1. 2017
  2. Forthcoming

    An everyday story of country folk online? The marginalisation of the internet and social media in The Archers

    Coles-Kemp, L. & Ashenden, D. 31 Oct 2017 CUSTARD, CULVERTS AND CAKE: ACADEMICS ON LIFE WITH THE ARCHERS. Emerald Publishing, p. 251 271 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K. 28 Sep 2017 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S. 19 Sep 2017 The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113, p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    May The Force Be With You: Force-Based Relay Attack Detection

    Gurulian, I., Hancke, G., Markantonakis, K. & Akram, R. N. 12 Sep 2017

    Research output: Contribution to conferencePaper

  6. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K. 11 Sep 2017 Trustcom/BigDataSE/ICESS, 2017 IEEE.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Forthcoming

    The TypTop System: Personalized Typo-tolerant Password Checking

    Woodage, J., Chatterjee, R., Ristenpart, T., Pnueli, Y. & Chowdhury, A. 8 Sep 2017 ACM CCS 2017.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  8. Forthcoming

    Modular Synthesis of Heap Exploits

    Repel, D., Kinder, J. & Cavallaro, L. 4 Sep 2017 Proc. ACM SIGSAC Workshop on Programming Languages and Analysis for Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    OCPP Protocol: Security Threats and Challenges

    Alcaraz, C., Lopez, J. & Wolthusen, S. 1 Sep 2017 In : IEEE Transactions on Smart Grid. 8, 5, p. 2452-2459 8 p.

    Research output: Contribution to journalArticle

  10. Published

    A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L. Sep 2017 In : IACR Transactions on Symmetric Cryptology. 2017, 3, p. 73-107 35 p.

    Research output: Contribution to journalArticle

  11. Published

    Security and Trust Management - 13th International Workshop, STM 2017, Oslo, Norway, September 14-15, 2017, Proceedings

    Livraga, G. (ed.) & Mitchell, C. J. (ed.) Sep 2017 Berlin: Springer-Verlag. 235 p. (Lecture Notes in Computer Science; vol. 10547)

    Research output: Book/ReportAnthology

  12. Forthcoming

    Sequential binning privacy model for data with prior knowledge of feature dependencies

    Nouretdinov, I., Darwish, S. & Wolthusen, S. Sep 2017 Data Science for Cyber-Security workshop, Sep 25-27 2017

    Research output: Other contribution

  13. Published

    Artificial Ambient Environments for Proximity Critical Applications

    Gurulian, I., Markantonakis, K., Akram, R. & Mayes, K. 29 Aug 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments

    Shepherd, C., Akram, R. & Markantonakis, K. 29 Aug 2017 12th International Conference on Availability, Reliability and Security (ARES '17). ACM, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Provisioning Software with Hardware-Software Binding

    Lee, R., Markantonakis, K. & Akram, R. 29 Aug 2017 FARES '17 Proceedings of the 12th International Workshop on Frontiers in Availability, Reliability and Security. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K. 23 Aug 2017 SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Forthcoming

    Distributed denial of government: the Estonian Data Embassy Initiative

    Robinson, N. & Martin, K. 20 Aug 2017 In : Network Security. p. 13-17 5 p.

    Research output: Contribution to journalSpecial issue

  18. Published

    Transcend: Detecting Concept Drift in Malware Classification Models

    Jordaney, R., Sharad, K., Dash, S., Wang, Z., Papini, D., Nouretdinov, I. & Cavallaro, L. 16 Aug 2017 USENIX Security Symposium. USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Forthcoming

    Large Modulus Ring-LWE >= Module-LWE

    Albrecht, M. & Deo, A. 14 Aug 2017 ASIACRYPT 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Forthcoming

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T. 14 Aug 2017 ASIACRYPT 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Paterson, K., Orsini, E., Smart, N. & Peer, G. 12 Aug 2017 Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Forthcoming

    Security of BLS and BGLS signatures in a multi-user setting

    Lacharite, M-S. 8 Aug 2017 In : Cryptography and Communications.

    Research output: Contribution to journalArticle

  23. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S. 6 Aug 2017 Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446, p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A New Distribution Sensitive Secure Sketch and Popularity Proportional Hashing

    Woodage, J., Chatterjee, R., Dodis, Y., Juels, A. & Ristenpart, T. 2 Aug 2017 CRYPTO 2017: Advances in Cryptology – CRYPTO 2017. Springer, p. 682-710 19 p. (Lecture Notes in Computer Science; vol. 10403)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Forthcoming

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O. 2 Aug 2017 ACM Conference on Computer and Communications Security (CCS). Association for Computing Machinery (ACM), 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    TACTICS: Validation of the security framework developed for tactical SOA

    Gkioulos, V., Risthein, E. & Wolthusen, S. 1 Aug 2017 In : Journal of Information Security and Applications. 35, 8, p. 96-105 10 p.

    Research output: Contribution to journalArticle

  27. Published

    POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection

    Patrick-Evans, J., Cavallaro, L. & Kinder, J. Aug 2017 USENIX Workshop on Offensive Technologies (WOOT). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L. Aug 2017 Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print
  30. Published

    CryptoCache: Network Caching with Confidentiality

    Quaglia, E., Smyth, B., Paschos, G. & Leguay, J. 31 Jul 2017 p. 1-6 6 p.

    Research output: Contribution to conferencePaper

  31. Forthcoming

    Serverless Protocols for Inventory and Tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S. 31 Jul 2017 The 36th IEEE/AIAA Digital Avionics Systems Conference. St. Petersburg, Florida, USA: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Efficient Attack Graph Analysis through Approximate Inference

    Muñoz-González, L., Sgandurra, D., Paudice, A. & Lupu, E. 30 Jul 2017 In : ACM Transactions on Information and System Security. 20, 3, p. 1-30 30 p., 10

    Research output: Contribution to journalArticle

  33. Forthcoming

    New Directions in Secure Branchless Banking

    Quaglia, E. & Heath, C. 28 Jul 2017

    Research output: Contribution to conferencePaper

  34. Published

    An Exploratory Analysis of the Security Risks of the Internet of Things in Finance

    Shepherd, C., Petitcolas, F., Akram, R. & Markantonakis, K. 27 Jul 2017 Trust, Privacy and Security in Digital Business: 14th International Conference, TrustBus 2017, Lyon, France, August 30-31, 2017, Proceedings. Lopez, J., Fischer-Hübner, S. & Lambrinoudakis, C. (eds.). Springer-Verlag, p. 164-179 15 p. (Lecture Notes in Computer Science; vol. 10442)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    VSMURF: A Novel Sliding Window Cleaning Algorithm for RFID Networks

    Xu, H., Shen, W., Li, P., Sgandurra, D. & Wang, R. 27 Jul 2017 In : Journal of Sensors. 2017, p. 1-12 12 p.

    Research output: Contribution to journalArticle

  36. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K. 20 Jul 2017 Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Forthcoming

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J. 19 Jul 2017 Proceedings of ICCST 2017: The 51st International Carnahan Conference on Security Technology, Madrid, Spain, October 23-26, 2017. IEEE Press, 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Forthcoming

    De-Synchronisation Attack Modelling in Real-Time Protocols Using Queue Networks: Attacking the ISO/IEC 61850 Substation Automation Protocol

    Wright, J. & Wolthusen, S. 18 Jul 2017 Proceedings of the 12th International Conference on Critical Information Infrastructures Security (CRITIS 2017). Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Trashing IMSI Catchers in Mobile Networks

    Khan, M. & Mitchell, C. J. 18 Jul 2017 Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2017), Boston, USA, July 18-20, 2017: WiSec '17 . Association for Computing Machinery (ACM), p. 207-218 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    ExpoSE: Practical Symbolic Execution of Standalone JavaScript

    Loring, B., Mitchell, D. & Kinder, J. 13 Jul 2017 SPIN 2017 : Proceedings of the 24th ACM SIGSOFT International SPIN Symposium on Model Checking of Software. ACM, p. 196–199 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Gaming...Seriously?

    Haggman, A. 11 Jul 2017 Information Security Group

    Research output: Other contribution

  42. Published

    Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Cherubin, G. 6 Jul 2017 In : Proceedings on Privacy Enhancing Technologies. 2017, 4, p. 135-151 17 p.

    Research output: Contribution to journalArticle

  43. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S. 5 Jul 2017 Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 12 p. (Advances in Intelligent Systems and Computing; vol. 611)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware

    Hurier, M., Suarez de Tangil Rotaeche, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J. & Cavallaro, L. 3 Jul 2017 Mining Software Repositories (MSR), 2017 IEEE/ACM 14th International Conference on. IEEE, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A. 3 Jul 2017 Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Crypto Wars 2.0: RHUL Students head to the 3rd inter-CDT workshop in Oxford

    Haggman, A. 29 Jun 2017 RHUL Geopolitics and Security

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  47. Published

    Reactive/proactive connectivity management in a tactical service-oriented infrastructure

    Lopes, R. R. F., Nieminen, M., Viidanoja, A. & Wolthusen, S. 26 Jun 2017 Proceedings of the 2017 International Conference on Military Communications and Information Systems (ICMCIS 2017). IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G. 26 Jun 2017 Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355, p. 208-228 21 p. 10355. (Lecture Notes in Computer Science; vol. 10355, no. 1)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Albrecht, M., Aguilar-Melchor, C. & Ricosset, T. 26 Jun 2017 Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355, p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    On the Satisfiability of Workflows with Release Points

    Gutin, G., Crampton, J. & Watrigant, R. 21 Jun 2017 Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Characterising a CPU Fault Attack Model via Run-Time Data Analysis

    Kelly, M., Mayes, K. & Walker, J. F. 19 Jun 2017 6 p.

    Research output: Contribution to conferencePaper

  52. E-pub ahead of print

    Conformal Prediction of Biological Activity of Chemical Compounds

    Toccaceli, P., Nouretdinov, I. & Gammerman, A. 16 Jun 2017 In : Annals of Mathematics and Artificial Intelligence. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  53. E-pub ahead of print

    Tokenisation Blacklisting using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K. 14 Jun 2017 Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Submitted

    Noise Distributions in Homomorphic Ring-LWE

    Murphy, S. & Player, R. 13 Jun 2017

    Research output: Working paper

  55. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S. 10 Jun 2017 Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M. 10 Jun 2017 Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 17 p. (Lecture Notes in Computer Science; vol. 10166)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids

    Wolthusen, S. 10 Jun 2017 Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 52-68 17 p. (Lecture Notes in Computer Science; vol. 10166)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Proximity Assurances Based on Natural and Artificial Ambient Environments

    Gurulian, I., Markantonakis, K., Shepherd, C., Frank, E. & Akram, R. 9 Jun 2017 The 10th International Conference on Innovative Security Solutions for Information Technology and Communications (SECITC '17). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Everyday Cryptography: Fundamental Principles & Applications

    Martin, K. 8 Jun 2017 2nd ed. Oxford University Press. 720 p.

    Research output: Book/ReportBook

  60. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N. 7 Jun 2017 Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Attribute Expressions, Policy Tables and Attribute-Based Access Control

    Crampton, J. & Williams, C. 7 Jun 2017 SACMAT'17 : Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. ACM Press, p. 79-90 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. E-pub ahead of print

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C. 31 May 2017 Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2, p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions

    Crampton, J., Farley, N., Gutin, G., Jones, M. & Poettering, B. 31 May 2017 In : Journal of Computer Security. p. 1-25 25 p.

    Research output: Contribution to journalArticle

  64. Published

    CDT students take on the Cyber 9/12 Challenge in Geneva

    Haggman, A. 30 May 2017 RHUL Geopolitics and Security

    Research output: Contribution to non-peer-reviewed publicationInternet publication

  65. Forthcoming

    Iterative Recovery of Controllability via Maximum Matching

    Zhang, S. & Wolthusen, S. 25 May 2017 p. 328-333 6 p.

    Research output: Contribution to conferencePaper

  66. Published

    Application Development Environments for Java and SIM Toolkit

    Waite, G., Mayes, K. & Akram, R. N. 19 May 2017 Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 253-281 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  67. Published

    Multi-Application Smart Card Platforms and Operating Systems

    Markantonakis, K. & Akram, R. N. 19 May 2017 Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 59-92 34 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  68. Published

    Smart Card Reader and Mobile APIs

    Sauveron, D., Akram, R. N. & Markantonakis, K. 19 May 2017 Smart Cards, Tokens, Security and Applications. Mayes, K. & Markantonakis, K. (eds.). Cham: Springer International Publishing, p. 305-349 45 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  69. Published

    Walking the line: the everyday security ties that bind

    Coles-Kemp, L. & Rydhof Hansen, R. 13 May 2017 Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292, p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. E-pub ahead of print

    Gesture Recognition Implemented on a Personal Limited Device.

    Ducray, B., Cobourne, S., Mayes, K. & Markantonakis, K. 11 May 2017 6 p.

    Research output: Contribution to conferencePaper

  71. Forthcoming

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P. 11 May 2017 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Forthcoming

    Improving reliable probabilistic prediction by using additional knowledge

    Nouretdinov, I. 10 May 2017 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Forthcoming

    Inductive Conformal Martingales for Change-Point Detection

    Volkhonskiy, D., Burnaev, E., Nouretdinov, I., Gammerman, A. & Vovk, V. 10 May 2017 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Forthcoming

    Reverse conformal approach for on-line experimental design

    Nouretdinov, I. 10 May 2017 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Validity and efficiency of conformal anomaly detection on big distributed data

    Nouretdinov, I. 10 May 2017 In : Advances in Science, Technology and Engineering Systems Journal. 2, 3, p. 254-267 14 p.

    Research output: Contribution to journalArticle

  76. Published

    A Smart Micro-Grid Architecture for Resource Constrained Environments

    Kayem, A. V. D. M., Meinel, C. & Wolthusen, S. 8 May 2017 Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Forthcoming

    Security, Privacy and Safety Evaluation of Dynamic and Static Fleets of Drones

    Akram, R. N., Markantonakis, K., Mayes, K., Habachi, O., Sauveron, D., Steyven, A. & Chaumette, S. 1 May 2017

    Research output: Contribution to conferencePaper

  78. Unpublished

    ProVerif Model of the Robust Multiple IMSI Scheme

    Khan, M. May 2017 Supplementary files for paper published in WiSec 2017 .

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  79. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K. 28 Apr 2017 In : Wireless Networks. p. 1-19 19 p.

    Research output: Contribution to journalArticle

  80. Forthcoming

    Measurement Re-Ordering Attacks on Power System State Estimation

    Gul, A. & Wolthusen, S. 28 Apr 2017 Proceedings of the 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT Europe 2017). IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Performance of Authenticated Encryption for Payment Cards with Crypto Co-processors

    Mayes, K. 23 Apr 2017

    Research output: Contribution to conferencePaper

  82. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Laing, T., Chen, L. I. & Martin, K. 20 Apr 2017 Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40 - 57 18 p. (Lecture Notes in Computer Science; vol. 10239)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R. 14 Apr 2017 CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236, p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Private Outsourced Kriging Interpolation

    Alderman, J., Curtis, B., Farràs Ventura, O., Martin, K. & Ribes-González, J. 7 Apr 2017

    Research output: Contribution to conferencePaper

  85. E-pub ahead of print

    Automated Generation of Colluding Apps For Experimental Research

    Blasco Alis, J. & Chen, T. M. 6 Apr 2017 In : Journal of Computer Virology and Hacking Techniques. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  86. Published

    Website fingerprinting defenses at the application layer

    Cherubin, G., Hayes, J. & Juarez, M. 4 Apr 2017 In : Proceedings on Privacy Enhancing Technologies. 2017, 2, p. 186-203 8 p.

    Research output: Contribution to journalArticle

  87. Published

    Towards Trusted Execution of Multi-modal Continuous Authentication Schemes

    Shepherd, C., Akram, R. & Markantonakis, K. 3 Apr 2017 Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C. 2 Apr 2017 SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM, p. 19-26 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Evaluation of Apple iDevice Sensors as a Potential Relay Attack Countermeasure for Apple Pay

    Haken, G., Markantonakis, K., Gurulian, I., Shepherd, C. & Akram, R. 2 Apr 2017 Proceedings of the 3rd ACM International Workshop on Cyber-Physical System Security: CPSS '17. New York: ACM, p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    ASICS: authenticated key exchange security incorporating certification systems

    Boyd, C., Cremers, C., Feltz, M., Paterson, K., Poettering, B. & Stebila, D. 1 Apr 2017 In : International Journal of Information Security. 16, 2, p. 151-171 21 p.

    Research output: Contribution to journalArticle

  91. Published

    On dual lattice attacks against small-secret LWE and parameter choices in HElib and SEAL

    Albrecht, M. 1 Apr 2017 Annual International Conference on the Theory and Applications of Cryptographic Techniques: EUROCRYPT 2017: Advances in Cryptology . Springer, p. 103-129 27 p. (Lecture Notes in Computer Science; vol. 10210)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. E-pub ahead of print

    Analysing and Exploiting the Mantin Biases in RC4

    Bricout, R., Murphy, S., Paterson, K. & Van Der Merwe, T. 28 Mar 2017 In : Designs, Codes and Cryptography. p. 1-28 28 p.

    Research output: Contribution to journalArticle

  93. Forthcoming

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Wang, R. & Sgandurra, D. 27 Mar 2017 In : International Journal of Grid and Utility Computing.

    Research output: Contribution to journalArticle

  94. Published

    Ecosystems of Trusted Execution Environment on Smartphones - A Potentially Bumpy Road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K. 27 Mar 2017 Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware

    Suarez de Tangil Rotaeche, G., Dash, S., Ahmadi, M., Kinder, J., Giacinto, G. & Cavallaro, L. 24 Mar 2017 ACM CODASPY. p. 309-320 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

    Muñoz-González, L., Sgandurra, D., Barrère, M. & Lupu, E. 23 Mar 2017 In : IEEE Transactions on Dependable and Secure Computing. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  97. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Williams, C. & Crampton, J. 22 Mar 2017 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    The bi-objective workflow satisfiability problem and workflow resiliency

    Crampton, J., Gutin, G., Karapetyan, D. & Watrigant, R. 16 Mar 2017 In : Journal of Computer Security. 25, p. 83-115 33 p.

    Research output: Contribution to journalArticle

  99. Forthcoming

    Philanthropy On The Blockchain

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N. & Mayes, K. 8 Mar 2017 The 11th WISTP International Conference on Information Security Theory and Practice (WISTP'2017). Springer, (Lecture Notes in Computer Science (LNCS))

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Preventing Relay Attacks in Mobile Transactions Using Infrared Light

    Gurulian, I., Akram, R., Markantonakis, K. & Mayes, K. 4 Mar 2017 SAC '17: Proceedings of the 32nd Annual ACM Symposium on Applied Computing. ACM, p. 1724-1731 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Stack Bounds Protection with Low Fat Pointers

    Duck, G., Yap, R. & Cavallaro, L. 26 Feb 2017 NDSS Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...17 Next