1. 2018
  2. Submitted

    Private Information Retrieval using Product-Matrix Minimum Storage Regenerating Codes

    Dorkson, C. & Ng, S. 18 May 2018 In : IEEE Transactions on Information Theory.

    Research output: Contribution to journalArticle

  3. Forthcoming

    Security issues in a group key establishment protocol

    Mitchell, C. J. 16 May 2018 In : The Computer Journal. 7 p.

    Research output: Contribution to journalArticle

  4. Published

    Information and Communications Security: 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings

    Qing, S. (ed.), Mitchell, C. J. (ed.), Chen, L. (ed.) & Liu, D. (ed.) 8 May 2018 Cham, Switzerland: Springer-Verlag. 689 p. (Lecture Notes in Computer Science; vol. 10631)

    Research output: Book/ReportBook

  5. Forthcoming

    Consumer Centric Data Control, Tracking and Transparency - A Position Paper

    Tapsell, J., Akram, R. N. & Markantonakis, K. 6 May 2018

    Research output: Contribution to conferencePaper

  6. Forthcoming

    Good Vibrations: Artificial Ambience-Based Relay Attack Detection

    Gurulian, I., Markantonakis, K., Frank, E. & Akram, R. N. 6 May 2018 9 p.

    Research output: Contribution to conferencePaper

  7. Forthcoming

    Fair and Transparent Blockchain based Tendering Framework - A Step Towards Open Governance

    Hardwick, F. S., Akram, R. N. & Markantonakis, K. 5 May 2018

    Research output: Contribution to conferencePaper

  8. Published

    Why so serious? Introducing a fun take on cyber war

    Haggman, A. 5 May 2018 New Statesman, 2018, 4-10 May, p. 16-18 3 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  9. Forthcoming

    A Critique of Linguistic Capitalism: Provocation/Intervention

    Thornton, P. 2 May 2018 In : GeoHumanities.

    Research output: Contribution to journalArticle

  10. Forthcoming

    Web password recovery - A necessary evil?

    Al Maqbali, F. & Mitchell, C. J. 30 Apr 2018 Proceedings of the Future Technology Conference (FTC) 2018: Vancouver, November 2018. Springer-Verlag, (Advances in Intelligent Systems and Computing)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Privacy Pass: Bypassing Internet Challenges Anonymously

    Davidson, A. 28 Apr 2018 In : Proceedings on Privacy Enhancing Technologies. 2018, 3, p. 164-180 17 p.

    Research output: Contribution to journalArticle

  12. Forthcoming

    Holding on to Dissensus: a co-design case study in security research.

    Heath, C., Coles-Kemp, L. & Hall, P. 24 Apr 2018 In : Strategic Design Research Journal. Special Issue: Autonomía - Design strategies for enabling design process, 22 p.

    Research output: Contribution to journalSpecial issue

  13. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R. 21 Apr 2018 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Forthcoming

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S. 18 Apr 2018 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Forthcoming

    Detection of untrustworthy IoT measurements using expert knowledge of their joint distribution

    Nouretdinov, I., Darwish, S. & Wolthusen, S. 18 Apr 2018 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. E-pub ahead of print

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B. 6 Apr 2018 p. 322-343 22 p.

    Research output: Contribution to conferencePaper

  17. E-pub ahead of print

    Shorter Double-Authentication Preventing Signatures for Small Address Spaces

    Poettering, B. 6 Apr 2018 p. 344-361 18 p.

    Research output: Contribution to conferencePaper

  18. Forthcoming

    Coming in from the Cold: A Safe Harbor from the CFAA and the DMCA § 1201 for Security Researchers

    Etcovitch, D. & van der Merwe, T. Apr 2018 In : Berkman Klein Assembly Series. 1, 1, p. 1-39

    Research output: Contribution to journalArticle

  19. E-pub ahead of print

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L. 31 Mar 2018 Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Gaming...seriously?

    Haggman, A. 28 Mar 2018 TEISS

    Research output: Other contribution

  21. E-pub ahead of print

    Secret, verifiable auctions from elections

    Quaglia, E. & Smyth, B. 23 Mar 2018 In : Theoretical Computer Science.

    Research output: Contribution to journalArticle

  22. Published

    Sergei Skripal attack: Russian Embassy is fuelling tensions with some very undiplomatic tweets

    Robinson, N. & Miltner, K. 21 Mar 2018 The Conversation

    Research output: Other contribution

  23. Published
  24. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y. 7 Mar 2018 Topics in Cryptology – CT-RSA 2018 - The Cryptographers’ Track at the RSA Conference 2018, Proceedings. Springer-Verlag, Vol. 10808 LNCS, p. 116-136 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10808 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Forthcoming

    Why Should I? Cybersecurity, the Security of the State and the Insecurity of the Citizen

    Coles-Kemp, L., Ashenden, D. & O'Hara, K. 7 Mar 2018 In : Politics and Governance.

    Research output: Contribution to journalArticle

  26. Published

    Graded Encoding Schemes from Obfuscation

    Farshim, P., Hesse, J., Hofheinz, D. & Larraia de Vega, E. 1 Mar 2018 Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Springer-Verlag, Vol. 10769 LNCS, p. 371-400 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Hashing solutions instead of generating problems: On the interactive certification of RSA moduli

    Auerbach, B. & Poettering, B. 1 Mar 2018 p. 403-430 27 p.

    Research output: Contribution to conferencePaper

  28. Published

    A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals

    Sivakumaran, P. & Blasco Alis, J. Mar 2018 p. 152-154

    Research output: Contribution to conferencePoster

  29. Forthcoming

    A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

    Mayes, K. & Babbage, S. 27 Feb 2018 6 p.

    Research output: Contribution to conferencePaper

  30. Forthcoming

    Your code is my code: Exploiting a common weakness in OAuth 2.0 implementations

    Li, W., Mitchell, C. J. & Chen, T. 11 Feb 2018 Proceedings of the 2018 Security Protocols Workshop, Cambridge, April 2018. 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Forthcoming

    Security-Aware Network Analysis for Network Controllability

    Zhang, S. & Wolthusen, S. 8 Feb 2018 7 p.

    Research output: Contribution to conferencePaper

  32. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P. 24 Jan 2018 In : Schizophrenia bulletin.

    Research output: Contribution to journalArticle

  33. Published

    Mitigating CSRF attacks on OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T. M. 24 Jan 2018

    Research output: Working paper

  34. Published

    ‘Troubling’ Chastisement: A Comparative Historical Analysis of Child Punishment in Ghana and Ireland

    Ibrahim, S. & RUSH, M. 19 Jan 2018 In : Sociological Research Online. p. 1-20 20 p.

    Research output: Contribution to journalArticle

  35. E-pub ahead of print

    Measurement re-ordering attacks on power system state estimation

    Gul, A. & Wolthusen, S. 18 Jan 2018 Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Iterative Recovery of Controllability via Maximum Matching

    Zhang, S. & Wolthusen, S. 15 Jan 2018 p. 328-333 6 p.

    Research output: Contribution to conferencePaper

  37. Published

    Making defeating CAPTCHAs harder for bots

    Al-Fannah, N. M. 11 Jan 2018

    Research output: Contribution to conferencePaper

  38. Forthcoming

    Efficient Control Recovery for Resilient Control Systems

    Zhang, S. & Wolthusen, S. 10 Jan 2018 6 p.

    Research output: Contribution to conferencePaper

  39. In preparation
  40. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H. Jan 2018 In : International Journal of Sensor Networks. 26, 1, p. 54-68

    Research output: Contribution to journalArticle

  41. Submitted

    A Survey and Refinement of Repairable Threshold Schemes

    Laing, T. & Stinson, D. 2018 In : Journal of Mathematical Cryptology. 40 p.

    Research output: Contribution to journalArticle

  42. Published

    Attacks against GSMA’s M2M Remote Provisioning

    Quaglia, E., Smyth, B. & Meyer, M. 2018

    Research output: Contribution to conferencePaper

  43. Unpublished

    Completeness in Languages for Attribute-Based Access Control

    Williams, C. 2018 141 p.

    Research output: ThesisDoctoral Thesis

  44. Forthcoming

    Conquering Generals: an NP-Hard Proof of Useful Work

    Quaglia, E. & Loe, A. 2018

    Research output: Contribution to conferencePaper

  45. Forthcoming

    Cryptographic controls: the heart of cyber security

    Martin, K. 2018 Handbook of Security Science. Springer

    Research output: Chapter in Book/Report/Conference proceedingChapter

  46. Published

    Cyber Deterrence Theory and Practise

    Haggman, A. 2018 Cyber Security: Power and Technology. Lehto, M. & Neittaanmäki, P. (eds.). 1 ed. Springer International Publishing, Vol. 93, p. 63-81 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  47. E-pub ahead of print

    Differential Cryptanalysis of Round-Reduced Sparx-64/128

    Ankele, R. & List, E. 2018 ACNS 2018 Applied Cryptography & Network security.. Preneel, B. & Vercauteren, F. (eds.). Springer International Publishing, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Unpublished

    Enhanced Threshold Schemes and their Applications

    Laing, T. 2018 201 p.

    Research output: ThesisDoctoral Thesis

  49. Submitted
  50. Published

    Hybrid Encryption in a Multi-User Setting, Revisited

    Giacon, F., Kiltz, E. & Poettering, B. 2018 p. 1-30 30 p.

    Research output: Contribution to conferencePaper

  51. Forthcoming

    KEM Combiners

    Giacon, F., Heuer, F. & Poettering, B. 2018 p. 1-29 29 p.

    Research output: Contribution to conferencePaper

  52. E-pub ahead of print

    MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

    Ankele, R., Böhl, F. & Friedberger, S. 2018 ACNS 2018 Applied Cryptography & Network security. Preneel, B. & Vercauteren, F. (eds.). Springer International Publishing, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Unpublished

    The Design and Analysis of Real-World Cryptographic Protocols

    Scott, S. 2018 218 p.

    Research output: ThesisDoctoral Thesis

  54. 2017
  55. Published

    Gendered Penalties of Divorce on Remarriage in Nigeria: A Qualitative Study.

    Ibrahim, S., Rush, M., Monks, C. P. & Edwards, E. T. 31 Dec 2017 In : Journal of Comparative Family Studies - Special Issue. 48, 3, p. 351-366 48, 3

    Research output: Contribution to journalArticle

  56. Published

    Some singular value inequalities via convexity

    Leka, Z. 29 Dec 2017 In : Linear and Multilinear Algebra.

    Research output: Contribution to journalArticle

  57. E-pub ahead of print

    Detection of app collusion potential using logic programming

    Blasco Alis, J., Chen, T. M., Roggenbach, M. & Muttik, I. 28 Dec 2017 In : Journal of Network and Computer Applications. 105, p. 88-104

    Research output: Contribution to journalArticle

  58. Published
  59. Published

    Analysing the Resilience of the IoT against Physical and Proximity Attacks

    Xu, H., Sgandurra, D., Mayes, K., Li, P. & Wang, R. 9 Dec 2017 The 10th International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage. p. 291-301 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    One leak will sink a ship: WebRTC IP address leaks

    Al-Fannah, N. M. 7 Dec 2017

    Research output: Contribution to conferencePaper

  61. Published

    Analyzing multi-key security degradation

    Luykx, A., Mennink, B. & Paterson, K. G. 1 Dec 2017 Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer-Verlag, Vol. 10625 LNCS, p. 575-605 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10625 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Cold boot attacks on NTRU

    Paterson, K. G. & Villanueva-Polanco, R. 1 Dec 2017 Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Springer-Verlag, Vol. 10698 LNCS, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Large Modulus Ring-LWE >= Module-LWE

    Albrecht, M. & Deo, A. 30 Nov 2017 Advances in Cryptology - ASIACRYPT 2017. p. 267-296 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T. 30 Nov 2017 Advances in Cryptology - ASIACRYPT 2017. p. 297-322 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Geographies of (con)text: language and structure in a digital age

    Thornton, P. 28 Nov 2017 In : Computational Culture: A Journal of Software Studies. Autumn 2017, Issue 6

    Research output: Contribution to journalSpecial issue

  66. E-pub ahead of print

    Notes on GGH13 Without the Presence of Ideals

    Davidson, A., Albrecht, M. & Larraia de Vega, E. 25 Nov 2017 p. 135-158 24 p.

    Research output: Contribution to conferencePaper

  67. Published

    Access Control and Availability Vulnerabilities in the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S. 22 Nov 2017 Critical Information Infrastructures Security. p. 239 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Multi-level access in searchable symmetric encryption

    Renwick, S., Alderman, J. & Martin, K. 19 Nov 2017 Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Paper. Springer-Verlag, Vol. 10323, p. 35-52 (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R. 19 Nov 2017 Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Revised Selected Papers. Springer-Verlag, Vol. 10323 LNCS, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10323 LNCS)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Practical Architectures for Deployment of Searchable Encryption in a Cloud Environment

    Renwick, S. & Martin, K. 15 Nov 2017 In : Cryptography. 1, 19, p. 1-17 17 p.

    Research output: Contribution to journalArticle

  71. Unpublished

    A Combinatorial Approach for Frequency Hopping Schemes

    Nyirenda, M. 14 Nov 2017 186 p.

    Research output: ThesisDoctoral Thesis

  72. Published

    Overpromised or Underdelivered?: Evaluating the Performance of Australia's National Cyber Security Strategy

    Haggman, A. 9 Nov 2017 Asia Pacific Security Magazine, November/December 2017, p. 10 11 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  73. Published

    Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S. 9 Nov 2017 p. 1-12 12 p.

    Research output: Contribution to conferencePaper

  74. Submitted

    Security, Privacy and Trust of User-Centric Solutions

    Akram, R. N., Chen, H-H., Lopez, J., Sauveron, D. & Yang, L. 9 Nov 2017 In : Future Generation Computer Systems.

    Research output: Contribution to journalEditorial

  75. Published

    Serverless Protocols for Inventory and Tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S. 9 Nov 2017 Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A New Security Middleware Architecture Based on Fog Computing and Cloud To Support IoT Constrained Devices

    Razouk, W., Sgandurra, D. & Sakurai, K. 8 Nov 2017 International Conference on Internet of Things and Machine Learning. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    On the One-Per-Message Unforgeability of (EC)DSA and Its Variants

    Fersch, M., Kiltz, E. & Poettering, B. 5 Nov 2017 p. 519-534 16 p.

    Research output: Contribution to conferencePaper

  78. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O. 30 Oct 2017 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L. 30 Oct 2017 PLAS '17 Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security. Association for Computing Machinery (ACM), p. 25-35 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    The TypTop System: Personalized Typo-tolerant Password Checking

    Woodage, J., Chatterjee, R., Ristenpart, T., Pnueli, Y. & Chowdhury, A. 30 Oct 2017 CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. p. 329-346 18 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  81. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R. 29 Oct 2017 10th International Conference, SecITC 2017, Bucharest, Romania, June 8–9, 2017, Revised Selected Papers. Springer, (Security and Cryptology; vol. 10543)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Forthcoming

    Wearable Security and Privacy

    Blasco Alis, J., Chen, T. M., Wolff, D. & Patil, H. K. 26 Oct 2017 The Philosophy of Mission-Oriented Wireless Sensor Networks. Ammari, H. (ed.). Springer, 30 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  83. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J. 23 Oct 2017 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S. 14 Oct 2017 Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D. 5 Oct 2017 Custard, Culverts and Cake: Academics on Life in The Archers. Courage, C. & Headlam, N. (eds.). Emerald Publishing, p. 249-267

    Research output: Chapter in Book/Report/Conference proceedingChapter

  86. Published

    Criteria of efficiency for set-valued classification

    Vovk, V., Nouretdinov, I., Fedorova, V., Petej, I. & Gammerman, A. Oct 2017 In : Annals of Mathematics and Artificial Intelligence. 81, 1-2, p. 21-46

    Research output: Contribution to journalArticle

  87. Published

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K. 28 Sep 2017 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S. 19 Sep 2017 The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113, p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Forthcoming

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N. 12 Sep 2017

    Research output: Contribution to conferencePaper

  90. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K. 11 Sep 2017 Trustcom/BigDataSE/ICESS, 2017 IEEE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    OCPP Protocol: Security Threats and Challenges

    Alcaraz, C., Lopez, J. & Wolthusen, S. 1 Sep 2017 In : IEEE Transactions on Smart Grid. 8, 5, p. 2452-2459 8 p.

    Research output: Contribution to journalArticle

  92. Published

    A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L. Sep 2017 In : IACR Transactions on Symmetric Cryptology. 2017, 3, p. 73-107 35 p.

    Research output: Contribution to journalArticle

  93. Published

    Distributed denial of government: the Estonian Data Embassy Initiative

    Robinson, N. & Martin, K. Sep 2017 In : Network Security. 9, p. 13-16 5 p.

    Research output: Contribution to journalSpecial issue

  94. Published

    Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

    Livraga, G. (ed.) & Mitchell, C. J. (ed.) Sep 2017 Berlin: Springer-Verlag. 235 p. (Lecture Notes in Computer Science; vol. 10547)

    Research output: Book/ReportAnthology

  95. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S. Sep 2017 Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  96. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K. 29 Aug 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K. 29 Aug 2017 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R. 29 Aug 2017 FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. E-pub ahead of print

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S. 24 Aug 2017 In : Cryptography and Communications. p. 1-18 18 p.

    Research output: Contribution to journalArticle

  100. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K. 23 Aug 2017 SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Cyber Security Strategy Wargame

    Haggman, A. 17 Aug 2017

    Research output: Contribution to conferencePoster

  102. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L. 16 Aug 2017 USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...18 Next