1. 2019
  2. Forthcoming
  3. Published

    Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things

    Darwish, S., Nouretdinov, I. & Wolthusen, S., Mar 2019, Security and Privacy Trends in the Industrial Internet of Things. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  4. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In : The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticle

  5. Forthcoming

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 20 Feb 2019, (Accepted/In press)

    Research output: Contribution to conferencePaper

  6. E-pub ahead of print

    Lossy Trapdoor Permutations with Improved Lossiness

    Auerbach, B., Kiltz, E., Poettering, B. & Schoenen, S., 3 Feb 2019, p. 230-250 21 p.

    Research output: Contribution to conferencePaper

  7. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, In : International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticle

  8. Forthcoming

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 29 Jan 2019, (Accepted/In press) EUROCRYPT 2019. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Forthcoming

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 28 Jan 2019, (Accepted/In press)

    Research output: Contribution to conferencePaper

  10. Published

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 24 Jan 2019, 20 p.

    Research output: Working paper

  11. Forthcoming

    libInterMAC: Beyond Confidentiality and Integrity in Practice

    Albrecht, M., Hansen, T. & Paterson, K., 23 Jan 2019, (Accepted/In press) In : IACR Transactions on Symmetric Cryptology. 2019, 1

    Research output: Contribution to journalArticle

  12. Forthcoming

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 23 Jan 2019, (Accepted/In press) IACR Transactions on Symmetric Cryptology. 2019 ed. Paris, France: Ruhr-Universität Bochum, Vol. Issue 1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349, p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Documenting Greenland: Popular Geopolitics on Film

    Dodds, K-J. & Jensen, R. B., 4 Jan 2019, Arctic Cinemas and the Documentary Ethos. Kaganovsky, L., MacKenzie, S. & Westerstahl Stenport, A. (eds.). Bloomington: University of Indiana Press, 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In : Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticle

  16. Forthcoming

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 2019, (Accepted/In press) Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV, (Lecture Notes in Computer Science; vol. XV)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. 2018
  18. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Forthcoming

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 21 Dec 2018, (Accepted/In press)

    Research output: Contribution to conferencePaper

  23. Forthcoming

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 21 Dec 2018, (Accepted/In press) 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Forthcoming

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 21 Dec 2018, (Accepted/In press)

    Research output: Contribution to conferencePaper

  25. E-pub ahead of print

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 13 Dec 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. E-pub ahead of print
  28. Forthcoming

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 10 Dec 2018, (Accepted/In press) ACM CHI Conference on Human Factors in Computing Systems: CHI'19. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Forthcoming

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 10 Dec 2018, (Accepted/In press) CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. E-pub ahead of print

    The Authorization Policy Existence Problem

    Berge, P., Crampton, J., Gutin, G. & Watrigant, R., 28 Nov 2018, In : IEEE Transactions on Dependable and Secure Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  31. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263, p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. E-pub ahead of print

    Identity Confidentiality in 5G Mobile Telephony Systems

    Khan, H., Dowling, B. & Martin, K., 21 Nov 2018, Security Standardisation Research: 4th International Conference, SSR 2018. Cremer, C. & Lehmann, A. (eds.). Switzerland: Springer, [Cham], p. 120-142 23 p. (Lecture Notes in Computer Science; vol. 11322)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  33. Forthcoming

    On Key Assignment Schemes and Cryptographic Enforcement Mechanisms for Information Flow Policies

    Farley, N., 12 Nov 2018, (Accepted/In press) 187 p.

    Research output: ThesisDoctoral Thesis

  34. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Forthcoming

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. In preparation
  38. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K., Nov 2018, In : Wireless Networks. 24, 8, p. 3009–3027 19 p.

    Research output: Contribution to journalArticle

  39. Published

    Coming of Age: A Longitudinal Study of TLS Deployment

    Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K. G., Vallina-Rodriguez, N. & Caballero, J., 31 Oct 2018, Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. p. 415-428 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Forthcoming

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 31 Oct 2018, (Accepted/In press) IEEE Security & Privacy . IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  41. E-pub ahead of print

    Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y., Sasaki, Y. & Viguier, B., 27 Oct 2018, p. 35-64 30 p.

    Research output: Contribution to conferencePaper

  42. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 20 Oct 2018, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Paterson, K., Massimo, J. & Somorovsky, J., 15 Oct 2018, 25th ACM Conference on Computer and Communications Security 2018. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Implementing RLWE-based Schemes Using an RSA Co-Processor

    Albrecht, M., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F. & Wallner, A., 14 Oct 2018, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Ruhr University of Bochum, Vol. 2019, Issue 1

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  45. Published

    Enabling Fair ML Evaluations for Security

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 8 Oct 2018, p. 2264-2266 3 p.

    Research output: Contribution to conferencePoster

  46. Published

    Pseudo constant time implementations of TLS are only pseudo secure

    Ronen, E., Paterson, K. G. & Shamir, A., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1397-1414 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Pump up the volume: Practical database reconstruction from volume leakage on range queries

    Grubbs, P., Lacharité, M. S., Minaud, B. & Paterson, K. G., 8 Oct 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 315-331 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., Oct 2018, In : Journal of Cryptology. 31, 4, p. 917-964 48 p.

    Research output: Contribution to journalArticle

  49. Published

    From user-centred design to security: building attacker personas for digital banking

    Moeckel, C., 29 Sep 2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), p. 892-897 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Virtual Teams Model for Supporting Maritime Technology Management

    Berner, G., Hopcraft, R., Scanlan, J., Lutzhoft, M. & Earthy, J., 26 Sep 2018, p. 81-86 6 p.

    Research output: Contribution to conferencePaper

  51. Published

    Editorial response: The value of critical Geopolitics & critical security studies

    Robinson, N., Hardy, A. & Wendt, N., 18 Sep 2018, RHUL Geopolitics & Security

    Research output: Other contribution

  52. E-pub ahead of print

    Effective maritime cybersecurity regulation – the case for a cyber code

    Hopcraft, R. & Martin, K., 11 Sep 2018, In : Journal of the Indian Ocean Region. p. 1-13 13 p.

    Research output: Contribution to journalSpecial issue

  53. Published

    Beyond Cookie Monster Amnesia: Real World Persistent Online Tracking

    Al-Fannah, N. M., Li, W. & Mitchell, C. J., 9 Sep 2018, Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings. Springer-Verlag, p. 481-501 21 p. (Lecture Notes in Computer Science; vol. 11060)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  54. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S., 9 Sep 2018, Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, p. 131-143 13 p. (Lecture Notes in Computer Science; vol. 10707)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. E-pub ahead of print

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 7 Sep 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. E-pub ahead of print

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K., 6 Sep 2018

    Research output: Contribution to conferencePaper

  57. E-pub ahead of print

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K., 6 Sep 2018

    Research output: Contribution to conferencePaper

  58. E-pub ahead of print

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N., 6 Sep 2018 9 p.

    Research output: Contribution to conferencePaper

  59. Published

    Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area Networks

    Khan, H., Dowling, B. & Martin, K., 6 Sep 2018, p. 1064-1069 6 p.

    Research output: Contribution to conferencePaper

  60. Forthcoming

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 4 Sep 2018, (Accepted/In press) In : ACM Transactions on Embedded Computing Systems.

    Research output: Contribution to journalArticle

  61. Published

    Statistical attacks on cookie masking for RC4

    Paterson, K., Sep 2018, In : Cryptography and Communications. 10, 5, p. 777-801 25 p.

    Research output: Contribution to journalArticle

  62. E-pub ahead of print

    Majority vote ensembles of conformal predictors

    Cherubin, G., 31 Aug 2018, In : Machine Learning. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  63. Published

    A Study of Learning-by-Doing in MOOCs through the Integration of Third-Party External Tools: Comparison of Synchronous and Asynchronous Running Modes

    Blasco Alis, J., Alario, C., Estévez-Ayres, I., Gallego-Romero, J. M., Delgado Kloos, C., Fernández-Panadero, C., Crespo-García, R. M., Almenares, F., Ibáñez, M. B., Villena-Román, J. & Ruiz-Magaña, J., 28 Aug 2018, In : Journal of Universal Computer Science. 24, 8, p. 1015-1033 19 p.

    Research output: Contribution to journalArticle

  64. Published

    On the Feasibility of Low-Cost Wearable Sensors for Multi-Modal Biometric Verification

    Blasco, J. & Peris-Lopez, P., 24 Aug 2018, In : Sensors (Switzerland). 18, 9, p. 1-20 20 p., 2782

    Research output: Contribution to journalArticle

  65. Published

    Anomaly-based exploratory analysis and detection of exploits in android mediaserver

    Suárez-Tangil, G., Dash, S. K., García-Teodoro, P., Camacho, J. & Cavallaro, L., 16 Aug 2018, In : IET Information Security. 12, 5, p. 404-413 10 p.

    Research output: Contribution to journalArticle

  66. Published

    Cold Boot Attacks on Ring and Module LWE Keys Under the NTT

    Albrecht, M., Paterson, K. & Deo, R., 14 Aug 2018, In : TCHES. 2018, 3, p. 173-213 41 p.

    Research output: Contribution to journalArticle

  67. Published

    On Recovering Affine Encodings in White-Box Implementations

    Derbez, P., Fouque, P-A., Lambin, B. & Minaud, B., 14 Aug 2018, In : TCHES. 2018, 3, p. 121-149 29 p.

    Research output: Contribution to journalArticle

  68. E-pub ahead of print

    A Cryptographic Look at Multi-Party Channels

    Eugster, P., Marson, G. A. & Poettering, B., 9 Aug 2018, p. 1-15 15 p.

    Research output: Contribution to conferencePaper

  69. Submitted

    Multi-Message Private Information Retrieval using Product-Matrix MSR and MBR Codes

    Dorkson, C. & Ng, S., 6 Aug 2018, (Submitted) In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  70. Forthcoming

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 28 Jul 2018, (Accepted/In press) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Fast Message Franking: From Invisible Salamanders to Encryptment

    Dodis, Y., Grubbs, P., Ristenpart, T. & Woodage, J., 25 Jul 2018, Advances in Cryptology – CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part I. Shacham, H. & Boldyreva, A. (eds.). Springer, p. 155-186 32 p. (Lecture Notes in Computer Science; vol. 10991)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  72. E-pub ahead of print

    Towards Bidirectional Ratcheted Key Exchange

    Poettering, B. & Rösler, P., 25 Jul 2018, p. 3-32 30 p.

    Research output: Contribution to conferencePaper

  73. Published

    Privacy Risks in Resource Constrained Smart Micro-Grids

    Ambassa, P. L., Kayem, A. V. D. M., Wolthusen, S. D. & Meinel, C., 23 Jul 2018, Proceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2018. Ogiela, L., Enokido, T., Ogiela, M. R., Javaid, N., Barolli, L. & Takizawa, M. (eds.). Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January, p. 527-532 6 p. 8418124

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published
  75. Published

    Building Attacker Personas in Practice - a Digital Banking Example

    Moeckel, C., 4 Jul 2018, Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (BCS), p. 1-5 5 p. (Electronic Workshops in Computing (eWiC))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E., 2 Jul 2018, ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892, p. 459-475 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S., 2 Jul 2018, ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Leuven, Belgium: Springer International Publishing, Vol. 10892, p. 381-399 19 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. E-pub ahead of print

    Lightweight Classification of IoT Malware Based on Image Recognition

    Su, J., Vasconcellos Vargas, D., Prasad, S., Sgandurra, D., Feng, Y. & Sakurai, K., 22 Jun 2018, 8th IEEE International Workshop on Network Technologies for Security, Administration, and Protection (NETSAP 2018). IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. E-pub ahead of print

    A secure and trusted channel protocol for UAVs fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, Vol. 10741 LNCS, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. E-pub ahead of print

    Philanthropy on the Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K., 21 Jun 2018, The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, p. 25-38 14 p. (Lecture Notes in Computer Science (LNCS); vol. 10741)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 19 Jun 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    Detection of Untrustworthy IoT Measurements Using Expert Knowledge of Their Joint Distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S., 19 Jun 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 310-316 7 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Re-thinking the care of male prisoners who self-harm

    Neave, S., Glorney, E. & Coles-Kemp, L., 19 Jun 2018

    Research output: Contribution to conferencePaper

  85. Published

    Conquering Generals: an NP-Hard Proof of Useful Work

    Quaglia, E. & Loe, A., 15 Jun 2018, p. 54-59 6 p.

    Research output: Contribution to conferencePaper

  86. Published

    Why 50,000 ships are so vulnerable to cyberattacks

    Martin, K. & Hopcraft, R., 13 Jun 2018

    Research output: Other contribution

  87. Published

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K., 11 Jun 2018, In : Politics and Governance. 6, 2, p. 41-48 8 p.

    Research output: Contribution to journalArticle

  88. E-pub ahead of print

    A cryptographic analysis of the WireGuard protocol

    Dowling, B. & Paterson, K. G., 10 Jun 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, Vol. 10892 LNCS, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Forthcoming

    InfoSec Cinema: Using Films for Information Security Teaching

    Blasco Alis, J. & Quaglia, E., 6 Jun 2018, (Accepted/In press)

    Research output: Contribution to conferencePaper

  90. Published

    Coming in from the Cold: A Safe Harbor from the CFAA and DMCA §1201

    Etcovitch, D. & van der Merwe, T., 1 Jun 2018, In : Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  91. Published

    Exchangeability martingales for selecting features in anomaly detection

    Cherubin, G., Baldwin, A. & Griffin, J., Jun 2018, p. 157-170 14 p.

    Research output: Contribution to conferencePaper

  92. E-pub ahead of print

    Forensic smartphone analysis using adhesives: Transplantation of Package on Package components

    Heckmann, T., Markantonakis, K., Naccache, D. & Souvignet, T., 31 May 2018, In : digital investigation.

    Research output: Contribution to journalArticle

  93. Forthcoming

    An Evaluation of the Security of the Bitcoin Peer-to- Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 22 May 2018, (Accepted/In press)

    Research output: Contribution to conferencePaper

  94. Forthcoming

    E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 22 May 2018, (Accepted/In press)

    Research output: Contribution to conferencePaper

  95. Published

    Efficient control recovery for resilient control systems

    Zhang, S. & Wolthusen, S., 21 May 2018 6 p.

    Research output: Contribution to conferencePaper

  96. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S., 18 May 2018, (Submitted) In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  97. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.), 8 May 2018, Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  98. Published

    Cyber Deterrence Theory and Practise

    Haggman, A., 5 May 2018, Cyber Security: Power and Technology. Lehto, M. & Neittaanmäki, P. (eds.). 1 ed. Springer International Publishing, Vol. 93, p. 63-81 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  99. Published

    Why so serious? Introducing a fun take on cyber war

    Haggman, A., 5 May 2018, New Statesman, 2018, 4-10 May, p. 16-18 3 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  100. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Sgandurra, D. & Wang, R., 1 May 2018, In : International Journal of Grid and Utility Computing. 9, 2, p. 170-178 9 p.

    Research output: Contribution to journalArticle

  101. Published

    Automated generation of colluding apps for experimental research

    Blasco Alis, J. & Chen, T. M., May 2018, In : Journal of Computer Virology and Hacking Techniques. 14, 2, p. 127–138 12 p.

    Research output: Contribution to journalArticle

  102. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A., 28 Apr 2018, In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

Previous 1 2 3 4 5 6 7 8 ...19 Next