1. 2019
  2. Published

    Documenting Greenland: Popular Geopolitics on Film

    Dodds, K-J. & Jensen, R. B. 4 Jan 2019 Arctic Cinemas and the Documentary Ethos. Kaganovsky, L., MacKenzie, S. & Westerstahl Stenport, A. (eds.). Bloomington: University of Indiana Press, 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. 2018
  4. E-pub ahead of print

    Effective maritime cybersecurity regulation – the case for a cyber code

    Hopcraft, R. & Martin, K. 11 Sep 2018 In : Journal of the Indian Ocean Region. p. 1-13 13 p.

    Research output: Contribution to journalSpecial issue

  5. E-pub ahead of print

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J. 7 Sep 2018 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Forthcoming

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N. 4 Sep 2018 In : ACM Transactions on Embedded Computing Systems.

    Research output: Contribution to journalArticle

  7. Published

    On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification

    Blasco, J. & Peris-Lopez, P. 24 Aug 2018 In : Sensors (Switzerland). 18, 9, p. 1-20 20 p., 2782

    Research output: Contribution to journalArticle

  8. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L. 16 Aug 2018 In : IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticle

  9. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Paterson, K. & Deo, R. 14 Aug 2018 In : TCHES. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticle

  10. E-pub ahead of print

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B. 9 Aug 2018 p. 1-15 15 p.

    Research output: Contribution to conferencePaper

  11. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S. 6 Aug 2018 In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  12. E-pub ahead of print

    Fast Message Franking: From Invisible Salamanders to Encryptment

    Woodage, J., Dodis, Y., Ristenpart, T. & Grubbs, P. 25 Jul 2018 Fast Message Franking: From Invisible Salamanders to Encryptment. p. 155-186 32 p. (Lecture Notes in Computer Science; vol. 10991)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. E-pub ahead of print

    Towards Bidirectional Ratcheted Key Exchange

    Poettering, B. & Rösler, P. 25 Jul 2018 p. 3-32 30 p.

    Research output: Contribution to conferencePaper

  14. E-pub ahead of print

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P. 24 Jul 2018 In : GeoHumanities. p. 1-21 21 p.

    Research output: Contribution to journalArticle

  15. Forthcoming

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Paterson, K., Massimo, J. & Somorovsky, J. 24 Jul 2018 25th ACM Conference on Computer and Communications Security 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S. 23 Jul 2018 7 p.

    Research output: Contribution to conferencePaper

  17. Published
  18. Forthcoming

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S. 27 Jun 2018 Selected Areas in Cryptography 2018. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. E-pub ahead of print

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K. 22 Jun 2018 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    A secure and trusted channel protocol for UAVs fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S. 21 Jun 2018 Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, Vol. 10741 LNCS, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K. 21 Jun 2018 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Philanthropy On The Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K. 21 Jun 2018 The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Forthcoming

    Beyond cookie monster amnesia: Real world persistent online tracking

    Al-Fannah, N. M., Li, W. & Mitchell, C. J. 20 Jun 2018 Proceedings of ISC 2018: 9-12 September 2018. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  24. Forthcoming

    Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T. M. 20 Jun 2018 Proceedings of IEEE PST 2018. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S. 19 Jun 2018 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S. 19 Jun 2018 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Re-thinking the care of male prisoners who self-harm

    Neave, S., Glorney, E. & Coles-Kemp, L. 19 Jun 2018

    Research output: Contribution to conferencePaper

  28. Published

    Conquering Generals: an NP-Hard Proof of Useful Work

    Quaglia, E. & Loe, A. 15 Jun 2018 p. 54-59 6 p.

    Research output: Contribution to conferencePaper

  29. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R. 13 Jun 2018

    Research output: Other contribution

  30. Published

    Why Should I?: Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K. 11 Jun 2018 In : Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticle

  31. E-pub ahead of print

    A cryptographic analysis of the WireGuard protocol

    Dowling, B. & Paterson, K. G. 10 Jun 2018 Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, Vol. 10892 LNCS, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. E-pub ahead of print

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E. 10 Jun 2018 ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892, p. 459-475 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. E-pub ahead of print

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S. 10 Jun 2018 ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892, p. 381-399 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Forthcoming

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E. 6 Jun 2018

    Research output: Contribution to conferencePaper

  35. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T. 1 Jun 2018 In : Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  36. Published

    Exchangeability martingales for selecting features in anomaly detection

    Cherubin, G., Baldwin, A. & Griffin, . J. Jun 2018 p. 157-170 14 p.

    Research output: Contribution to conferencePaper

  37. E-pub ahead of print

    Forensic smartphone analysis using adhesives: Transplantation of Package on Package components

    Heckmann, T., Markantonakis, K., Naccache, D. & Souvignet, T. 31 May 2018 In : digital investigation.

    Research output: Contribution to journalArticle

  38. Forthcoming

    Email-based password recovery — risking or rescuing users?

    Al Maqbali, F. & Mitchell, C. J. 30 May 2018 Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Forthcoming

    An Evaluation of the Security of the Bitcoin Peer-to- Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K. 22 May 2018

    Research output: Contribution to conferencePaper

  40. Forthcoming

    E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K. 22 May 2018

    Research output: Contribution to conferencePaper

  41. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S. 21 May 2018 6 p.

    Research output: Contribution to conferencePaper

  42. Forthcoming

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Wolthusen, S. & Baiocco, A. 21 May 2018 Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Forthcoming

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S. 21 May 2018 Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Forthcoming

    Holding on to Dissensus: a co-design case study in security research

    Heath, C., Coles-Kemp, L. & Hall, P. 18 May 2018 In : Strategic Design Research Journal. Special Issue: Autonomía - Design strategies for enabling design process, 22 p.

    Research output: Contribution to journalSpecial issue

  45. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S. 18 May 2018 In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  46. Forthcoming

    Security issues in a group key establishment protocol

    Mitchell, C. J. 16 May 2018 In : The Computer Journal. 7 p.

    Research output: Contribution to journalArticle

  47. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.) 8 May 2018 Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  48. Forthcoming

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K. 6 May 2018

    Research output: Contribution to conferencePaper

  49. Forthcoming

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N. 6 May 2018 9 p.

    Research output: Contribution to conferencePaper

  50. Published

    Cyber Deterrence Theory and Practise

    Haggman, A. 5 May 2018 Cyber Security: Power and Technology. Lehto, M. & Neittaanmäki, P. (eds.). 1 ed. Springer International Publishing, Vol. 93, p. 63-81 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  51. Forthcoming

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K. 5 May 2018

    Research output: Contribution to conferencePaper

  52. Published

    Why so serious? Introducing a fun take on cyber war

    Haggman, A. 5 May 2018 New Statesman, 2018, 4-10 May, p. 16-18 3 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  53. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Wang, R. & Sgandurra, D. 1 May 2018 In : International Journal of Grid and Utility Computing. 9, 2

    Research output: Contribution to journalArticle

  54. Forthcoming

    Web password recovery - A necessary evil?

    Al Maqbali, F. & Mitchell, C. J. 30 Apr 2018 Proceedings of the Future Technology Conference (FTC) 2018: Vancouver, November 2018. Springer-Verlag, (Advances in Intelligent Systems and Computing)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A. 28 Apr 2018 In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

  56. Published

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S. 22 Apr 2018 p. 46-51 6 p.

    Research output: Contribution to conferencePaper

  57. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R. 21 Apr 2018 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. E-pub ahead of print

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B. 6 Apr 2018 p. 322-343 22 p.

    Research output: Contribution to conferencePaper

  59. E-pub ahead of print

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B. 6 Apr 2018 p. 344-361 18 p.

    Research output: Contribution to conferencePaper

  60. E-pub ahead of print

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L. 31 Mar 2018 Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Gaming...seriously?

    Haggman, A. 28 Mar 2018 TEISS

    Research output: Other contribution

  62. E-pub ahead of print

    Secret, verifiable auctions from elections

    Quaglia, E. & Smyth, B. 23 Mar 2018 In : Theoretical Computer Science.

    Research output: Contribution to journalArticle

  63. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K. 21 Mar 2018 The Conversation

    Research output: Other contribution

  64. Published
  65. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J. 13 Mar 2018 p. 152-154 3 p.

    Research output: Contribution to conferencePoster

  66. Published

    What Should You Pay to Protect Your Data? The Economics of Cyber Security

    Ertan, A. 9 Mar 2018 Cyber World , March 2018 edition, p. 50-55 6 p.

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  67. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y. 7 Mar 2018 Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings. Springer-Verlag, Vol. 10808 LNCS, p. 116-136 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10808 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K. 1 Mar 2018 IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018, p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E. 1 Mar 2018 Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS, p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Hashing solutions instead of generating problems: On the interactive certification of RSA moduli

    Auerbach, B. & Poettering, B. 1 Mar 2018 p. 403-430 27 p.

    Research output: Contribution to conferencePaper

  71. Published

    Security, privacy and trust of user-centric solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L. Mar 2018 In : Future Generation Computer Systems. 80, p. 417-420 4 p.

    Research output: Contribution to journalEditorial

  72. Forthcoming

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Wolthusen, S. & Baiocco, A. 23 Feb 2018 Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Forthcoming

    Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations

    Li, W., Mitchell, C. J. & Chen, T. 11 Feb 2018 Proceedings of the 2018 Security Protocols Workshop, Cambridge, April 2018. 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. E-pub ahead of print

    A survey and refinement of repairable threshold schemes

    Laing, T. & Stinson, D. 9 Feb 2018 In : Journal of Mathematical Cryptology. 12, 1, p. 57-81 25 p.

    Research output: Contribution to journalArticle

  75. Forthcoming

    Error Propagation after Re-Ordering Attacks in Hierarchical State Estimation

    Gul, A. & Wolthusen, S. 2 Feb 2018 Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 1 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P. 24 Jan 2018 In : Schizophrenia bulletin.

    Research output: Contribution to journalArticle

  77. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    Ibrahim, S. & RUSH, M. 19 Jan 2018 In : Sociological Research Online. p. 1-20 20 p.

    Research output: Contribution to journalArticle

  78. E-pub ahead of print

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S. 18 Jan 2018 Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Iterative Recovery of Controllability via Maximum Matching

    Zhang, S. & Wolthusen, S. 15 Jan 2018 p. 328-333 6 p.

    Research output: Contribution to conferencePaper

  80. Published

    Making defeating CAPTCHAs harder for bots

    Al-Fannah, N. M. 11 Jan 2018

    Research output: Contribution to conferencePaper

  81. In preparation
  82. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H. Jan 2018 In : International Journal of Sensor Networks. 26, 1, p. 54-68

    Research output: Contribution to journalArticle

  83. Published

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S. Jan 2018 In : Cryptography and Communications. 10, 1, p. 41-58 18 p.

    Research output: Contribution to journalArticle

  84. Unpublished

    An Analysis of the Transport Layer Security Protocol

    van der Merwe, T. 2018 229 p.

    Research output: ThesisDoctoral Thesis

  85. Unpublished
  86. Published

    Attacks against GSMA’s M2M Remote Provisioning

    Quaglia, E., Smyth, B. & Meyer, M. 2018

    Research output: Contribution to conferencePaper

  87. Unpublished

    Challenging Environments: Using Mobile Devices for Security

    Cobourne, S. 2018 230 p.

    Research output: ThesisDoctoral Thesis

  88. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C. 2018 141 p.

    Research output: ThesisDoctoral Thesis

  89. Forthcoming

    Cryptographic controls: the heart of cyber security

    Martin, K. 2018 Handbook of Security Science. Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  90. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T. 2018 201 p.

    Research output: ThesisDoctoral Thesis

  91. Submitted
  92. Published

    Hybrid Encryption in a Multi-User Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B. 2018 p. 1-30 30 p.

    Research output: Contribution to conferencePaper

  93. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K. 2018 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Forthcoming

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B. 2018 p. 1-29 29 p.

    Research output: Contribution to conferencePaper

  95. Published

    Language Redux

    Thornton, P. 2018 In : A Peer Review Journal About. 7, 1, p. 1-8 8 p.

    Research output: Contribution to journalArticle

  96. Forthcoming

    Majority vote ensembles of conformal predictors

    Cherubin, G. 2018 In : Machine Learning.

    Research output: Contribution to journalArticle

  97. Unpublished
  98. Unpublished

    ON THE SECURITY AND PERFORMANCE OF MOBILE DEVICES IN TRANSPORT TICKETING

    Umar, A. 2018 161 p.

    Research output: ThesisDoctoral Thesis

  99. Unpublished

    Parameter selection in lattice-based cryptography

    Player, R. 2018

    Research output: ThesisDoctoral Thesis

  100. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S. 2018 218 p.

    Research output: ThesisDoctoral Thesis

  101. Published
  102. 2017
  103. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study.

    Ibrahim, S., Rush, M., Monks, C. P. & Edwards, E. T. 31 Dec 2017 In : Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 48, 3

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...18 Next