1. 2017
  2. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J. 7 Apr 2017

    Research output: Contribution to conferencePaper

  3. Forthcoming

    Gesture Recognition Implemented on a Personal Limited Device.

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K. 5 Apr 2017 6 p.

    Research output: Contribution to conferencePaper

  4. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L. 24 Mar 2017 ACM CODASPY.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Automated Generation of Colluding Apps For Experimental Research

    Blasco Alis, J. & Chen, T. M. 19 Mar 2017 In : Journal of Computer Virology and Hacking Techniques.

    Research output: Contribution to journalArticle

  6. Forthcoming

    Analysing and Exploiting the Mantin Biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T. 14 Mar 2017 In : Designs, Codes and Cryptography.

    Research output: Contribution to journalArticle

  7. Forthcoming

    Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions

    Crampton, J., Farley, N., Gutin, Z., Jones, M. & Poettering, B. 11 Mar 2017 In : Journal of Computer Security.

    Research output: Contribution to journalArticle

  8. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J. 6 Mar 2017 22 p.

    Research output: Working paper

  9. Published

    Stack Bounds Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L. 26 Feb 2017 NDSS Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Forthcoming

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K. 25 Feb 2017

    Research output: Contribution to conferencePaper

  11. Forthcoming

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C. 16 Feb 2017 8 p.

    Research output: Contribution to conferencePaper

  12. Forthcoming

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R. 15 Feb 2017 Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    Extending EMV Tokenised Payments To Offline-Environments

    Jayasinghe, D., Markantonakis, K., Gurulian, I., Akram, R. & Mayes, K. 9 Feb 2017 The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. E-pub ahead of print

    Log your car: The non-invasive vehicle forensics

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I. 9 Feb 2017 he 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 1-9 9 p. TrustCom Paper 147

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Secure and Trusted Execution: Past, Present and Future -- A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E. 9 Feb 2017 The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 1-10 10 p. TrustCom Paper 342

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D. 9 Feb 2017 the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, TrustCom Paper 297

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Distributed conformal anomaly detection

    Nouretdinov, I. 2 Feb 2017 Machine Learning and Applications (ICMLA), 2016 15th IEEE International Conference on. IEEE Computer Society, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Forthcoming

    Characterising a CPU Fault Attack Model via Run-Time Data Analysis

    Kelly, M., Mayes, K. & Walker, J. F. 1 Feb 2017 6 p.

    Research output: Contribution to conferencePaper

  19. Forthcoming

    Detecting Collusion on Android Mobile Devices

    Blasco Alis, J. 1 Feb 2017 Data Analytics and Decision Support for Cybersecurity.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting

    Li, L., Bissyande, T. F., Klein, J., Le Traon, Y., Lo, D. & Cavallaro, L. 20 Jan 2017 In : IEEE Transactions on Information Forensics and Security . PP, 99

    Research output: Contribution to journalArticle

  21. Forthcoming

    On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL

    Albrecht, M. 18 Jan 2017 Eurocrypt 2017. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D. 1 Apr 2017 In : International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticle

  23. Published

    The Evolution of Android Malware and Android Analysis Techniques

    Tam, K., Feizollah, A., Anuar, N. B., Salleh, R. & Cavallaro, L. 4 Jan 2017 In : ACM Computing Surveys. 49, 4, 76

    Research output: Contribution to journalArticle

  24. Published

    On the offensive: UK declares cyber war on Islamic State

    Haggman, A. Jan 2017 In : Jane's Intelligence Review. 2017, February, p. 52-55 4 p.

    Research output: Contribution to journalArticle

  25. Forthcoming
  26. Forthcoming

    CryptoCache: Network Caching with Confidentiality

    Quaglia, E., Smyth, B., Paschos, G. & Leguay, J. 2017

    Research output: Contribution to conferencePaper

  27. In preparation
  28. In preparation
  29. Submitted

    Nigerian Society and Culture

    Ibrahim, S. 2017 In : The Journal of Intercultural Studies. special issue

    Research output: Contribution to journalArticle

  30. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R. 2017 In : Journal of Computer Security. 25, p. 83-115 33 p.

    Research output: Contribution to journalArticle

  31. In preparation

    The Youth and Cyber Social Bond

    Ibrahim, S. 2017 In : CyberPsychology & Behavior.

    Research output: Contribution to journalArticle

  32. In preparation

    Unequal Sociocultural Penalties of Divorce in Nigeria and Citizenship Implications

    Ibrahim, S., MONKS, C. & RUSH, M. 2017 In : Journal of Comparative Family Studies - Special Issue.

    Research output: Contribution to journalArticle

  33. 2016
  34. Published

    Are Information Security Professionals Expected Value Maximisers?: An Experimental and Survey-based Test

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A. 22 Dec 2016 In : Journal of Cybersecurity. 2, 1, p. 57-70 14 p.

    Research output: Contribution to journalArticle

  35. Forthcoming

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R. 20 Dec 2016 CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Building a Community of Real-World Cryptographers

    Boneh, D., Paterson, K. & Smart, N. P. 14 Dec 2016 In : IEEE Security and Privacy Magazine. 14, 6, p. 7-9 3 p.

    Research output: Contribution to journalArticle

  37. Forthcoming

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Williams, C. & Crampton, J. 12 Dec 2016 7th ACM Conference on Data and Application Security and Privacy. ACM Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Connectivity, Communications and Technology

    Haggman, A. 7 Dec 2016 International Relations. E-International Relations, 12

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  39. Published

    Social and contextual taxonomy of cybercrime: Socioeconomic theory of Nigerian cybercriminals

    Ibrahim, S. 1 Dec 2016 In : International Journal of Law, Crime and Justice. p. 44-57 14 p., 47

    Research output: Contribution to journalArticle

  40. Published

    You Can't Touch This: Consumer-Centric Android Application Repackaging Detection

    Gurulian, I., Markantonakis, K., Cavallaro, L. & Mayes, K. 1 Dec 2016 In : Future Generation Computer Systems. 65, p. 1-9 9 p.

    Research output: Contribution to journalArticle

  41. Published

    Security Standardisation Research, Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings

    Chen, L. (ed.), McGrew, D. A. (ed.) & Mitchell, C. J. (ed.) Dec 2016 Springer-Verlag. 275 p. (Lecture Notes in Computer Science; vol. 10074)

    Research output: Book/ReportAnthology

  42. Forthcoming

    Preventing Relay Attacks in Mobile Transactions Using Infrared Light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K. 19 Nov 2016 SAC '17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Causes of Socioeconomic Cybercrime in Nigeria

    Ibrahim, S. 18 Nov 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF). IEEE Xplore, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  44. Forthcoming

    Towards Trusted Execution of Multi-modal Continuous Authentication Schemes

    Shepherd, C., Akram, R. & Markantonakis, K. 18 Nov 2016 Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published
  46. Published

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B. 9 Nov 2016 Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R. 4 Nov 2016

    Research output: Contribution to conferencePaper

  48. Published

    Reactive and Proactive Standardisation of TLS

    Paterson, K. & Merwe, T. V. D. 2 Nov 2016 Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings. Chen, L., McGrew, D. A. & Mitchell, C. (eds.). Springer Verlag, Vol. 10074, p. 160-186 27 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol

    Degabriele, J. P., Fehr, V., Fischlin, M., Gagliardoni, T., Günther, F., Marson, G. A., Mittelbach, A. & Paterson, K. 1 Nov 2016 In : International Journal of Information Security. 15, 6, p. 637-657 21 p.

    Research output: Contribution to journalArticle

  50. E-pub ahead of print

    Efficient, XOR-based, Ideal (t; n)-threshold Schemes

    Chen, L., Laing, T. & Martin, K. 28 Oct 2016 Proceedings of 15th International Conference on Cryptology and Network Security (CANS 2016). Springer, Vol. 10052, p. 467-483 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  51. Published

    Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection

    Deo, A., Dash, S., Suarez de Tangil Rotaeche, G., Vovk, V. & Cavallaro, L. 28 Oct 2016 ACM Workshop on Artificial Intelligence and Security. Vienna, Austria: ACM, p. 71-82 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C. 24 Oct 2016 WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Paterson, K., Degabriele, J. & Hansen, T. 24 Oct 2016 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Forthcoming

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K. 12 Oct 2016 12th Workshop on RFID and IoT Security (RFIDSec2016). Springer, (Lecture Notes in Computer Science (LNCS))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Forthcoming

    Log Your Car: Reliable Maintenance Services Record

    Mansor, H., Markantonakis, K., Akram, R., Mayes, K. & Gurulian, I. 9 Oct 2016 12th International Conference on Information Security and Cryptology (Inscrypt). Springer, (LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Submitted

    Cyber Deterrence Theory and Practice

    Haggman, A. Oct 2016 Cyber Security: Cyber Power and Technology. Springer International Publishing

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  57. Published

    An Efficient, Secure and Trusted Channel Protocol for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S. 25 Sep 2016 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (IEEE DASC 2016). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, 1570260400

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Security and Performance Comparison of Different Secure Channel Protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S. 25 Sep 2016 35th DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, 1570260399

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    On the security of 2-key triple DES

    Mitchell, C. J. 19 Sep 2016 In : IEEE Transactions on Information Theory. 62, 11, p. 6260-6267 8 p.

    Research output: Contribution to journalArticle

  60. Published

    Password generators: old ideas and new

    AL Maqbali, F. & Mitchell, C. 17 Sep 2016 Information Security Theory and Practice: 10th IFIP WG 11.2 International Conference, WISTP 2016, Heraklion, Crete, Greece, September 26–27, 2016, Proceedings. Foresti, S. & Lopez, J. (eds.). Springer-Verlag, p. 245-253 9 p. (Lecture Notes in Computer Science; vol. 9895)

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  61. Published

    Retrofitting mutual authentication to GSM using RAND hijacking

    Khan, M. & Mitchell, C. J. 17 Sep 2016 Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Localised Multisecret Sharing

    Laing, T., Martin, K., Paterson, M. & Stinson, D. 31 Aug 2016 In : Cryptography and Communications. p. 1-17 17 p.

    Research output: Contribution to journalArticle

  63. E-pub ahead of print

    Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs

    Ng, S., Martin, K., Chen, L. I. & Li, Q. 22 Aug 2016 In : IET Information Security .

    Research output: Contribution to journalArticle

  64. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T. 18 Aug 2016 IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Forthcoming

    Tokenisation Blacklisting using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K. 18 Aug 2016 12th EAI International Conference on Security and Privacy in Communication Networks.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Forthcoming

    MiMC : Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity

    Albrecht, M., Grassi, L., Rechberger, C., Roy, A. & Tiessen, T. 14 Aug 2016 Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer, Vol. 10031, p. 191-219 30 p. (Lecture Notes in Computer Science; vol. 10031)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Forthcoming

    On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations

    Crampton, J., Gagarin, A., Gutin, G., Jones, M. & Wahlstrom, M. 1 Oct 2019 In : ACM Transactions on Privacy and Security. 19, 3, p. 1-29 29 p.

    Research output: Contribution to journalArticle

  68. Published

    DroidScribe: Classifying Android Malware Based on Runtime Behavior

    Dash, S., Suarez-Tangil, G., Khan, S., Tam, K., Ahmadi, M., Kinder, J. & Cavallaro, L. 4 Aug 2016 Security and Privacy Workshops (SPW), 2016 IEEE: Mobile Security Technologies (MoST 2016). IEEE, p. 252-261 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    A subfield lattice attack on overstretched NTRU assumptions: Cryptanalysis of some FHE and Graded Encoding Schemes

    Albrecht, M., Ducas, L. & Bai, S. 21 Jul 2016 Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, Vol. 9814, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results

    Degabriele, J., Paterson, K., Schuldt, J. & Woodage, J. 21 Jul 2016 Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer Berlin / Heidelberg, Vol. 9814, p. 403-432 30 p. (Lecture Notes in Computer Science ; vol. 9814)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  71. Published

    Generating Concurrency Checks Automatically

    Hague, M. & Hoyland, J. 17 Jul 2016 Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs . ACM, p. 1-15 15 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Analysing the security of Google's implementation of OpenID Connect

    Li, W. & Mitchell, C. J. 7 Jul 2016 Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, Donostia-San Sebastián, Spain, July 7-8, 2016, Proceedings. Caballero, J., Zurutuza, U. & Rodriguez, R. J. (eds.). Springer-Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science; vol. 9721)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Inter-ReBAC: Inter-operation of Relationship-based Access Control Model Instances

    Crampton, J. & Sellwood, J. 2 Jul 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9766, p. 96-105 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Algorithms for the workflow satisfiability problem engineered for counting constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M. 1 Jul 2016 In : Journal of Combinatorial Optimization. 32, 1, p. 3–24 22 p.

    Research output: Contribution to journalArticle

  75. Published

    Challenges in standardising cryptography

    Mitchell, C. J. 1 Jul 2016 In : International Journal of Information Security Science. 5, 2, p. 29-38 10 p.

    Research output: Contribution to journalArticle

  76. Published

    Training day: Joint UK-US cyber exercise tests preparedness

    Haggman, A. 29 Jun 2016 In : Jane's Intelligence Review. August 2016, p. 52-53 2 p.

    Research output: Contribution to journalArticle

  77. Published

    Measuring Attitude towards Risk Treatment Actions amongst Information Security Professionals: an Experimental Approach

    Mersinas, K., Hartig, B., Martin, K. & Seltzer, A. 13 Jun 2016 Workshop on the Economics of Information Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    On Completeness in Languages for Attribute-base Access Control

    Crampton, J. & Williams, C. 6 Jun 2016 SACMAT'16 : Proceedings of the 21st ACM Symposium on Access Control Models and Technologies. New York: ACM Press, p. 149-160 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Does the IdP Mix-Up attack really work?

    Li, W. & Mitchell, C. J. 3 Jun 2016 4 p.

    Research output: Working paper

  80. Published

    Binding Hardware and Software to Prevent Firmware Modification and Device Counterfeiting

    Lee, R., Markantonakis, K. & Akram, R. 30 May 2016 CPSS '16 Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security. ACM Press, p. 70-81 11 p. (Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Recovering Structural Controllability on Erdös-Rényi Graphs in the Presence of Compromised Nodes

    Alwasel, B. & Wolthusen, S. 18 May 2016 Proceedings of the 10th International Conference on Critical Information Infrastructures Security (CRITIS 2015). Springer-Verlag, Vol. 9578, p. 105-119 15 p. (Lecture Notes in Computer Science; vol. 9578)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Two Rounds RFID Grouping-Proof Protocol

    Abu Ghazalah, S. & Markantonakis, K. 3 May 2016 p. 193-203 11 p.

    Research output: Contribution to conferencePaper

  83. Published

    Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

    Albrecht, M. & Paterson, K. 28 Apr 2016 Advances in Cryptology – EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I. Vol. 9665, p. 622-643 22 p. (Lecture Notes in Computer Science; vol. 9665)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A Secure and Trusted Boot Process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R. 19 Apr 2016 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Challenges of Security and Trust of Mobile Devices as Digital Avionics Component

    Akram, R. & Markantonakis, K. 19 Apr 2016 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C4-1-1C4-11

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    Hidden Markov Models with Confidence

    Cherubin, G. & Nouretdinov, I. 17 Apr 2016 Conformal and Probabilistic Prediction with Applications: 5th International Symposium, COPA 2016 Madrid, Spain, April 20–22, 2016 Proceedings. Springer, Vol. 9653, p. 128-144 17 p. (Lecture Notes in Computer Science; vol. 9653)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Physical Punishment in Ghana and Finland: criminological, sociocultural, human rights and child protection implications

    Ibrahim, S. & Komulainen, S. 13 Apr 2016 The International Journal of Human Rights and Constitutional Studies. Inderscience, Vol. 4, p. 54-74 20 p. 1

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  88. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T. 7 Apr 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646, p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    MPLS policy target recognition network

    Al-Mutairi, A. & Wolthusen, S. 2 Apr 2016 Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9572, p. 71-87 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9572)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Forthcoming

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K. 19 Mar 2016 SAI Intelligent Systems Conference 2016 (IntelliSys 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Secure Application Execution in Mobile Devices

    Msgna, M., Ferradi, H., Akram, R. & Markantonakis, K. 18 Mar 2016 The New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. A., Naccache, D. & Quisquater, J-J. (eds.). Springer, p. 417-438 22 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  92. E-pub ahead of print

    Diary of a Plastic Soldier (extracts)

    Thornton, P. 10 Mar 2016 In : Critical Military Studies.

    Research output: Contribution to journalSpecial issue

  93. Published

    ARPPM: Administration in the RPPM model

    Crampton, J. & Sellwood, J. 9 Mar 2016 CODASPY 2016 - Proceedings of the 6th ACM Conference on Data and Application Security and Privacy. ACM, p. 219-230 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Privacy, compliance and the cloud

    Mitchell, C. J. 9 Mar 2016 Guide to Security Assurance for Cloud Computing. Zhu, S. Y., Hill, R. & Trovati, M. (eds.). Springer, p. 3-14 12 p. (» Computer Communications and Networks)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  95. Published

    Some Reflections on a Visit to the Playing with History Collection

    Haggman, A. 23 Feb 2016 Ludic Geopolitics Blog

    Research output: Other contribution

  96. Published

    Performance Evaluation of the new TUAK Mobile Authentication Algorithm

    Mayes, K., Babbage, S. & Maximov, A. 21 Feb 2016 p. 38-44

    Research output: Contribution to conferencePaper

  97. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C. 2 Feb 2016 Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610, p. 147-163 17 p. (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published
  99. Published

    Extended Functionality in Verifiable Searchable Encryption

    Alderman, J., Janson, C., Martin, K. & Renwick, S. 9 Jan 2016 Proceedings of the 2nd International Conference on Cryptography and Information Security in the Balkans - BalkanCryptSec 2015. Springer, Vol. 9540, p. 187-205 19 p. (Lecture Notes in Computer Science - LNCS; vol. 9540). (Lecture Notes in Computer Science; vol. 9540)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Disjoint difference families and their applications.

    Ng, S. & Paterson, M. 1 Jan 2016 In : Designs, Codes and Cryptography. 78, 1, p. 103-127 25 p.

    Research output: Contribution to journalArticle

  101. Published

    A Multivariate Approach for Checking Resiliency in Access Control

    Crampton, J., Gutin, G. & Watrigant, R. 2016 Proceedings of AAIM 2016. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  102. Unpublished

    Cryptanalysis of Some Block Ciphers

    Haji Naim, A. G. 2016 374 p.

    Research output: ThesisDoctoral Thesis

Previous 1 2 3 4 5 6 7 8 ...15 Next