorics

    Kochhar, J. & Wildon, M., 20 Feb 2020, In: Annals of combinatorics. p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

  60. Forthcoming

    Plethysms of symmetric functions and representations of SL_2(C)

    Wildon, M. & Paget, R., 11 Jan 2020, (Accepted/In press) In: Journal of Algebraic Combinatorics. 52 p.

    Research output: Contribution to journalArticlepeer-review

  61. Unpublished

    Algorithmic, probabilistic, and physics-inspired methods for cuts and shortest paths in graphs

    Mezei, B., 2020, (Unpublished) 143 p.

    Research output: ThesisDoctoral Thesis

  62. Published

    Localisation in a growth model with interaction. Arbitrary graphs

    Menshikov, M. & Shcherbakov, V., 2020, In: ALEA, Latin American Journal of Probability and Mathematical Statistics. 17, p. 473-489 17 p.

    Research output: Contribution to journalArticlepeer-review

  63. Unpublished

    Sums of Reciprocals of Fractional Parts and Aspects of Multiplicative Diophantine Approximation

    Fregoli, R., 2020, (Unpublished) 112 p.

    Research output: ThesisDoctoral Thesis

  64. 2019
  65. Submitted

    A continuity bound for the expected number of connected components of a random graph: a model for epidemics

    Audenaert, K., Hanson, E. & Datta, N., 13 Dec 2019, (Submitted) In: ArXiv.org. 1912, 05599

    Research output: Contribution to journalArticlepeer-review

  66. E-pub ahead of print

    Endomorphism algebras of 2-row permutation modules in characteristic 3

    Kochhar, J., 8 Oct 2019, (E-pub ahead of print) In: Journal of Algebra.

    Research output: Contribution to journalArticlepeer-review

  67. Published

    Boundary effect in competition processes

    Shcherbakov, V. & Volkov, S., 1 Oct 2019, In: Journal of Applied Probability. 56, 3, p. 750-768 19 p.

    Research output: Contribution to journalArticlepeer-review

  68. Published

    Matroids, delta-matroids and embedded graphs

    Chun, C., Moffatt, I., Noble, S. & Rueckriemen, R., Oct 2019, In: Journal of Combinatorial Theory, Series A. 167, p. 7-59 53 p.

    Research output: Contribution to journalArticlepeer-review

  69. Published

    PIR Array Codes with Optimal Virtual Server Rate

    Blackburn, S. & Etzion, T., Oct 2019, In: IEEE Transactions on Information Theory. 65, 10, p. 6136-6145 10 p.

    Research output: Contribution to journalArticlepeer-review

  70. Published

    Threat Analysis for Smart Homes

    Kavallieratos, G., Chowdhury, N., Katsikas, S., Gkioulos, V. & Wolthusen, S. D., 25 Sep 2019, In: Future Internet. 11, 10, p. 1-19 19 p., 207.

    Research output: Contribution to journalArticlepeer-review

  71. Published

    PIR schemes with small download complexity and low storage requirements

    Blackburn, S., Etzion, T. & Paterson, M., 19 Sep 2019, In: IEEE Transactions on Information Theory. 66, 1, p. 557-571 15 p.

    Research output: Contribution to journalArticlepeer-review

  72. Published

    The asymptotic number of prefix normal words

    Balister, P. & Gerke, S., 13 Sep 2019, In: Theoretical Computer Science. 784, p. 75-80 6 p.

    Research output: Contribution to journalArticlepeer-review

  73. E-pub ahead of print

    Large normal subgroup growth and large characteristic subgroup growth

    Barnea, Y. & Schlage-Puchta, J-C., 7 Sep 2019, (E-pub ahead of print) In: Journal of Group Theory. 23, 1, p. 1-15 15 p.

    Research output: Contribution to journalArticle

  74. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  75. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  76. Published

    Estimation of Viterbi path in Bayesian hidden Markov models

    Lember, J., Gasbarra, D., Koloydenko, A. & Kuljus, K., Aug 2019, In: Metron. 77, 2 , p. 137-169 33 p.

    Research output: Contribution to journalArticlepeer-review

  77. Published

    Clinical translation of Raman-based multimodal spectral histopathology for margin assessment during surgery of basal cell carcinoma

    Boitor, R., Kong, K., Varma, S., Koloydenko, A., Williams, H. & Notingher, I., 22 Jul 2019, Proceedings SPIE, Medical Laser Applications and Laser-Tissue Interactions IX, 110790G . SPIE - INT SOC OPTICAL ENGINEERING, Vol. 11079. p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. E-pub ahead of print

    The multistep homology of the simplex and representations of symmetric groups

    Wildon, M., 20 Jun 2019, (E-pub ahead of print) In: Mathematical Proceedings of the Cambridge Philosophical Society. p. 1-23 23 p.

    Research output: Contribution to journalArticlepeer-review

  79. Published

    An Introduction to Quantum and Vassiliev Knot Invariants

    Moffatt, I. & Jackson, D. M., 19 Jun 2019, Springer International Publishing. 422 p. (CMS Books in Mathematics)

    Research output: Book/ReportBook

  80. E-pub ahead of print

    Permutation groups containing a regular abelian subgroup: the tangled history of two mistakes of Burnside

    Wildon, M., 27 May 2019, (E-pub ahead of print) In: Mathematical Proceedings of the Cambridge Philosophical Society. p. 1-21 21 p.

    Research output: Contribution to journalArticlepeer-review

  81. Published

    Uniform exponential growth for CAT(0) square complexes

    Kar, A. & Sageev, M., 21 May 2019, In: Algebraic and geometric topology. 19, 3, p. 1229-1245 17 p.

    Research output: Contribution to journalArticlepeer-review

  82. E-pub ahead of print

    Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 14 May 2019, (E-pub ahead of print) Security and Privacy Trends in the Industrial Internet of Things. p. 223-243 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  83. Published

    Generalized Foulkes modules and maximal and minimal constituents of plethysms of Schur functions

    Paget, R. & Wildon, M., May 2019, In: Proceedings of the London Mathematical Society. 118, 5, p. 1153-1187 35 p.

    Research output: Contribution to journalArticlepeer-review

  84. Published

    Inglenook Shunting Puzzles

    Blackburn, S., 19 Apr 2019, In: The Electronic Journal of Combinatorics. 26, 2, p. 1-18 18 p., P2.8.

    Research output: Contribution to journalArticlepeer-review

  85. Published

    Static field limit of excitation probabilities in laser-atom interactions

    Galstyan, A., Shablov, V. L., Popov, Y., Mota-Furtado, F., O'Mahony, P. & Piraux, B., 4 Apr 2019, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 52, 8, p. 1-12 12 p., 085004.

    Research output: Contribution to journalArticlepeer-review

  86. Published

    Long Term Behaviour of a Reversible System of Interacting Random Walks

    Janson, S., Shcherbakov, V. & Volkov, S., Apr 2019, In: Journal of Statistical Physics. 175, 1, p. 71-96 26 p.

    Research output: Contribution to journalArticlepeer-review

  87. Published

    MAGNETIC RESONANCE MULTI-SEQUENCE THROMBUS IMAGING (MSTI) PREDICTS THROMBUS LYSABILITY IN PATIENTS WITH ACUTE ILIOFEMORAL DEEP VEIN THROMBOSIS (DVT)

    Silickas, J., Phinikaridou, A., Black, S. A., Koloydenko, A., Lavin Plaza, B., Lyons, O., Gwozdz, A., Andia, M., Patel, A., Modarai, B., Botnar, R., Smith, A. & Saha, P., Apr 2019, Joint Meeting of the Royal Society of Medicine / Annual Meeting of the Society of Academic and Research Surgery. Wiley, Vol. 106 (S3). p. 9-9 1 p. O13. (British Journal of Surgery).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Robust assessment of two-treatment higher-order cross-over designs against missing values

    Godolphin, P. J. & Godolphin, E. J., Apr 2019, In: Computational Statistics and Data Analysis. 132, p. 31-45 15 p.

    Research output: Contribution to journalArticlepeer-review

  89. Published

    Robustness of crossover trials against subject drop-out – Examples of perpetually connected designs

    Godolphin, P. J. & Godolphin, E. J., 1 Mar 2019, In: Statistical Methods in Medical Research. 28, 3, p. 788-800 13 p.

    Research output: Contribution to journalArticlepeer-review

  90. Published

    On the interplay between embedded graphs and delta-matroids

    Chun, C., Moffatt, I., Noble, S. & Rueckriemen, R., Mar 2019, In: Proceedings of the London Mathematical Society. 118, 3, p. 675-700 26 p.

    Research output: Contribution to journalArticlepeer-review

  91. Published

    Separable potentials model for atoms and molecules in strong ultrashort laser pulses

    Popov, Y. V., Galstyan, A., Piraux, B., O'Mahony, P., Mota-Furtado, F., Decleva, P. & Chuluunbaatar, O., Jan 2019, Progress in Photon Science. Yamanouchi, K., Tunik, S. & Makarov, V. (eds.). Switzerland: Springer, Vol. 119. p. 221-242 22 p. (Springer Seruies in Chemical Physics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  92. Published

    The minimum Manhattan distance and minimum jump of permutations

    Blackburn, S., Homberger, C. & Winkler, P., Jan 2019, In: Journal of Combinatorial Theory, Series A. 161, p. 364-386 23 p.

    Research output: Contribution to journalArticlepeer-review

  93. Published

    Delta-matroids for graph theorists

    Moffatt, I., 2019, Surveys in combinatorics 2019. Cambridge University Press, p. 167-220 (London Math. Soc. Lecture Note Ser.; vol. 446).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  94. Unpublished

    Momentum Distributions in the Dipole and Non-Dipole Regimes for Atoms in Strong Laser Fields

    Jenkins, S., 2019, (Unpublished) 194 p.

    Research output: ThesisDoctoral Thesis

  95. Unpublished

    Representation Theory of the Symmetric Group

    Kochhar, J., 2019, (Unpublished) 169 p.

    Research output: ThesisDoctoral Thesis

  96. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In: Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticlepeer-review

  97. 2018
  98. Published

    Hereditarily just infinite profinite groups with complete Hausdorff dimension spectrum

    Barnea, Y. & Vannacci, M., 31 Dec 2018, In: Journal of Algebra and Its Applications. p. 1-10 10 p.

    Research output: Contribution to journalArticlepeer-review

  99. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, (E-pub ahead of print) p. 226-229. 4 p.

    Research output: Contribution to conferencePaperpeer-review

  100. Published

    Sums of reciprocals of fractional parts

    Fregoli, R., 28 Dec 2018, In: International Journal of Number Theory. 15, 4, p. 789-797 9 p.

    Research output: Contribution to journalArticlepeer-review

  101. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  102. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, (E-pub ahead of print) Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  103. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, (E-pub ahead of print) Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  104. Published

    A Generalized SXP Rule Proved by Bijections and Involutions

    Wildon, M., Dec 2018, In: Annals of combinatorics. 22, 4, p. 885-905 21 p.

    Research output: Contribution to journalArticlepeer-review

  105. E-pub ahead of print

    Vertices of Modules and Decomposition Numbers of C2 ≀ Sn

    Kochhar, J., 20 Nov 2018, (E-pub ahead of print) In: Algebras and Representation Theory. p. 1-29 29 p.

    Research output: Contribution to journalArticlepeer-review

  106. Published

    A contraction theorem for the largest eigenvalue of a multigraph

    McKee, J., 15 Nov 2018, In: Linear Algebra and Its Applications. 557, p. 339-349 11 p.

    Research output: Contribution to journalArticlepeer-review

  107. Published

    Matroidal frameworks for topological Tutte polynomials

    Moffatt, I. & Smith, B., Nov 2018, In: Journal of Combinatorial Theory, Series B. 133, p. 1-31 31 p.

    Research output: Contribution to journalArticlepeer-review

  108. E-pub ahead of print

    Practical Attacks Against the Walnut Digital Signature Scheme

    Beullens, W. & Blackburn, S., 27 Oct 2018, (E-pub ahead of print) Advances in Cryptology - ASIACRYPT 2018. Springer, p. 35-61 27 p. (Lecture Notes in Computer Science; vol. 11272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  109. Published

    Finite-Field Matrix Channels for Network Coding

    Blackburn, S. & Claridge, J., 12 Oct 2018, In: IEEE Transactions on Information Theory. 65, 3, p. 1614 - 1625 12 p.

    Research output: Contribution to journalArticlepeer-review

  110. Published

    Edge colourings and topological graph polynomials

    Ellis-Monaghan, J. A., Kauffman, L. H. & Moffatt, I., Oct 2018, In: Australasian Journal of Combinatorics. 72, 2, p. 290-305 16 p.

    Research output: Contribution to journalArticlepeer-review

  111. Published

    Rearrangements and Leibniz-type rules of mean oscillations

    Leka, Z., 15 Sep 2018, In: Journal of Mathematical Analysis and Applications. 465, 2, p. 961-972 12 p.

    Research output: Contribution to journalArticlepeer-review

  112. Submitted

    Tutorial on the Quantikz Package

    Kay, A., 10 Sep 2018, (Submitted) In: ArXiv.org.

    Research output: Contribution to journalArticle

  113. Published

    Cognitive remediation therapy (CRT) in a specialist inpatient eating disorder service for children and adolescents: CAN‐CRT study protocol for a pilot randomised controlled trial

    Giombini, L., Nesbitt, S., Cox, H., Foxall, A., Sharia, T., Easter, A. & Tchanturia, K., Sep 2018, In: European Eating Disorders Review. 26, 5, p. 438-446 9 p.

    Research output: Contribution to journalArticlepeer-review

  114. Published

    Homer Nodded: Von Neumann’s Surprising Oversight

    Mermin, N. D. & Schack, R., Sep 2018, In: Foundations of Physics. 48, 9, p. 1007-1020 14 p.

    Research output: Contribution to journalArticlepeer-review

  115. Published

    Average bounds for the ℓ-torsion in class groups of cyclic extensions

    Frei, C. & Widmer, M., 10 Aug 2018, In: Research in Number Theory. 4, p. 1-25 25 p., 34.

    Research output: Contribution to journalArticlepeer-review

  116. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S., 6 Aug 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  117. Submitted

    The Perfect State Transfer Graph Limbo

    Kay, A., 2 Aug 2018, (Submitted) In: Physical Review A.

    Research output: Contribution to journalArticlepeer-review

  118. Published

    Hierarchically cocompact classifying spaces for mapping class groups of surfaces

    Nucinkis, B. & Petrosyan, N., Aug 2018, In: Bulletin of the London Mathematical Society. 50, 4, p. 569-582 14 p.

    Research output: Contribution to journalArticlepeer-review

  119. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  120. Published

    Presentations of generalisations of Thompson's group V

    Martinez-Perez, C., Matucci, F. & Nucinkis, B., 16 Jul 2018, In: Pacific Journal of Mathematics. 296, 2, p. 371-403 33 p.

    Research output: Contribution to journalArticlepeer-review

  121. Published

    Intra-operative spectroscopic assessment of surgical margins during breast conserving surgery

    Shipp, D. W., Rakha, E., Koloydenko, A. A., Macmillan, R. D., Ellis, I. & Notingher, I., 9 Jul 2018, In: Breast Cancer Research. 20, p. 1-14 14 p., 69.

    Research output: Contribution to journalArticlepeer-review

  122. E-pub ahead of print

    Quasi-automorphisms of the infinite rooted 2-edge-coloured binary tree

    Nucinkis, B. & St. John-Green, S., 4 Jun 2018, (E-pub ahead of print) In: Groups, Geometry, and Dynamics. 12, 2, p. 529-570 42 p.

    Research output: Contribution to journalArticlepeer-review

  123. Published

    Localisation in a Growth Model with Interaction

    Costa, M., Menshikov, M., Shcherbakov, V. & Vachkovskaia, M., Jun 2018, In: Journal of Statistical Physics. 171, p. 1150-1175 26 p.

    Research output: Contribution to journalArticlepeer-review

  124. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018, p. 1-6. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  125. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In: IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  126. Published

    Weak admissibility, primitivity, o-minimality, and Diophantine approximation

    Widmer, M., 17 Apr 2018, In: Mathematika. 64, 2, p. 475-496 22 p.

    Research output: Contribution to journalArticlepeer-review

  127. Published

    Hopf algebras and Tutte polynomials

    Krajewski, T., Moffatt, I. & Tanasa, A., Apr 2018, In: Advances in applied mathematics. 95, p. 271-330 60 p.

    Research output: Contribution to journalArticlepeer-review

  128. Published

    Ionisation of H2O by a strong ultrashort XUV pulse: a model within the single active electron approximation

    Galstyan, A., Popov, Y., Janssens, N., Mota-Furtado, F., O'Mahony, P., Decleva, P., Quadri, N., Chuluunbaatar, O. & Piraux, B., 26 Mar 2018, In: Chemical Physics. 504, p. 22-30 9 p.

    Research output: Contribution to journalArticlepeer-review

  129. Published

    Coprocessors for quantum devices

    Kay, A., 15 Mar 2018, In: Physical Review A. 97, 3, p. 1-11 11 p., 032316.

    Research output: Contribution to journalArticlepeer-review

  130. Published

    Perfect coding for dephased quantum state transfer

    Kay, A., 15 Mar 2018, In: Physical Review A. 97, 3, p. 1-8 8 p., 032317.

    Research output: Contribution to journalArticlepeer-review

  131. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E., 1 Mar 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS. p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  132. Published

    Bounds for the ℓ‐torsion in class groups

    Widmer, M., Feb 2018, In: Bulletin of the London Mathematical Society. 50, 1, p. 124-131 8 p.

    Research output: Contribution to journalArticlepeer-review

  133. Published

    2D problems in groups

    Kar, A. & Nikolov, N., 13 Jan 2018, In: arXiv.

    Research output: Contribution to journalArticlepeer-review

  134. Published

    The Structure of Delta-Matroids with Width One Twists

    Chun, C., Hall, R., Merino, C., Moffatt, I. & Noble, S., 12 Jan 2018, In: The Electronic Journal of Combinatorics. 25, 1, p. 1-12 12 p.

    Research output: Contribution to journalArticlepeer-review

  135. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  136. Unpublished

    Classifying spaces for chains of families of subgroups

    Moreno, V., 2018, (Unpublished) 106 p.

    Research output: ThesisDoctoral Thesis

  137. Published

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science; vol. 10898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  138. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  139. Published

    Long term behaviour of two interacting birth-and-death processes

    Menshikov, M. & Shcherbakov, V., 2018, In: Markov Processes and Related Fields. 24, 1, p. 85-106 22 p.

    Research output: Contribution to journalArticlepeer-review

  140. Unpublished

    Matroids, Eulerian Graphs and Topological Analogues of the Tutte Polynomial

    Smith, B., 2018, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  141. Unpublished
  142. Published

    On the Leibniz rule for random variables

    Leka, Z., 2018, In: Mathematical Inequalities & Applications. 21, 1, p. 235-249 15 p.

    Research output: Contribution to journalArticlepeer-review

  143. Published

    Representations of Symmetric Groups

    O'Donovan, W., 2018

    Research output: ThesisDoctoral Thesis

  144. Unpublished

    Searching on Encrypted Data

    Renwick, S. L., 2018, (Unpublished) 187 p.

    Research output: ThesisDoctoral Thesis

  145. Published

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 2018, p. 1-7. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  146. Published

    Sums of two numbers having only prime factors congruent to one modulo four

    Dietmann, R. & Elsholtz, C., 2018, Proceedings of the Number Theory Week 2017 conference: Banach Center Publications.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  147. 2017
  148. Published

    Prescribing the binary digits of squarefree numbers and quadratic residues

    Dietmann, R., Elsholtz, C. & Shparlinski, I. E., Dec 2017, In: Transactions of the American Mathematical Society. 369, 12, p. 8369-8388 20 p.

    Research output: Contribution to journalArticlepeer-review

  149. Published

    Automated multimodal spectral histopathology for quantitative diagnosis of residual tumour during basal cell carcinoma surgery

    Boitor, R., Kong, K., Shipp, D., Varma, S., Koloydenko, A. A., Kulkarni, K., Elsheikh, S., Schut, T., Caspers, P., Puppels, G., van der Wolf, M., Sokolova, E., Nijsten, T. E. C., Salence, B., Williams, H. & Notingher, I., 22 Nov 2017, In: Biomedical Optics Express. 8, 12, p. 5749-5766 18 p.

    Research output: Contribution to journalArticlepeer-review

  150. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K., 15 Nov 2017, In: Cryptography. 1, 3, p. 1-17 17 p., 19.

    Research output: Contribution to journalArticlepeer-review

  151. Published

    Excitation of Rydberg wave packets in the tunneling regime

    Piraux, B., Mota-Furtado, F., O'Mahony, P., Galstyan, A. & Popov, Y., 3 Oct 2017, In: Physical Review A. 96, 4, p. 1-10 10 p., 043403.

    Research output: Contribution to journalArticlepeer-review

  152. Published

    Density of Skew Brownian motion and its functionals with application in finance

    Gairat, A. & Shcherbakov, V., Oct 2017, In: Mathematical Finance. 27, 4, p. 1069-1088 20 p.

    Research output: Contribution to journalArticlepeer-review

  153. Published

    On the dimension of classifying spaces for families of abelian subgroups

    Cook, G. C., Gonzalez Moreno, V., Nucinkis, B. & Pasini, F., 6 Sep 2017, In: Homology, Homotopy and Applications. 19, 2, p. 83-87 5 p.

    Research output: Contribution to journalArticlepeer-review

  154. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, (E-pub ahead of print) SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  155. Published

    Tailoring spin chain dynamics for fractional revivals

    Kay, A., 10 Aug 2017, In: Quantum. 1, 11 p., 24.

    Research output: Contribution to journalArticlepeer-review

  156. E-pub ahead of print

    On Hilbert's irreducibility theorem

    Castillo, A. & Dietmann, R., 9 Aug 2017, (E-pub ahead of print) In: Acta Arithmetica. 180, p. 1-14 14 p.

    Research output: Contribution to journalArticlepeer-review

  157. Published

    Symmetric seminorms and the Leibniz property

    Leka, Z., 1 Aug 2017, In: Journal of Mathematical Analysis and Applications. 452, 1, p. 708-725 18 p.

    Research output: Contribution to journalArticlepeer-review

  158. Published

    TACTICS: Validation of the security framework developed for tactical SOA

    Gkioulos, V., Risthein, E. & Wolthusen, S., Aug 2017, In: Journal of Information Security and Applications. 35, p. 96-105 10 p.

    Research output: Contribution to journalArticlepeer-review

  159. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  160. Published

    On signed Young permutation modules and signed p-Kostka numbers

    Giannelli, E., Lim, K. J., O'Donovan, W. & Wildon, M., 1 Jul 2017, In: Journal of Group Theory. 20, 4, p. 637–679 43 p.

    Research output: Contribution to journalArticlepeer-review

  161. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  162. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  163. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  164. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C., 7 Jun 2017, SACMAT'17: Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  165. Published

    On the h-invariant of Cubic Forms, and Systems of Cubic Forms

    Dietmann, R., Jun 2017, In: Quarterly Journal of Mathematics. 68, 2, p. 485-501 17 p.

    Research output: Contribution to journalArticlepeer-review

  166. Published

    Asymptotic behavior of truncated stochastic approximation procedures

    Sharia, T. & Zhong, L., 26 May 2017, In: Mathematical Methods of Statistics. 26, 1, p. 37-54 18 p.

    Research output: Contribution to journalArticlepeer-review

  167. Published

    Asymptotic diophantine approximation: the multiplicative case

    Widmer, M., May 2017, In: Ramanujan Journal. 43, 1, p. 83-93 11 p.

    Research output: Contribution to journalArticlepeer-review

  168. Published

    Bell numbers, partition moves and the eigenvalues of the random-to-top shuffle in Dynkin Types A, B and D

    Britnell, J. R. & Wildon, M., May 2017, In: Journal of Combinatorial Theory, Series A. 148, p. 116-144 29 p.

    Research output: Contribution to journalArticlepeer-review

  169. Published

    Generating quantum states through spin chain dynamics

    Kay, A., 13 Apr 2017, In: New Journal of Physics. 19, 15 p., 043019.

    Research output: Contribution to journalArticlepeer-review

  170. Published

    Modelling laser-atom interactions in the strong field regime

    Galstyan, A., Popov, Y., Mota-Furtado, F., O'Mahony, P., Janssens, N., Jenkins, S., Chuluunbaatar, O. & Piraux, B., Apr 2017, In: European Physical Journal D: Atomic, Molecular, Optical and Plasma Physics. 71, p. 1-11 11 p., 97.

    Research output: Contribution to journalArticlepeer-review

  171. Published

    Strong field approximation within a Faddeev-like formalism for laser-matter interactions

    Popov, Y., Galstyan, A., Mota-Furtado, F., O'Mahony, P. & Piraux, B., Apr 2017, In: European Physical Journal D: Atomic, Molecular, Optical and Plasma Physics. 71, p. 1-7 7 p., 93.

    Research output: Contribution to journalArticlepeer-review

  172. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, (E-pub ahead of print) 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  173. Published

    On growth of homology torsion in amenable groups

    Kar, A., Kropholler, P. & Nikolov, N., Mar 2017, In: Mathematical Proceedings of the Cambridge Philosophical Society. 162, 2, p. 337-351 15 p.

    Research output: Contribution to journalArticlepeer-review

  174. Published

    Interoperability of security and quality of Service Policies Over Tactical SOA

    Gkioulos, V., Flizikowski, A., Stachowicz, A., Nogalski, D., Gleba, K., Sliwa, J. & Wolthusen, S., 13 Feb 2017, Proceedings of the 2016 Symposium on Computational Intelligence (SSCI 2016) . p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  175. Published

    Exactly solvable interacting two-particle quantum graphs

    Bolte, J. & Garforth, G., 2 Feb 2017, In: Journal of Physics A: Mathematical and Theoretical. 50, 10, p. 1-27 27 p., 105101.

    Research output: Contribution to journalArticlepeer-review

  176. Published

    The Berry-Keating operator on a lattice

    Bolte, J., Egger, S. & Stefan, K., 2 Feb 2017, In: Journal of Physics A: Mathematical and Theoretical. 50, 10, p. 1-17 17 p., 105201.

    Research output: Contribution to journalArticlepeer-review

  177. Published

    A note on the Mittag–Leffler condition for Bredon-modules

    Fluch, M. G., Gandini, G. & Nucinkis, B., Feb 2017, In: Archiv der Mathematik. 108, 2, p. 133–143 11 p.

    Research output: Contribution to journalArticlepeer-review

  178. Published

    Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 26 Jan 2017, Proceedings of the 14th International Conference of Smart City (SmartCity 2016). IEEE Press, p. 1380-1387 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  179. Published

    Handle slides for delta-matroids

    Moffatt, I. & eunice.mphako-banda@wits.ac.za, E., Jan 2017, In: European Journal of Combinatorics. 59, p. 23-33 11 p.

    Research output: Contribution to journalArticlepeer-review

  180. Published

    A Gutzwiller trace formula for large hermitian matrices

    Bolte, J., Egger, S. & Keppeler, S., 2017, In: Reviews in Mathematical Physics. 29, 8

    Research output: Contribution to journalArticlepeer-review

  181. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 2017, Critical Information Infrastructures Security: 11th International Conference, CRITIS 2016, Paris, France, October 10–12, 2016, Revised Selected Papers. Havarneanu, G., Setola, R., Nassopoulos, H. & Wolthusen, S. (eds.). Springer, p. 239-251 13 p. (Lecture Notes in Computer Science; vol. 10242).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  182. Published

    Action of generalized symmetric groups on symmetric and exterior powers of their natural representations

    O'Donovan, W., 2017, In: COMMUNICATIONS IN ALGEBRA. 45, 3, p. 1314-1322 9 p.

    Research output: Contribution to journalArticlepeer-review

  183. Unpublished

    Exactly solvable many-particle quantum graphs

    Garforth, G., 2017, (Unpublished)

    Research output: ThesisDoctoral Thesis

  184. Published

    Multi-level Access in Searchable Symmetric Encryption

    Alderman, J., Martin, K. & Renwick, S., 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323. p. 35-52 18 p. (Lecture Notes in Computer Science; vol. 10323).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  185. Unpublished

    On Matrix Channels for Network Coding

    Claridge, J., 2017, (Unpublished) 154 p.

    Research output: ThesisDoctoral Thesis

  186. Unpublished

    On Using the System Management Mode for Security Purposes

    Rodrigues De Souza, W. A., 2017, (Unpublished) 188 p.

    Research output: ThesisDoctoral Thesis

  187. Unpublished

    Private Information Retrieval using Regenerating Codes

    Dorkson, C. & Ng, S., 2017, (Unpublished)

    Research output: Other contribution

  188. Published

    RPPM: A Relationship-Based Access Control Model Utilising Relationships, Paths and Principal Matching

    Sellwood, J., 2017, 264 p.

    Research output: ThesisDoctoral Thesis

  189. Unpublished

    The Davenport Constant of Finite Abelian Groups

    Sheikh, A., 2017, (Unpublished) 137 p.

    Research output: ThesisDoctoral Thesis

  190. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  191. 2016
  192. Published

    Sums of two squares and a power

    Dietmann, R. & Elsholtz, C., 31 Dec 2016, From arithmetic to zeta-functions. Springer, [Cham], p. 103-108 6 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  193. Published

    Rate of convergence of truncated stochastic approximation procedures with moving bounds

    Sharia, T. & Zhong, L., 28 Dec 2016, In: Mathematical Methods of Statistics. 25, 4, p. 262–280 19 p.

    Research output: Contribution to journalArticlepeer-review

  194. E-pub ahead of print

    Constraint Analysis for Security Policy Partitioning Over Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 25 Dec 2016, (E-pub ahead of print) Advances in Network Systems : Architectures, Security, and Applications. AISC ed. Springer-Verlag, Vol. 461. p. 149-166 18 p. (Advances in Intelligent Systems and Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  195. Published

    Adversarial resilience of matchings in bipartite random graphs

    Balister, P., Gerke, S. & McDowell, A., 2 Dec 2016, In: Journal of Combinatorics. 8, 1, p. 79-92 14 p.

    Research output: Contribution to journalArticlepeer-review

  196. Published

    Sturmian bases for two-electron systems in hyperspherical coordinates

    Abdouraman, A., Frapacinni, A., Hamido, A., Mota-Furtado, F., O'Mahony, P., Mitnik, D., Gasaneo, G. & Piraux, B., 18 Nov 2016, In: Journal of Physics B: Atomic, Molecular and Optical Physics. 49, 23, p. 1-15 15 p., 235005.

    Research output: Contribution to journalArticlepeer-review

  197. Published

    Searching for knights and spies: A majority/minority game

    Wildon, M., 6 Nov 2016, In: Discrete Mathematics. 339, 11, p. 2754–2766 13 p.

    Research output: Contribution to journalArticlepeer-review

  198. Published

    Cohomological finiteness conditions and centralisers in generalisations of Thompson's group V

    Martinez-Perez, C., Matucci, F. & Nucinkis, B., 1 Sep 2016, In: Forum Mathematicum. 28, 5, p. 909-921 13 p.

    Research output: Contribution to journalArticlepeer-review

  199. Published

    Optimal universal quantum cloning: asymmetries and fidelity measures

    Kay, A., Sep 2016, In: Quantum Information and Computation. 16, 12, p. 991-1028 38 p.

    Research output: Contribution to journalArticlepeer-review

  200. Published

    Algorithms for the approximate common divisor problem

    Galbraith, S., Gebregiyorgis, S. & Murphy, S., 26 Aug 2016, In: LMS Journal of Computation and Mathematics. 19, A, p. 58-72 15 p.

    Research output: Contribution to journalArticlepeer-review

  201. Published

    Ping pong on CAT(0) cube complexes

    Kar, A. & Sageev, M., 18 Aug 2016, In: Commentarii Mathematici Helvetici. 91, 3, p. 543–561 19 p.

    Research output: Contribution to journalArticlepeer-review

  202. E-pub ahead of print

    A combinatorial proof of a plethystic Murnaghan--Nakayama rule

    Wildon, M., 16 Aug 2016, (E-pub ahead of print) In: SIAM Journal on Discrete Mathematics. 30, 3, p. 1526–1533 108 p.

    Research output: Contribution to journalArticlepeer-review

  203. Published

    Entanglement Rates and the Stability of the Area Law for the Entanglement Entropy

    Marien, M., Audenaert, K., Van Acoleyen, K. & Verstraete, F., Aug 2016, In: Communications in Mathematical Physics. 346, p. 35–73 39 p.

    Research output: Contribution to journalArticlepeer-review

  204. Published

    Indecomposable summands of Foulkes modules

    Giannelli, E. & Wildon, M., Aug 2016, In: Journal of Pure and Applied Algebra. 220, 8, p. 2969–2984 16 p.

    Research output: Contribution to journalArticlepeer-review

  205. E-pub ahead of print

    A Practical Cryptanalysis of the Algebraic Eraser

    Ben-Zvi, A., Blackburn, S. & Tsaban, B., 21 Jul 2016, (E-pub ahead of print) Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 179-189 11 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  206. E-pub ahead of print

    Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances

    Crampton, J. & Sellwood, J., 2 Jul 2016, (E-pub ahead of print) Data and Applications Security and Privacy XXX. Springer-Verlag, Vol. 9766. p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  207. Published

    Complete Bredon cohomology and its applications to hierarchically defined groups

    Nucinkis, B. & Petrosyan, N., Jul 2016, In: Mathematical Proceedings of the Cambridge Philosophical Society. 161, 1, p. 143-156 14 p.

    Research output: Contribution to journalArticlepeer-review

  208. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, (E-pub ahead of print) Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  209. Published

    On Completeness in Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 6 Jun 2016, Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies: SACMAT '16. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  210. Published

    Ribbon Graph Minors and Low-Genus Partial Duals

    Moffatt, I., Jun 2016, In: Annals of combinatorics. 20, 2, p. 373-378 6 p.

    Research output: Contribution to journalArticlepeer-review

  211. Published

    Entropy power inequalities for qudits

    Audenaert, K., Datta, N. & Ozols, M., 20 May 2016, In: Journal of Mathematical Physics. 57, 5, p. 1-27 27 p.

    Research output: Contribution to journalArticlepeer-review

  212. Published

    Privacy Violations in Constrained Micro-Grids: Adversarial Cases

    Ambassa, P., Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 19 May 2016, Proceedings of the 2016 30th International Conference on Advanced Information Networking and Applications Workshops (AINA 2016). IEEE Press, p. 601-606 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  213. Published

    Instability of Bose-Einstein condensation into the one-particle ground state on quantum graphs under repulsive perturbations

    Bolte, J. & Kerner, J., 18 Apr 2016, In: Journal of Mathematical Physics. 57, p. 1-9 9 p., 043301.

    Research output: Contribution to journalArticlepeer-review

  214. Published

    Quantum error correction for state transfer in noisy spin chains

    Kay, A., 14 Apr 2016, In: Physical Review A. 93, 4, p. 1-5 5 p., 042320.

    Research output: Contribution to journalArticlepeer-review

  215. E-pub ahead of print

    The majority game with an arbitrary majority

    Wildon, M. & Britnell, J. R., 11 Apr 2016, (E-pub ahead of print) In: Discrete Applied Mathematics. 208, p. 1-6 6 p.

    Research output: Contribution to journalArticlepeer-review

  216. Published

    Excluded Minors and the Ribbon Graphs of Knots

    Moffatt, I., Apr 2016, In: Journal of Graph Theory. 81, 4, p. 329–341 13 p.

    Research output: Contribution to journalArticlepeer-review

  217. Published

    Minimal and maximal constituents of twisted Foulkes characters

    Paget, R. & Wildon, M., Apr 2016, In: Journal of the London Mathematical Society. 93, 2, p. 301-318 18 p.

    Research output: Contribution to journalArticlepeer-review

  218. Unpublished

    The Davenport Constant

    Sheikh, A., 22 Mar 2016, (Unpublished).

    Research output: Contribution to conferencePoster

  219. Published

    Delay and jitter attacks on hierarchical state estimation

    Baiocco, A., Foglietta, C. & Wolthusen, S., 21 Mar 2016, Proceedings of the 2015 IEEE International Conference on Smart Grid Communications. IEEE Press, p. 485-490

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  220. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J., 9 Mar 2016, CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  221. Published

    Maximum Likelihood Decoding for Multilevel Channels With Gain and Offset Mismatch

    Blackburn, S., 1 Mar 2016, In: IEEE Transactions on Information Theory. 62, 3, p. 1144-1149 6 p.

    Research output: Contribution to journalArticlepeer-review

  222. Published

    Random congruences

    Brüdern, J. & Dietmann, R., 1 Mar 2016, In: Indagationes Mathematicae. 27, 2, p. 480-487 8 p.

    Research output: Contribution to journalArticlepeer-review

  223. Published

    Salem numbers of trace -2, and a conjecture of Estes and Guralnick

    McKee, J. & Yatsyna, P., Mar 2016, In: Journal of Number Theory. 160, p. 409–417 9 p.

    Research output: Contribution to journalArticlepeer-review

  224. Published

    Schanuel's theorem for heights defined via extension fields

    Frei, C. & Widmer, M., 25 Feb 2016, In: Annali della Scuola Normale Superiore di Pisa-Classe di Scienze. XV, p. 355-398 44 p.

    Research output: Contribution to journalArticlepeer-review

  225. Published

    Reformulation of the strong-field approximation for light-matter interactions

    Galstyan, A., Chuluunbaatar, O., Hamido, A., Popov, Y. V., Mota-Furtado, F., O'Mahony, P., Janssens, N., Catoire, F. & Piraux, B., 19 Feb 2016, In: Physical Review A. 93, 2, p. 1-14 14 p., 023422.

    Research output: Contribution to journalArticlepeer-review

  226. Published

    Primes In Beatty Sequences In Short Intervals

    Harman, G., 17 Feb 2016, In: Mathematika. 62, 2, p. 572-586 15 p.

    Research output: Contribution to journalArticlepeer-review

  227. Published

    Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 1 Feb 2016, Proceedings of the 2nd International Conference on Information Systems Security and Privacy (ICISSP 2016). SciTePress, p. 448-456 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  228. E-pub ahead of print

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S., 9 Jan 2016, (E-pub ahead of print) Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540. p. 187-205 19 p. (Lecture Notes in Computer Science; vol. 9540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  229. Published

    Policy enforcement system for secure interoperable control in distributed Smart Grid systems

    Alcaraz, C., Lopez, J. & Wolthusen, S., 1 Jan 2016, In: Journal of Network and Computer Applications. 59, p. 301-314 14 p.

    Research output: Contribution to journalArticlepeer-review

  230. Published

    Products of Small Integers in Residue Classes and Additive Properties of Fermat Quotients

    Harman, G. & Shparlinski, I. E., 1 Jan 2016, In: International Mathematics Research Notices. 2016, 5, p. 1424-1446 23 p.

    Research output: Contribution to journalArticlepeer-review

  231. Published

    Pearson Codes

    Weber, J., Immink, K. A. S. & Blackburn, S., Jan 2016, In: IEEE Transactions on Information Theory. 62, 1, p. 131-135 5 p.

    Research output: Contribution to journalArticlepeer-review

  232. Unpublished

    A note on scaling limits for truncated birth-and-death processes with interaction

    Shcherbakov, V. & Yambartsev, A., 2016, (Unpublished) In: ArXiv.org.

    Research output: Contribution to journalArticlepeer-review

  233. Unpublished
  234. Unpublished

    Cohomology of Profinite Groups

    Corob Cook, G., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  235. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  236. Unpublished

    Integer Symmetric Matrices: Counterexamples to Estes-Guralnick's conjecture

    Yatsyna, P., 2016, (Unpublished) 138 p.

    Research output: ThesisDoctoral Thesis

  237. Published

    Integral Points of Fixed Degree and Bounded Height

    Widmer, M., 2016, In: International Mathematics Research Notices. 2016, 13, p. 3906-3943 38 p.

    Research output: Contribution to journalArticlepeer-review

  238. Published

    Key Management for Secure Demand Data Communication in Constrained Micro-Grids

    Kayem, A. V. D. M., Strauss, H., Wolthusen, S. & Meinel, C., 2016, Advanced Information Networking and Applications Workshops (WAINA), 2016 30th International Conference on. IEEE Press, p. 585-590 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  239. Published

    Multigraph Critical Infrastructure Model

    Schneidhofer, B. & Wolthusen, S., 2016, Critical Infrastructure Protection X: 10th IFIP WG 11.10 International Conference, ICCIP 2016, Arlington, VA, USA, March 14-16, 2016, Revised Selected Papers. Springer-Verlag, Vol. 485. p. 149-167 19 p. (IFIP Advances in Information and Communication Technology; vol. 485).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  240. Unpublished

    Numerical Methods for the Interaction of Atoms with Intense Low Frequency Laser Pulses

    Pyke, D., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  241. Published

    On deficiency gradient of groups

    Kar, A. & Nikolov, N., 2016, In: International Mathematics Research Notices. 2016, 3, p. 696-716 21 p.

    Research output: Contribution to journalArticlepeer-review

  242. Published

    Reciprocal Lie-Trotter formula

    Audenaert, K. & Hiai, F., 2016, In: Linear and Multilinear Algebra. 64, 6, p. 1220-1235 16 p.

    Research output: Contribution to journalArticlepeer-review

  243. Published

    Regularisation, interpolation and visualisation of diffusion tensor images using non-Euclidean statistics

    Zhou, D., Dryden, I., Koloydenko, A. A., Audenaert, K. & Bai, L., 2016, In: Journal of Applied Statistics. 43, 5, p. 943-978 36 p.

    Research output: Contribution to journalArticlepeer-review

  244. Unpublished

    Small Salem Graphs

    Cooley, J., 2016, (Unpublished)

    Research output: ThesisDoctoral Thesis

  245. 2015
  246. Published

    On the ribbon graphs of links in real projective space

    Moffatt, I. & Strömberg, J., 17 Dec 2015, In: Involve. 9, 1, p. 133-153 21 p.

    Research output: Contribution to journalArticlepeer-review

  247. Published

    Degree of quantum correlation required to speed up a computation

    Kay, A., 14 Dec 2015, In: Physical Review A. 92, 6, p. 1-7 7 p., 062329.

    Research output: Contribution to journalArticlepeer-review

  248. E-pub ahead of print

    Generating Unlinkable IPv6 Addresses

    Nyirenda, M., Khan, M., Li, W., Mitchell, C. & Yau, P-W., 9 Dec 2015, (E-pub ahead of print) Proceedings of SSR 15, Tokyo, December 2015. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 185-199 15 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  249. Published

    Number fields without small generators

    Widmer, M. & Vaaler, J., Nov 2015, In: Mathematical Proceedings of the Cambridge Philosophical Society. 159, 3, p. 379-385 7 p.

    Research output: Contribution to journalArticlepeer-review

  250. Published

    Don’t Brick Your Car: Firmware Confidentiality and Rollback for Vehicles

    Mansor, H., Markantonakis, K., Akram, R. & Mayes, K., 19 Oct 2015, 10th International Conference on Availability, Reliability and Security: ARES 2015. IEEE, p. 139-148 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  251. Published

    Rational points on intersections of cubic and quadric hypersurfaces

    Browning, T. D., Dietmann, R. & Heath-Brown, D. R., Oct 2015, In: Journal of the Institute of Mathematics of Jussieu. 14, 4, p. 703-749 47 p.

    Research output: Contribution to journalArticlepeer-review

  252. Published

    Obligations in PTaCL

    Williams, C. & Crampton, J., 22 Sep 2015, Security and Trust Management: 11th International Workshop, STM 2015, Vienna, Austria, September 21-22, 2015, Proceedings. Foresti, S. (ed.). Springer, p. 220-235 16 p. (Lecture Notes in Computer Science; vol. 9331).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  253. E-pub ahead of print

    Probabilistic Existence Results for Separable Codes

    Blackburn, S., 22 Sep 2015, (E-pub ahead of print) In: IEEE Transactions on Information Theory. 61, 11, p. 5822-5827 6 p.

    Research output: Contribution to journalArticlepeer-review

  254. Published

    DNA origami and the complexity of Eulerian circuits with turning costs

    A. Ellis-Monaghan, J., McDowell, A., Moffatt, I. & Pangborn, G., Sep 2015, In: Natural Computing. 14, 3, p. 491–503 13 p.

    Research output: Contribution to journalArticlepeer-review

  255. Published

    Finite generation of iterated wreath products in product action

    Vannacci, M., Sep 2015, In: Archiv der Mathematik. 105, 3, p. 205-214 10 p.

    Research output: Contribution to journalArticlepeer-review

  256. Published

    Non-Overlapping Codes

    Blackburn, S., Sep 2015, In: IEEE Transactions on Information Theory. 61, 9, p. 4890-4894 5 p.

    Research output: Contribution to journalArticlepeer-review

  257. Published

    Primes in Intersections of Beatty Sequences

    Harman, G., 4 Jul 2015, In: Journal of Integer Sequences. 18, 7, p. 1-12 12 p., 15.7.3.

    Research output: Contribution to journalArticlepeer-review

  258. Published

    Controllability and matchings in random bipartite graphs

    Balister, P. & Gerke, S., Jul 2015, Surveys in Combinatorics 2015. Czumaj, A., Georgakopoulos, A., Král, D., Lozin, V. & Pikhurko, O. (eds.). Cambridge University Press, Vol. 424. p. 119-146 28 p. (London Mathematical Society Lecture Note Series; vol. 424).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  259. Published

    Interpolating between the arithmetic-geometric mean and Cauchy-Schwarz matrix norm inequalities

    Audenaert, K., 1 Jun 2015, In: Operators and Matrices. 9, 2, p. 475–479 5 p.

    Research output: Contribution to journalArticlepeer-review

  260. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  261. Published

    Relationships, Paths and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 29 May 2015, In: ArXiv.org.

    Research output: Contribution to journalArticle

  262. Published

    Evaluations of Topological Tutte Polynomials

    Ellis-Monaghan, J. A. & Moffatt, I., May 2015, In: Combinatorics, Probability and Computing. 24, 3, p. 556-583 28 p.

    Research output: Contribution to journalArticlepeer-review

  263. Published

    Zero Modes of Quantum Graph Laplacians and an Index Theorem

    Bolte, J., Egger, S. & Steiner, F., May 2015, In: Annales Henri Poincare. 16, 5, p. 1155-1189 35 p.

    Research output: Contribution to journalArticlepeer-review

  264. Published

    Multiresolution schemes for time-scaled propagation of wave packets

    Frapiccini, A., Hamido, A., Mota-Furtado, F., O'Mahony, P. & Piraux, B., 30 Apr 2015, In: Physical Review A. 91, 4, 10 p., 043423.

    Research output: Contribution to journalArticlepeer-review

  265. Published

    Structural Controllability Analysis Via Embedding Power Dominating Set Approximation in ErdHos-Rènyi Graphs

    Alwasel, B. & Wolthusen, S. D., 30 Apr 2015, The proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications (AINA-2015). IEEE, p. 418-423 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  266. Published

    Cover-free codes and frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., Apr 2015.

    Research output: Contribution to conferenceAbstractpeer-review

  267. E-pub ahead of print

    On a block matrix inequality quantifying the monogamy of the negativity of entanglement

    Audenaert, K., 20 Mar 2015, (E-pub ahead of print) In: Linear and Multilinear Algebra. 63, 12, p. 2526-2536 11 p.

    Research output: Contribution to journalArticlepeer-review

  268. Published

    Weyl's inequality and systems of forms

    Dietmann, R., 1 Mar 2015, In: Quarterly Journal of Mathematics. 66, 1, p. 97-110 14 p.

    Research output: Contribution to journalArticlepeer-review

  269. Unpublished

    A Determinantal Inequality for the Geometric Mean with an Application in Diffusion Tensor Imaging

    Audenaert, K., 25 Feb 2015, (Unpublished) In: ArXiv.org. 1502.06902, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  270. Published

    Reading QBism: A Reply to Nauenberg

    Fuchs, C. A., Mermin, N. D. & Schack, R., 20 Feb 2015, In: American Journal of Physics. 83, 3, p. 198 1 p.

    Research output: Contribution to journalArticlepeer-review

  271. E-pub ahead of print

    α-z-Rényi relative entropies

    Audenaert, K. & Datta, N., 18 Feb 2015, (E-pub ahead of print) In: Journal of Mathematical Physics. 56, 2, p. 1-16 16 p., 022202.

    Research output: Contribution to journalArticlepeer-review

  272. Published

    A norm inequality for pairs of commuting positive semidefinite matrices

    Audenaert, K., 16 Feb 2015, In: Electronic Journal of Linear Algebra. 30, p. 80-84 5 p., 5.

    Research output: Contribution to journalArticlepeer-review

  273. Published

    Foulkes modules and decomposition numbers of the symmetric group

    Giannelli, E. & Wildon, M., Feb 2015, In: Journal of Pure and Applied Algebra. 219, 2, p. 255-276 22 p.

    Research output: Contribution to journalArticlepeer-review

  274. Published

    On the complexity of the BKW algorithm on LWE

    Albrecht, M., Cid, C., Faugere, J-C., Fitzpatrick, R. & Perret, L., Feb 2015, In: Designs, Codes and Cryptography. 74, 2, p. 325-354 30 p.

    Research output: Contribution to journalArticlepeer-review

  275. Published

    On conjectures of T. Ordowski and Z.W. Sun concerning primes and quadratic forms

    Elsholtz, C. & Harman, G., 1 Jan 2015, Analytic Number Theory: In Honor of Helmut Maier's 60th Birthday. Springer International Publishing, p. 65-81 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  276. Published

    Some 퐇1픉-groups with unbounded torsion and a conjecture of Kropholler and Mislin

    Gandini, G. & Nucinkis, B., 1 Jan 2015, In: Forum Mathematicum. 27, 1, p. 99-118 20 p.

    Research output: Contribution to journalArticlepeer-review

  277. Published

    Long Term Behaviour of Locally Interacting Birth-and-Death Processes

    Shcherbakov, V. & Volkov, S., Jan 2015, In: Journal of Statistical Physics. 158, 1, p. 132-157 26 p.

    Research output: Contribution to journalArticlepeer-review

  278. Published

    Maximizing the minimum load for random processing times

    Gerke, S., Panagiotou, K., Schwartz, J. & Steger, A., Jan 2015, In: ACM Transactions on Algorithms (TALG). 11, 3, p. 1-19 19 p., 17.

    Research output: Contribution to journalArticlepeer-review

  279. Published

    Hilbert cubes in arithmetic sets

    Dietmann, R. & Elsholtz, C., 2015, In: Revista Matemática Iberoamericana. 31, 4, p. 1477-1498 22 p.

    Research output: Contribution to journalArticlepeer-review

  280. Unpublished

    Integral quadratic points of bounded height

    Widmer, M. & Dietmann, R., 2015, (Unpublished).

    Research output: Working paper

  281. Unpublished

    Multiplicative Properties of Integers in Short Intervals

    Islam, A., 2015, (Unpublished) 121 p.

    Research output: ThesisDoctoral Thesis

  282. Unpublished

    On a family of hereditarily just infinite profinite groups which are not virtually pro-p

    Vannacci, M., 2015, (Unpublished) 109 p.

    Research output: ThesisDoctoral Thesis

  283. Published

    Random Thue and Fermat equations

    Dietmann, R., 2015, In: Acta Arithmetica. 167, p. 189-200 12 p.

    Research output: Contribution to journalArticlepeer-review

  284. Unpublished

    Rational Representation Zeta Functions of Crystallographic Groups

    Ali, L., 2015, (Unpublished) 129 p.

    Research output: ThesisDoctoral Thesis

  285. Unpublished

    Representations of symmetric groups

    Giannelli, E., 2015, (Unpublished) 124 p.

    Research output: ThesisDoctoral Thesis

  286. Published

    The Las Vergnas Polynomial for embedded graphs

    Ellis-Monaghan, J. A. & Moffatt, I., 2015, In: European Journal of Combinatorics. p. 97-114

    Research output: Contribution to journalArticlepeer-review

  287. Unpublished

    Truncated Stochastic Approximation with Moving Bounds

    Zhong, L., 2015, (Unpublished) 139 p.

    Research output: ThesisDoctoral Thesis

  288. 2014
  289. E-pub ahead of print

    A note on recognizing an old friend in a new place: list coloring and the zero-temperature Potts model

    A. Ellis-Monaghan, J. & Moffatt, I., 31 Dec 2014, (E-pub ahead of print) In: Annales de L’Institut Henri Poincaré D. 1, 4, p. 429–442 14 p.

    Research output: Contribution to journalArticlepeer-review

  290. Published

    QBism and the Greeks: why a quantum state does not represent an element of physical reality

    Fuchs, C. A. & Schack, R., 31 Dec 2014, In: Physica Scripta. 90, 1, p. 1-6 6 p.

    Research output: Contribution to journalArticlepeer-review

  291. Published

    Characterising the Performance of XOR Games and the Shannon Capacity of Graphs

    Ramanathan, R., Kay, A., Murta, G. & Horodecki, P., 8 Dec 2014, In: Physical Review Letters. 113, 24, p. 1-5 5 p., 240401 .

    Research output: Contribution to journalArticlepeer-review

  292. E-pub ahead of print

    Heat-kernel and Resolvent Asymptotics for Schrödinger Operators on Metric Graphs

    Bolte, J., Egger, S. & Rueckriemen, R., 3 Dec 2014, (E-pub ahead of print) In: Applied Mathematics Research Express. 2015, 1, p. 129-165 37 p.

    Research output: Contribution to journalArticlepeer-review

  293. Published

    Ionization and excitation of the excited hydrogen atom in strong circularly polarized laser fields

    Bauer, J. H., Mota-Furtado, F., O'Mahony, P., Piraux, B. & Warda, K., 1 Dec 2014, In: Physical Review A. 90, 6, p. 1-6 6 p., 063402.

    Research output: Contribution to journalArticlepeer-review

  294. Published

    Quantum skew divergence

    Audenaert, K., Nov 2014, In: Journal of Mathematical Physics. 55, 11, p. 1-21 21 p., 112202.

    Research output: Contribution to journalArticlepeer-review

  295. Unpublished

    A generalisation of Mirsky's singular value inequalities

    Audenaert, K., 21 Oct 2014, (Unpublished) In: ArXiv.org. 1410.4941

    Research output: Contribution to journalArticle

  296. Published

    Upper bounds on the error probabilities and asymptotic error exponents in quantum multiple state discrimination

    Audenaert, K. & Mosonyi, M., Oct 2014, In: Journal of Mathematical Physics. 55, 10, 39 p., 102201.

    Research output: Contribution to journalArticlepeer-review

  297. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  298. Published

    Towards intra-operative diagnosis of tumours during breast conserving surgery by selective-sampling Raman micro-spectroscopy

    Kong, K., Zaabar, F., Rakha, E., Ellis, I., Koloydenko, A. & Notingher, I., 25 Sep 2014, In: Physics in Medicine and Biology. 59, 20, p. 6141-6152 12 p.

    Research output: Contribution to journalArticlepeer-review

  299. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  300. Published

    Increasing the speed of tumour diagnosis during surgery with selective scanning Raman microscopy

    Kong, K., Rowlands, C., Varma, S., Perkins, W., Leach, I., Koloydenko, A., Pitiot, A., Williams, H. & Notingher, I., 5 Sep 2014, In: Journal of Molecular Structure. 1073, p. 58-65 8 p.

    Research output: Contribution to journalArticlepeer-review

  301. Published

    The discrete logarithm problem for exponents of bounded height

    Scott, S. & Blackburn, S., 5 Aug 2014, p. 148. 156 p.

    Research output: Contribution to conferencePaperpeer-review

  302. E-pub ahead of print

    An Introduction to QBism with an Application to the Locality of Quantum Mechanics

    Fuchs, C. A., Mermin, N. D. & Schack, R., 22 Jul 2014, (E-pub ahead of print) In: American Journal of Physics. 82, 8, p. 749-754 6 p.

    Research output: Contribution to journalArticlepeer-review

  303. Published

    Truncated Stochastic Approximation with Moving Bounds: Convergence

    Sharia, T., Jul 2014, In: Statistical Inference for Stochastic Processes. 17, p. 163-179 17 p.

    Research output: Contribution to journalArticlepeer-review

  304. E-pub ahead of print

    Many-particle quantum graphs and Bose-Einstein condensation

    Bolte, J. & Kerner, J., 2 Jun 2014, (E-pub ahead of print) In: Journal of Mathematical Physics. 55, 6, p. 1-16 16 p., 061901.

    Research output: Contribution to journalArticlepeer-review

  305. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  306. Published

    Precise Instruction-Level Side Channel Profiling of Embedded Processors

    Msgna, M., Markantonakis, K. & Mayes, K., 5 May 2014, Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings. Vol. 8434. p. 129-143 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  307. Published

    Random Diophantine equations, I

    Brüdern, J. & Dietmann, R., 1 May 2014, In: Advances in Mathematics. 256, p. 18-45 28 p.

    Research output: Contribution to journalArticlepeer-review

  308. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  309. Published

    A trace bound for positive definite connected integer symmetric matrices

    McKee, J. & Yatsyna, P., 1 Mar 2014, In: Linear Algebra and Its Applications. 444, p. 227-230 4 p.

    Research output: Contribution to journalArticlepeer-review

  310. Published

    A certificateless anonymous authenticated announcement scheme in vehicular ad hoc networks.

    Li, Q., Malip, A. & Ng, S-L., Mar 2014, In: Security and Communication Networks. 7, 3, p. 588-601 doi: 10.1002/sec.760.

    Research output: Contribution to journalArticlepeer-review

  311. Published

    Explicit schemes for time propagating many-body wavefunctions

    Frapiccini, A., Hamido, A., Schroter, S., Pyke, D., Mota-Furtado, F., O'Mahony, P., Madronero, J., Eiglsperger, J. & Piraux, B., 14 Feb 2014, In: Physical Review A. 89, 023418.

    Research output: Contribution to journalArticlepeer-review

  312. E-pub ahead of print

    The Potts model and chromatic functions of graphs

    Klazar, M., Loebl, M. & Moffatt, I., 4 Feb 2014, (E-pub ahead of print) In: Annales de L’Institut Henri Poincaré D. 1, 1, p. 47–60 14 p.

    Research output: Contribution to journalArticlepeer-review

  313. Published

    Decoherence-assisted transport in quantum networks

    Marais, A., Sinayskiy, I., Kay, A., Petruccione, F. & Ekert, A., 26 Jan 2014, In: New Journal of Physics.

    Research output: Contribution to journalArticlepeer-review

  314. Published

    Bridging Viterbi and Posterior Decoding: A Generalized Risk Approach to Hidden Path Inference Based on Hidden Markov Models

    Lember, J. & Koloydenko, A. A., Jan 2014, In: Journal of Machine Learning Research. 15, p. 1-58 58 p.

    Research output: Contribution to journalArticlepeer-review

  315. Published

    Photonic coherent state transfer with Hamiltonian dynamics

    Kay, A., Jan 2014, In: Optics Letters. 39, p. 123 4 p.

    Research output: Contribution to journalArticlepeer-review

  316. Published

    A classification of all 1-Salem graphs

    McKee, J. & Gumbrell, L., 2014, In: LMS Journal of Computation and Mathematics. 17, 1, p. 582-594 13 p.

    Research output: Contribution to journalArticlepeer-review

  317. Unpublished

    Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks

    Malip, A., 2014, (Unpublished) 156 p.

    Research output: ThesisDoctoral Thesis

  318. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  319. Published

    CAN Bus Risk Analysis Revisit

    Mansor, H., Markantonakis, K. & Mayes, K., 2014, Information Security Theory and Practice. Securing the Internet of Things. Naccache, D. & Sauveron, D. (eds.). Springer, Vol. 8501. p. 170-179 10 p. (Lecture Notes in Computer Science; vol. 8501).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  320. Published

    Comparisons between quantum state distinguishability measures

    Audenaert, K., 2014, In: Quantum Inf. Comput.. 14, 1&2, p. 31-38

    Research output: Contribution to journalArticlepeer-review

  321. Published

    Malicious MPLS Policy Engine Reconnaissance

    Almutairi, A. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014)}. Springer-Verlag, Vol. 8735. p. 3 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  322. Unpublished

    Maximal Subgroups of Branch Groups

    Alexoudas, T., 2014, (Unpublished)

    Research output: ThesisDoctoral Thesis

  323. Published

    Non-Bipartite Graphs of Small Mahler Measure

    McKee, J., Cooley, J. & Smyth, C., 2014, In: Journal of Combinatorics and Number Theory. 5, 2, p. 53-64 12 p.

    Research output: Contribution to journalArticlepeer-review

  324. Published

    Orbit coherence in permutation groups

    Wildon, M. & Britnell, J. R., 2014, In: Journal of Group Theory. 17, p. 73 109 p.

    Research output: Contribution to journalArticlepeer-review

  325. Published

    Path Conditions and Principal Matching: A New Approach to Access Control

    Crampton, J. & Sellwood, J., 2014, 19th ACM Symposium on Access Control Models and Technologies. ACM, p. 187-198

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  326. Published

    Quantum Measurement and the Paulian Idea

    Fuchs, C. A. & Schack, R., 2014, The Pauli-Jung Conjecture : And its impact today. Atmanspacher, H. & Fuchs, C. A. (eds.). Exeter: Imprint Academic, p. 93-108 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  327. Published

    Reconstruction of Structural Controllability over Erdös-Rényi Graphs via Power Dominating Sets

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR '14). ACM Press, p. 57 60 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  328. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs via Partial Control Structure Re-Use

    Alwasel, B. & Wolthusen, S. D., 2014, Proceedings of the 9th International Conference on Critical Information Infrastructures Security (CRITIS 2014). Springer-Verlag, p. 293-307

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  329. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  330. Unpublished

    Spanning Structures of Graphs

    Mcdowell, A., 2014, (Unpublished) 151 p.

    Research output: ThesisDoctoral Thesis

  331. Published

    Telescopic Relative Entropy

    Audenaert, K., 2014, Theory of Quantum Computation, Communication, and Cryptography - 6th Conference, TQC 2011, Madrid. Springer, Vol. LNCS 6745. p. 39-52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  332. Published

    The density of twins of $k$-free numbers

    Dietmann, R. & Marmon, O., 2014, In: Bulletin of the London Mathematical Society. 46, 4, p. 818-826 9 p.

    Research output: Contribution to journalArticlepeer-review

  333. 2013
  334. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  335. Published

    Quantum Bayesian coherence

    Fuchs, C. A. & Schack, R., Dec 2013, In: Reviews of Modern Physics. 85, p. 1693-1715

    Research output: Contribution to journalArticlepeer-review

  336. Published

    Sleeping Android: The Danger of Dormant Permissions

    Sellwood, J. & Crampton, J., 8 Nov 2013, Proceedings of the ACM Conference on Computer and Communications Security. ACM, p. 55-66 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  337. Published

    Schur multiplier norms for Loewner matrices

    Audenaert, K., 1 Nov 2013, In: Linear Algebra and Its Applications. 439, 9, p. 2598-2608

    Research output: Contribution to journalArticlepeer-review

  338. Published

    Heat kernel asymptotics for magnetic Schrödinger operators

    Bolte, J. & Keppeler, S., Nov 2013, In: Journal of Mathematical Physics. 54, 11, 112104.

    Research output: Contribution to journalArticlepeer-review

  339. Published

    The Duffin-Schaeffer Conjecture with extra divergence II

    Harman, G., Beresnevich, V., Haynes, A. & Velani, S., 1 Oct 2013, In: Math. Zeit.. 275, p. 127–133 7 p.

    Research output: Contribution to journalArticlepeer-review

  340. Published

    The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems

    Msgna, M., Markantonakis, K. & Mayes, K., 25 Sep 2013, Security and Privacy in Communication Networks: 9th International ICST Conference. Sydney, Australia, Vol. 127. p. 288-304 16 p. (Lecture Notes of the Institute for Computer Sciences, Social Information and Telecommunication Engineering; vol. 127).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  341. Published

    Diagnosis of tumors during tissue-conserving surgery with integrated autofluorescence and Raman scattering microscopy

    Kong, K., Rowlands, C., Varma, S., Perkins, W., Leach, I., Koloydenko, A., Williams, H. & Notingher, I., 17 Sep 2013, In: Proceedings of the National Academy of Sciences of the United States of America. 110, 38, p. 15189-15194 6 p.

    Research output: Contribution to journalArticlepeer-review

  342. Published

    An Overview of PIC Microcontrollers and Their Suitability for Cryptographic Algorithms

    Msgna, M. & Walter, C., 13 Sep 2013, Secure Smart Embedded Devices, Platforms and Applications. Markantonakis, K. & Mayes, K. (eds.). Springer, p. 475-495 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  343. Published

    Subscriber Centric Conditional Access System for Pay-TV Systems

    Msgna, M., Markantonakis, K., Mayes, K. & Akram, R. N., 11 Sep 2013, IEEE 10th International Conference on e-Business Engineering (ICEBE): IEEE Computer Society. p. 459-455 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  344. Published

    On matrix inequalities between the power means: counterexamples

    Audenaert, K. & Hiai, F., 1 Sep 2013, In: Linear Algebra and Its Applications. 439, 5, p. 1590-1604

    Research output: Contribution to journalArticlepeer-review

  345. Published

    Optimal Asymmetric Quantum Cloning

    Kay, A., Ramanathan, R. & Kaszlikowski, D., Sep 2013, In: Quantum Information and Computation. 13, p. 880

    Research output: Contribution to journalArticlepeer-review

  346. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  347. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  348. Published

    A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 8 Jul 2013, The 25th IFIP International Information Security Conference (SEC 2013). Springer-Verlag, Vol. 405. p. 102-110 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  349. Published

    On p-deficiency in groups

    Barnea, Y. & Schlage-Puchta, J. C., Jul 2013, In: Journal of Group Theory. 16, 4, p. 497-517 21 p.

    Research output: Contribution to journalArticlepeer-review

  350. Published

    Counting lattice points and o-minimal structures

    Barroero, F. & Widmer, M., 10 Jun 2013, In: International Mathematics Research Notices.

    Research output: Contribution to journalArticlepeer-review

  351. Published

    Single polynomials that correspond to pairs of cyclotomic polynomials with interlacing zeros

    McKee, J. & Smyth, C., 1 May 2013, In: Central European Journal of Mathematics. 11, 5, p. 882-899

    Research output: Contribution to journalArticlepeer-review

  352. Published

    Limited measurement dependence in multiple runs of a Bell test

    E. Pope, J. & Kay, A., 17 Apr 2013, In: Physical Review A. 88, 032110.

    Research output: Contribution to journalArticlepeer-review

  353. Published

    Bipartite partial duals and circuits in medial graphs

    Huggett, S. & Moffatt, I., Apr 2013, In: Combinatorica. 33, 2, p. 231-252 22 p.

    Research output: Contribution to journalArticlepeer-review

  354. Published

    Bipartite partial duals and circuits in medial graphs

    Huggett, S. & Moffatt, I., Apr 2013, In: Combinatorica. 33, 2, p. 231-252

    Research output: Contribution to journalArticlepeer-review

  355. Published

    Coherent Quantum Transport in Photonic Lattices

    Perez-Leija, A., Keil, R., Kay, A., Moya-Cessa, H., Nolte, S., Kwek, L-C., M. Rodríguez-Lara, B., Szameit, A. & N. Christodoulides, D., Jan 2013, In: Physical Review A. 87, 012309.

    Research output: Contribution to journalArticlepeer-review

  356. Published

    On the Montgomery-Hooley Theorem in Short Intervals

    Harman, G., Jan 2013, In: Mathematika. 59, p. 129-139 11 p.

    Research output: Contribution to journalArticlepeer-review

  357. Published

    A Penrose polynomial for embedded graphs

    A. Ellis-Monaghan, J. & Moffatt, I., 2013, In: European Journal of Combinatorics. 34, 2, p. 424-445

    Research output: Contribution to journalArticlepeer-review

  358. Published

    An Analysis of Service Degradation Attacks against Real-Time MPLS Networks

    Almutairi, A. & Wolthusen, S. D., 2013, Proceedings of the 2013 Information Security South Africa Conference (ISSA 2013). IEEE Computer Society Press, p. 1-8

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  359. Published

    An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462

    Research output: Contribution to journalArticlepeer-review

  360. Published

    Bredon cohomological finiteness conditions for generalisations of Thompson's groups

    Martinez-Perez, C. & Nucinkis, B., 2013, In: Groups, Geometry, and Dynamics. 7, 4

    Research output: Contribution to journalArticlepeer-review

  361. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  362. Published

    Cohomological finiteness properties of the Brin-Thompson-Higman groups 2V and 3V

    Kochloukova, D., Martinez-Perez, C. & Nucinkis, B., 2013, In: Proceedings of the Edinburgh Mathematical Society (Series 2). 56, 03, p. 777-804 28 p.

    Research output: Contribution to journalArticlepeer-review

  363. Published

    Comment on "Adiabatic quantum computation with a one-dimensional projector Hamiltonian"

    Kay, A., 2013, In: Physical Review A. 88, 046301.

    Research output: Contribution to journalArticlepeer-review

  364. Published

    Counting points of fixed degree and given height over function fields

    Thunder, J. L. & Widmer, M., 2013, In: Bulletin of the London Mathematical Society. 45, 2, p. 283-300 24 p.

    Research output: Contribution to journalArticlepeer-review

  365. Unpublished

    Cryptographic Approaches To Security and Privacy Issues In Pervasive Computing

    Cho, J., 2013, (Unpublished) 171 p.

    Research output: ThesisDoctoral Thesis

  366. Published

    Deformations and rigidity of lattices in solvable Lie groups

    Baues, O. & Klopsch, B., 2013, In: Journal of Topology.

    Research output: Contribution to journalArticlepeer-review

  367. Published

    Enabling interoperation between Shibboleth and information card systems

    Al-Sinani, H. S. & Mitchell, C. J., 2013, In: Security and Communication Networks. 6, 2, p. 219-229 11 p.

    Research output: Contribution to journalArticlepeer-review

  368. Published

    Finding a princess in a palace: a pursuit–evasion problem

    Wildon, M. & Britnell, J. R., 2013, In: The Electronic Journal of Combinatorics. 20, 1, 8 p., 25.

    Research output: Contribution to journalArticlepeer-review

  369. Unpublished

    Fingerprinting Codes and Separating Hash Families

    Rochanakul, P., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  370. Published

    Graphs on Surfaces: Dualities, Polynomials, and Knots

    Moffatt, I. & Ellis-Monaghan, J. A., 2013, Springer.

    Research output: Book/ReportBook

  371. Unpublished

    Hereditarily Just Infinite Profinite Groups that are Not Virtually Pro-p

    Middleton, S., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  372. Unpublished

    Improvements and Generalisations of Signcryption Schemes

    Zhang, W., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  373. Published

    In-betweenness: a geometrical monotonicity property for operator means

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 4, p. 1769-1778

    Research output: Contribution to journalArticlepeer-review

  374. Unpublished

    Interacting many-particle systems on general compact quantum graphs

    Kerner, J., 2013, (Unpublished) 152 p.

    Research output: ThesisDoctoral Thesis

  375. Published

    Non-Interactive Key Exchange

    Freire, E. S. V., Hofheinz, D., Kiltz, E. & Paterson, K. G., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 254-271 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  376. Published

    On gaps between primitive roots in the Hamming metric

    Dietmann, R., Elsholtz, C. & Shparlinski, I. E., 2013, In: Quarterly Journal of Mathematics. 64, 4, p. 1043-1055 13 p.

    Research output: Contribution to journalArticle

  377. Published

    On gaps between quadratic non-residues in the Euclidean and Hamming metrics

    Dietmann, R., Elsholtz, C. & Shparlinski, I. E., 2013, In: Indag. Math. (N.S.). 24, 4, p. 930-938 9 p.

    Research output: Contribution to journalArticle

  378. Unpublished

    On spectral constructions for Salem graphs

    Gumbrell, L., 2013, (Unpublished) 102 p.

    Research output: ThesisDoctoral Thesis

  379. Published

    On the asymmetry of the relative entropy

    Audenaert, K., 2013, In: Journal of Mathematical Physics. 54, 073506.

    Research output: Contribution to journalArticlepeer-review

  380. Published

    On the classifying space for the family of virtually cyclic subgroups for elementary amenable groups

    Fluch, M. & Nucinkis, B., 2013, In: Proceedings of the American Mathematical Society. 141 , 11

    Research output: Contribution to journalArticlepeer-review

  381. Published

    On the Erdős–Falconer distance problem for two sets of different size in vector spaces over finite fields

    Dietmann, R., 2013, In: Monatshefte für Mathematik. 170, 3-4, p. 343-359

    Research output: Contribution to journalArticlepeer-review

  382. Published

    On the Northcott property and other properties related to polynomial mappings

    Widmer, M. & Checcoli, S., 2013, In: Mathematical Proceedings of the Cambridge Philosophical Society. 155, 1

    Research output: Contribution to journalArticlepeer-review

  383. Published

    On the representation of quadratic forms by quadratic forms

    Dietmann, R. & Harvey, M., 2013, In: Michigan Math. J.. 62, 4, p. 869-889 21 p.

    Research output: Contribution to journalArticle

  384. Forthcoming

    On types of matrices and centralizers of matrices and permutations

    Wildon, M. & Britnell, J. R., 2013, (Accepted/In press) In: Journal of Group Theory.

    Research output: Contribution to journalArticlepeer-review

  385. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  386. Published

    Probabilistic Galois theory

    Dietmann, R., 2013, In: Bulletin of the London Mathematical Society. 45, 3, p. 453-462 10 p.

    Research output: Contribution to journalArticle

  387. Published

    Quantum graphs with singular two-particle interactions

    Bolte, J. & Kerner, J., 2013, In: Journal of Physics A: Mathematical and Theoretical. 46, 4, 045206.

    Research output: Contribution to journalArticlepeer-review

  388. Published

    Quantum graphs with two-particle contact interactions

    Bolte, J. & Kerner, J., 2013, In: Journal of Physics A: Mathematical and Theoretical. 46, 4, 18 p., 045207.

    Research output: Contribution to journalArticlepeer-review

  389. Published

    Representation zeta functions of compact p-adic analytic groups and arithmetic groups

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2013, In: Duke Mathematical Journal. 162, 1, p. 111-197

    Research output: Contribution to journalArticlepeer-review

  390. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  391. Unpublished

    Secure e-Payment Portal Solutions Using Mobile Technologies and Citizen Identity Scheme

    Chen, C., 2013, (Unpublished) 229 p.

    Research output: ThesisDoctoral Thesis

  392. Published

    Security aspects in the cognition cycle of distributed cognitive radio networks: a survey from a multi-agent perspective

    Yau, K-L. A., Poh, G. S. & Komisarczuk, P., 2013, In: IJAHUC. 12, 3, p. 157-176 20 p.

    Research output: Contribution to journalArticlepeer-review

  393. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  394. Published

    Small zeros of homogeneous cubic congruences

    Dietmann, R., 2013, Diophantine methods, lattices, and arithmetic theory of quadratic forms. Amer. Math. Soc., Providence, RI, Vol. 587. p. 59-68 10 p. (Contemp. Math.).

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  395. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  396. Unpublished

    Variational Simulation of Continuous Quantum Systems

    Harrison-Schmidt, S., 2013, (Unpublished) 175 p.

    Research output: ThesisDoctoral Thesis

  397. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  398. 2012
  399. Published

    Cyclotomic matrices over the Eisenstein and Gaussian integers

    Greaves, G., 15 Dec 2012, In: Journal of Algebra. 372, p. 560-583 24 p.

    Research output: Contribution to journalArticlepeer-review

  400. Published

    Cyclotomic matrices over real quadratic integer rings

    Greaves, G., 1 Nov 2012, In: Linear Algebra and Its Applications. 437, 9, p. 2252-2261 10 p.

    Research output: Contribution to journalArticlepeer-review

  401. Published

    Are We Compromised? Modelling Security Assessment Games

    Pham, V. & Cid, C., Nov 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012. Springer, p. 234-247 14 p. (Lecture Notes in Computer Science - LNCS; vol. 7638).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  402. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  403. Published

    Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones

    Francis, L., Hancke, G., Mayes, K. & Markantonakis, K., Nov 2012, The 2012 Workshop on RFID and IoT Security (RFIDsec 2012 Asia). Lo, N-W. & Li, Y. (eds.). IOS Press, Vol. 8. p. 21 - 32 12 p. (Cryptology and Information Security Series; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  404. Published

    The effects of reduced "free will" on Bell-based randomness expansion

    Enshan Koh, D., J. W. Hall, M., [No Value], S., E. Pope, J., Marletto, C., Kay, A., Scarani, V. & Ekert, A., 18 Oct 2012, In: Physical Review Letters. 109, 160404.

    Research output: Contribution to journalArticlepeer-review

  405. Published

    Constructing k-radius sequences

    R. Blackburn, S. & F. McKee, J., Oct 2012, In: Mathematics of Computation. 81, 280, p. 2439-2459

    Research output: Contribution to journalArticlepeer-review

  406. Published

    Coopetitive Architecture to Support a Dynamic and Scalable NFC based Mobile Services Architecture

    Akram, R. N., Markantonakis, K. & Mayes, K., Oct 2012, The 2012 International Conference on Information and Communications Security (ICICS 2012). Chow, K. P. & Hui, L. C. K. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  407. Published

    Sleeping Android: Exploit Through Dormant Permission Requests

    Sellwood, J., 28 Aug 2012, Department of Mathematics Technical Reports: Royal Holloway, University of London.

    Research output: ThesisMaster's Thesis

  408. Published

    Implications of ignorance for quantum-error-correction thresholds

    Kay, A., 24 Aug 2012, In: Physical Review A. 89, 032328.

    Research output: Contribution to journalArticlepeer-review

  409. Published

    Using Separable Bell-Diagonal States to Distribute Entanglement

    Kay, A., 21 Aug 2012, In: Physical Review Letters. 109, 8, 080503.

    Research output: Contribution to journalArticlepeer-review

  410. Published

    On the relation between the MXL family of algorithms and Groebner basis algorithms

    Albrecht, M., Cid, C., Faugere, J-C. & Perret, L., Aug 2012, In: Journal of Symbolic Computation. 47, 8, p. 926-941 16 p.

    Research output: Contribution to journalArticlepeer-review

  411. Published

    A reputation-based announcement scheme for VANETs

    Li, Q., Malip, A., Martin, K. M., Ng, S-L. & Zhang, J., 23 Jul 2012, In: IEEE Transaction on Vehicular Technology. 61, 9, p. 4095-4108

    Research output: Contribution to journalArticlepeer-review

  412. Published

    Trace inequalities for completely monotone functions and Bernstein functions

    Audenaert, K. M. R., 15 Jul 2012, In: Linear Algebra and Its Applications. 437, 2, p. 601-611

    Research output: Contribution to journalArticlepeer-review

  413. Published

    On equilibrium distribution of a reversible growth model

    Shcherbakov, V. & Yambartsev, A., Jul 2012, In: Journal of Statistical Physics. 148, 1, p. 53-66

    Research output: Contribution to journalArticlepeer-review

  414. Published

    On the Seifert graphs of a link diagram and its parallels

    Huggett, S., Moffatt, I. & Virdee, N., Jul 2012, In: Mathematical Proceedings of the Cambridge Philosophical Society. 153, p. 123-145 23 p.

    Research output: Contribution to journalArticlepeer-review

  415. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  416. Published

    Partial duals of plane graphs, separability and the graphs of knots

    Moffatt, I., 19 May 2012, In: Algebraic and geometric topology. 12, 2, p. 1099-1136 38 p.

    Research output: Contribution to journalArticlepeer-review

  417. Published

    Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 May 2012, 5th International Conference on New Technologies, Mobility and Security (NTMS). Mana, A. & Klonowski, M. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  418. Published

    Random Diophantine inequalities of additive type

    Brüdern, J. & Dietmann, R., 1 Apr 2012, In: Advances in Mathematics. 229, 6, p. 3079-3095

    Research output: Contribution to journalArticlepeer-review

  419. Published

    Algorithmic approach for clandestine localisation and tracking in short-range environments

    Al-Kuwari, S. & Wolthusen, S. D., Apr 2012, In: International Journal of Communication Networks and Distributed Systems. 9, 3/4, p. 311 327 p.

    Research output: Contribution to journalArticlepeer-review

  420. Published

    Everyday Cryptography: Fundamental Principles and Applications

    Martin, K. M., 1 Mar 2012, Oxford: Oxford University Press. 530 p.

    Research output: Book/ReportBook

  421. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  422. Published

    Least zero of a cubic form

    Browning, T. D., Dietmann, R. & Elliott, P. D. T. A., Mar 2012, In: Mathematische Annalen. 352, 3, p. 745-778

    Research output: Contribution to journalArticlepeer-review

  423. Published

    On the Potts Model Partition Function in an External Field

    McDonald, L. M. & Moffatt, I., Mar 2012, In: Journal of Statistical Physics. 146, 6, p. 1288-1302 15 p.

    Research output: Contribution to journalArticlepeer-review

  424. Published

    Twisted Duality for Embedded Graphs

    Ellis-Monaghan, J. A. & Moffatt, I., Mar 2012, In: Transactions of the American Mathematical Society. 364, 3, p. 1529-1569 41 p.

    Research output: Contribution to journalArticlepeer-review

  425. Published

    How to Counteract Systematic Errors in Quantum State Transfer

    Marletto, C., Kay, A. & Ekert, A., 14 Feb 2012, In: Quantum Information and Computation.

    Research output: Contribution to journalArticlepeer-review

  426. Published

    Fixed points of finite groups acting on generalised Thompson groups

    Kochloukova, D. H., Martínez-Pérez, C. & Nucinkis, B. E. A., Jan 2012, In: Israel Journal of Mathematics. 187, 1, p. 167-192

    Research output: Contribution to journalArticlepeer-review

  427. Published

    On the distribution of Galois groups

    Dietmann, R., Jan 2012, In: Mathematika. 58, 1, p. 35-44

    Research output: Contribution to journalArticlepeer-review

  428. Published

    The existence of k-radius sequences

    Blackburn, S. R., Jan 2012, In: Journal of Combinatorial Theory, Series A. 119, 1, p. 212-217

    Research output: Contribution to journalArticlepeer-review

  429. Published

    A Brief Comparison of NFC Smart Posters and Quick Response Codes

    Mayes, K., Kyrillidis, L., Markantonakis, K. & Dong, S., 2012, In: NFC & Contactless. p. 74-78

    Research output: Contribution to journalArticle

  430. Published

    A model of point configurations given by a semi-parametric interaction

    Grabarnik, P. & Shcherbakov, V., 2012, In: Moscow University Mathematics Bulletin. 67, 2, p. 47-51

    Research output: Contribution to journalArticlepeer-review

  431. Published

    A note on generators of number fields

    Widmer, M. & Vaaler, J., 2012, In: Contemporary Mathematics. 587

    Research output: Contribution to journalArticlepeer-review

  432. Published

    A Universal Client-based Identity Management Tool

    Al-Sinani, H. S. & Mitchell, C. J., 2012, Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers: 8th European Workshop on Public Key Infrastructures, Services and Applications, Leuven, Belgium, 15th/16th September 2011. Petkova-Nikova, S., Pashalidis, A. & Pernul, G. (eds.). Springer-Verlag, p. 49-74 26 p. (Lecture Notes in Computer Science; no. 7163).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  433. Unpublished

    A User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., 2012, (Unpublished) 469 p.

    Research output: ThesisDoctoral Thesis

  434. Forthcoming

    Agent Interaction and State Determination in SCADA Systems

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the Sixth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  435. Unpublished

    Anonymity and Time in Public-Key Encryption

    Quaglia, E., 2012, (Unpublished) 166 p.

    Research output: ThesisDoctoral Thesis

  436. Published

    Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model

    Libert, B., Paterson, K. & Quaglia, E., 2012, Public Key Cryptography. Fischlin, M., Buchmann, J. & Manulis, M. (eds.). Springer, Vol. 7293. p. 206-224 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  437. Unpublished

    Arithmetic groups, base change and representation growth

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2012, (Unpublished) In: Preprint.

    Research output: Contribution to journalArticlepeer-review

  438. Published

    Authenticated-Encryption with Padding: A Formal Security Treatment

    Paterson, K. G. & Watson, G. J., 2012, Cryptography and Security. Naccache, D. (ed.). Springer, Vol. 6805. p. 83-107 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  439. Published

    Bayesian Conditioning, the Reflection Principle, and Quantum Decoherence

    Fuchs, C. A. & Schack, R., 2012, Probability in Physics. Ben-Menahem, Y. & Hemmo, M. (eds.). Berlin: Springer Verlag, p. 233-247

    Research output: Chapter in Book/Report/Conference proceedingChapter

  440. Published

    Counting primes whose sum of digits is prime

    Harman, G., 2012, In: Journal of Integer Sequences. 15, p. 1 7 p., 12.2.2.

    Research output: Contribution to journalArticlepeer-review

  441. Unpublished

    Cyclotomic Matrices over Quadratic Integer Rings

    Greaves, G., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  442. Forthcoming

    Defeating Network Node Subversion on SCADA Systems Using Probabilistic Packet Observation

    Mcevoy, R. & Wolthusen, S. D., 2012, (Accepted/In press) Proceedings of the 6th International Workshop on Critical Information Infrastructures Security 2011 (CRITIS 2011). Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  443. Unpublished

    Design and Analysis of Electronic Feedback Mechanisms

    Li, Q., 2012, (Unpublished) 214 p.

    Research output: ThesisDoctoral Thesis

  444. Published

    Distributed e-Voting using the Smart Card Web Server

    Kyrillidis, L., Cobourne, S., Mayes, K., Dong, S. & Markantonakis, K., 2012, Proceedings of the 7th International Conference on Risks and Security of Internet and Systems (CRiSIS 2012). Martinelli, F., Lanet, J-L., Fitzgerald, W. & Foley, S. (eds.). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  445. Published

    Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud Storage

    Xu, Z. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012). IEEE Computer Society Press, p. 844-849

    Research output: Chapter in Book/Report/Conference proceedingChapter

  446. Unpublished

    Efficient time propagation techniques for few-body quantum systems

    Frapacinni, A., Hamido, A., Schröter, S., Madronero, J., Eiglsperger, J., Mota-Furtado, F., O'Mahony, P., Hervieux, P-A. & Piraux, B., 2012, (Unpublished) In: Central European Journal of Physics.

    Research output: Contribution to journalArticlepeer-review

  447. Published

    Feedback as “Shadow of the Present”: An Alternative to Reputation Systems for E-Marketplaces

    Li, Q., Zhang, J. & Martin, K. M., 2012, Proceedings of 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012) . IEEE Computer Society Press, p. 334-341

    Research output: Chapter in Book/Report/Conference proceedingChapter

  448. Published

    Forensic Tracking and Mobility Prediction in Vehicular Networks

    Al-Kuwari, S. & Wolthusen, S. D., 2012, Advances in Digital Forensics VIII: Proceedings of the Eighth IFIP WG 11.9 International Conference on Digital Forensics. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  449. Unpublished

    Generalised Key Distribution Patterns

    Novak, J., 2012, (Unpublished) 170 p.

    Research output: ThesisDoctoral Thesis

  450. Published

    Hilbert cubes in progression-free sets and in the set of squares

    Dietmann, R. & Elsholtz, C., 2012, In: Israel Journal of Mathematics. 192, 1, p. 59-66

    Research output: Contribution to journalArticlepeer-review

  451. Unpublished

    Information propagation through disordered quantum spin chains

    Burrell, C., 2012, (Unpublished) 133 p.

    Research output: ThesisDoctoral Thesis

  452. Published

    Integer symmetric matrices of small spectral radius and small Mahler measure

    McKee, J. & Smyth, C., 2012, In: International Mathematics Research Notices. 2012, 1, p. 102-136 35 p.

    Research output: Contribution to journalArticlepeer-review

  453. Published

    Lipschitz class, narrow class, and counting lattice points

    Widmer, M., 2012, In: Proceedings of the American Mathematical Society. 140, 2

    Research output: Contribution to journalArticlepeer-review

  454. Unpublished

    Managing Identity Management Systems

    Al-Sinani, H., 2012, (Unpublished) 423 p.

    Research output: ThesisDoctoral Thesis

  455. Unpublished

    Mitigating the Risk of Insider Threats When Sharing Credentials

    Alawneh, M., 2012, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  456. Published

    On norm sub-additivity and super-additivity inequalities for concave and convex functions

    Audenaert, K. & Aujla, J. S., 2012, In: Linear and Multilinear Algebra. 60, 11-12, p. 1369-1389

    Research output: Contribution to journalArticlepeer-review

  457. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  458. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  459. Published

    Plaintext-Recovery Attacks Against Datagram TLS

    Alfardan, N. & Paterson, K., 2012, Network and Distributed System Security Symposium. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  460. Published

    Primes whose sum of digits is prime and metric number theory

    Harman, G., 2012, In: Bulletin of the London Mathematical Society. 44, 5, p. 1042-1049

    Research output: Contribution to journalArticlepeer-review

  461. Forthcoming

    Problems and conjectures in matrix and operator inequalities

    Audenaert, K. & Kittaneh, F., 2012, (Accepted/In press) Operator theory. (Banach Center Publications).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  462. Published

    PTaCL: A Language for Attribute-Based Access Control in Open Systems

    Crampton, J. & Morisset, C., 2012, POST 2012: Principles of Security and Trust - First International Conference. Degano, P. & Guttman, J. (eds.). Springer, p. 390-409 20 p. (Lecture Notes in Computer Science; vol. 7215).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  463. Published

    Quantum state discrimination bounds for finite sample size

    Audenaert, K., Mosonyi, M. & Verstraete, F., 2012, In: Journal of Mathematical Physics. 53, 122205.

    Research output: Contribution to journalArticlepeer-review

  464. Unpublished

    Random Graph Processes

    Makai, T., 2012, (Unpublished) 124 p.

    Research output: ThesisDoctoral Thesis

  465. Published

    Representation zeta functions of some compact p-adic analytic groups

    Avni, N., Klopsch, B., Onn, U. & Voll, C., 2012, Zeta Functions in Algebra and Geometry. Campillo, A., Cardona, G., Melle-Hernández, A., Veys, W. & Zúñiga-Galindo, W. A. (eds.). American Mathematical Society, p. 295-330 (Contemporary Mathematics; vol. 566).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  466. Published

    Salem numbers and Pisot numbers via interlacing

    McKee, J. & Smyth, C., 2012, In: Canadian Journal of Mathematics. 64, 2, p. 345-367

    Research output: Contribution to journalArticlepeer-review

  467. Published

    Salem numbers and Pisot numbers via interlacing

    McKee, J. & Smyth, C., 2012, In: Canadian Journal of Mathematics. 64, 2, p. 345-367 23 p.

    Research output: Contribution to journalArticlepeer-review

  468. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  469. Published

    Separability and the genus of a partial dual

    Moffatt, I., 2012, In: European Journal of Combinatorics. 34, 2, p. 355-378

    Research output: Contribution to journalArticlepeer-review

  470. Published

    The probability that a pair of elements of a finite group are conjugate

    Blackburn, S. R., Britnell, J. R. & Wildon, M., 2012, In: Journal of the London Mathematical Society. 86, 3, p. 755-778

    Research output: Contribution to journalArticlepeer-review

  471. Unpublished

    Wide-Sense Fingerprinting Codes and Honeycomb Arrays

    Panoui, A., 2012, (Unpublished)

    Research output: ThesisDoctoral Thesis

  472. 2011
  473. Published

    Capabilities of a Perturbed Toric Code as a Quantum Memory

    Kay, A., 29 Dec 2011, In: Physical Review Letters. 107, 27, 5 p., 270502.

    Research output: Contribution to journalArticlepeer-review

  474. Published

    A characterisation of anti-Löwner functions

    Audenaert, K. M. R., Dec 2011, In: Proceedings of the American Mathematical Society. 139, 12, p. 4217-4223

    Research output: Contribution to journalArticlepeer-review

  475. Published

    Cross-Platform Application Sharing Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2011, 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11). Wang, H., Tate, S. R. & Xiang, Y. (eds.). Changsha, China: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  476. Published

    Continuity bounds on the quantum relative entropy - II

    Audenaert, K. & Eisert, J., Nov 2011, In: Journal of Mathematical Physics. 52, 7 p., 112201.

    Research output: Contribution to journalArticlepeer-review

  477. Published

    Set families and Foulkes modules

    Paget, R. & Wildon, M., Nov 2011, In: Journal of Algebraic Combinatorics. 34, 3, p. 525-544 20 p.

    Research output: Contribution to journalArticlepeer-review

  478. Published

    Towards privacy in a context-aware social network based recommendation system

    Yau, P-W. & Tomlinson, A., 1 Oct 2011.

    Research output: Contribution to conferencePaper

  479. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  480. Published

    A permanent formula for the Jones polynomial

    Loebl, M. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 659-667 9 p.

    Research output: Contribution to journalArticlepeer-review

  481. Published

    Abstract commensurators of profinite groups

    Barnea, Y., Ershov, M. & Weigel, T., Oct 2011, In: Transactions of the American Mathematical Society. 363, 10, p. 5381-5417 37 p.

    Research output: Contribution to journalArticlepeer-review

  482. Published

    Expansions for the Bollobas-Riordan Polynomial of Separable Ribbon Graphs

    Huggett, S. & Moffatt, I., Oct 2011, In: Annals of combinatorics. 15, 4, p. 675-706 32 p.

    Research output: Contribution to journalArticlepeer-review

  483. Published

    The Tutte-Potts connection in the presence of an external magnetic field

    Ellis-Monaghan, J. A. & Moffatt, I., Oct 2011, In: Advances in applied mathematics. 47, 4, p. 772-782 11 p.

    Research output: Contribution to journalArticlepeer-review

  484. Unpublished

    Browser Extension-based Interoperation Between OAuth and Information Card-based Systems

    Al-Sinani, H. S., 24 Sep 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-15)

    Research output: Book/ReportOther report

  485. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  486. Published

    Efficient Implementation of Linearisation Attacks on F-FCSR-16 Type Key-stream Generators

    Ali, A., 5 Sep 2011, p. 36-41.

    Research output: Contribution to conferencePaperpeer-review

  487. Unpublished

    Using CardSpace as a Password-based Single Sign-on System

    Al-Sinani, H. S. & Mitchell, C. J., 23 Aug 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 24 p. (Technical Report Series; no. RHUL-MA-2011-14)

    Research output: Book/ReportOther report

  488. Published

    Local Realism of Macroscopic Correlations

    Ramanathan, R., Paterek, T., Kay, A., Kurzynski, P. & Kaszlikowski, D., 3 Aug 2011, In: Physical Review Letters. 107, 6, 5 p., 060405.

    Research output: Contribution to journalArticlepeer-review

  489. Published

    Time scaling with efficient time-propagation techniques for atoms and molecules in pulsed radiation fields

    Hamido, A., Eiglsperger, J., Madronero, J., Mota-Furtado, F., O'Mahony, P. F., Frapiccini, A. & Piraux, B., 27 Jul 2011, In: Physical Review A. 84, 013422.

    Research output: Contribution to journalArticlepeer-review

  490. Published

    A Privacy Architecture for Context - Aware Enterprise Social Networks

    Yau, P-W. & Tomlinson, A., 1 Jul 2011.

    Research output: Contribution to conferencePaperpeer-review

  491. Published

    Application-Binding Protocol in the User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jul 2011, the 16th Australasian Conference on Information Security and Privacy (ACISP). Parampalli, U. & Hawkes, P. (eds.). Melbourne, Australia: Springer, p. 208-225 18 p. (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  492. Published

    A Characterization of Partially Dual Graphs

    Moffatt, I., Jul 2011, In: Journal of Graph Theory. 67, 3, p. 198-217 20 p.

    Research output: Contribution to journalArticlepeer-review

  493. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  494. Published

    Threat analysis model of an agent-based vulnerability mitigation mechanism using Bayesian Belief Networks

    Al-Salloum, Z. & Wolthusen, S. D., 22 Jun 2011, Proceedings of the 2011 First IEEE Network Science Workshop (NSW 2011). IEEE Computer Society Press, p. 144-151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  495. Published

    Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

    Martin, K. M., Paterson, M. B. & Stinson, D. R., 1 Jun 2011, In: Cryptography and Communications. 3, 2, p. 65-86

    Research output: Contribution to journalArticlepeer-review

  496. Unpublished

    CardSpace-OpenID Integration for CardSpace Users

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. (Technical Report Series; no. RHUL-MA-2011-12)

    Research output: Book/ReportOther report

  497. Unpublished

    Client-based CardSpace-Shibboleth Interoperation

    Al-Sinani, H. & Mitchell, C. J., 24 May 2011, (Unpublished) Department of Mathematics, Royal Holloway, University of London. 25 p. (Technical Report Series; no. RHUL-MA-2011-13)

    Research output: Book/ReportOther report

  498. Published

    Authorization recycling in hierarchical RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 29 p., 3.

    Research output: Contribution to journalArticlepeer-review

  499. Published

    Practical and efficient cryptographic enforcement of interval-based access control policies

    Crampton, J., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 30 p., 14.

    Research output: Contribution to journalArticlepeer-review

  500. Published

    Computing totally positive algebraic integers of small trace

    McKee, J., Apr 2011, In: Mathematics of Computation. 80, 274, p. 1041 1052 p.

    Research output: Contribution to journalArticlepeer-review

  501. Published

    Hidden Markov Models, Theory and Applications: Theory of Segmentation

    Lember, J., Kuljus, K. & Koloydenko, A., Apr 2011, Hidden Markov Models, Theory and Applications: Theory of Segmentation . Dymarski, P. (ed.). Rijeka, Croatia: InTech, p. 51-84 34 p. (Bioinformatics).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  502. Published

    Select response grouping proof and its verification protocol for RFID tags

    Lien, Y. H., Leng, X., Mayes, K. E. & Chiu, J-H., 1 Mar 2011, In: International Journal of Intelligent Information and Database Systems. 5, p. 101-118 18 p.

    Research output: Contribution to journalArticlepeer-review

  503. Published

    Pegging graphs yields a small diameter

    Gerke, S., Steger, A. & Wormald, N., Mar 2011, In: Combinatorics, Probability and Computing. 20, 2, p. 239-248 9 p.

    Research output: Contribution to journalArticlepeer-review

  504. Published

    Threshold Anonymous Announcement in VANETs.

    Chen, LI., Ng, S-L. & Wang, G., Mar 2011, In: IEEE Journal on Selected Areas in Communications. 29, 3, p. 605-615

    Research output: Contribution to journalArticlepeer-review

  505. Published

    Unsigned State Models for the Jones Polynomial

    Moffatt, I., Mar 2011, In: Annals of combinatorics. 15, 1, p. 127-146 20 p.

    Research output: Contribution to journalArticlepeer-review

  506. Published

    New Most Efficient State Recovery Attacks on an eSTREAM Candidate F-FCSR-H v2 and F-FCSR-H Stream Ciphers

    Ali, A., 21 Feb 2011, p. 240--246. 7 p.

    Research output: Contribution to conferencePaperpeer-review

  507. Published

    On w-maximal groups

    Gonzalez-Sanchez, J. & Klopsch, B., 15 Feb 2011, In: Journal of Algebra. 328, p. 155-166

    Research output: Contribution to journalArticlepeer-review

  508. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  509. Published

    A quantum-Bayesian route to quantum state space

    Fuchs, C. A. & Schack, R., 2011, In: Foundations of Physics. 41, p. 345-356

    Research output: Contribution to journalArticlepeer-review

  510. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  511. Published

    A survey of security services and techniques in distributed storage systems

    Xu, Z., Martin, K. M. & Kotnik, C., 2011, Proceedings of the 2011 International Conference on Security and Management (SAM '11). p. 3-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  512. Published

    Analysis of Message Injection in Stream Cipher-based Hash Functions

    Nakano, Y., Cid, C., Fukushima, K. & Kiyomoto, S., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, Vol. 6715. p. 498-513 15 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 Next