1. 2019
  2. E-pub ahead of print

    Feistel Structures for MPC, and More

    Albrecht, M., Grassi, L., Perrin, L., Ramacher, S., Rechberger, C., Rotaru, D., Roy, A. & Schofnegger, M., 15 Sep 2019, ESORICS 2019. p. 151-171 21 p. (Lecture Notes in Computer Science ; vol. 11736).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Forthcoming

    OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

    Li, W., Mitchell, C. J. & Chen, T., 2 Sep 2019, (Accepted/In press) Proceedings of the Security Standardisation Research Conference 2019 (SSR 2019, an ACM CCS 2019 Workshop), London, November 11 2019. ACM, 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Structural Controllability Recovery via the Minimum-edge Addition

    Zhang, S. & Wolthusen, S., 29 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  5. Published

    Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking

    Moeckel, C., 26 Aug 2019, Proceedings of the 14th International Conference on Availability, Reliability and Security (ARES '19): 1st International Workshop on Information Security Methodology and Replication Studies (IWSMR 2019). Association for Computing Machinery (ACM), 93

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Location Tracking Using Smartphone Accelerometer and Magnetometer Traces

    Nguyen, D. K. A., Akram, R. N., Markantonakis, K., Luo, Z. & Watkins, C., 26 Aug 2019, The First Location Privacy Workshop (LPW 2019), the 14th International Conference on Availability, Reliability and Security (ARES 2019). Association for Computing Machinery (ACM), p. 1-9 9 p. 96

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On the Efficacy of New Privacy Attacks against 5G AKA

    Khan, H. & Martin, K., 16 Aug 2019, p. 431-438. 8 p.

    Research output: Contribution to conferencePaper

  8. Published

    Driver-Node based Security Analysis for Network Controllability

    Zhang, S. & Wolthusen, S., 15 Aug 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  9. E-pub ahead of print

    Parameterized Resiliency Problems

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 7 Aug 2019, In : Theoretical Computer Science. p. 1-14 14 p.

    Research output: Contribution to journalArticle

  10. E-pub ahead of print

    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

    Inoue, Iwata, Minematsu & Poettering, B., 1 Aug 2019, p. 3-31. 29 p.

    Research output: Contribution to conferencePaper

  11. Published
  12. Published
  13. Forthcoming

    Discretisation and Product Distributions in Ring-LWE

    Murphy, S. & Player, R., 20 Jul 2019, (Accepted/In press).

    Research output: Working paper

  14. E-pub ahead of print

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Berners-Lee, E., 20 Jul 2019, Lecture Notes in Computer Science. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Cyber War, Supply Chains, and Realism in Lithuania

    Agha, D., 17 Jul 2019

    Research output: Other contribution

  16. Published

    A New Approach to Modelling Centralised Reputation Systems

    Garms, L. & Quaglia, E., 29 Jun 2019, p. 429-447. 19 p.

    Research output: Contribution to conferencePaper

  17. Forthcoming

    You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques

    Loe, A. & Quaglia, E., 23 Jun 2019, (Accepted/In press) Proceedings of ACM CCS '19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published
  19. E-pub ahead of print

    A Session Hijacking Attack against a Device-Assisted Physical Layer Key Agreement

    HU, Q., DU, B., Markantonakis, K. & Hancke, G., 19 Jun 2019, In : IEEE Transactions on Industrial Informatics. p. 1-11 11 p.

    Research output: Contribution to journalArticle

  20. Published
  21. Forthcoming

    Exploring Trade-offs in Batch Bounded Distance Decoding

    Albrecht, M., Curtis, B. & Wunderer, T., 17 Jun 2019, (Accepted/In press) SAC 2019. Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Cyber Security for Small Businesses: A Review Of the Advice

    Agha, D., Rowell, J. & Choudhury, R., 13 Jun 2019.

    Research output: Contribution to conferencePoster

  23. Published

    Sound regular expression semantics for dynamic symbolic execution of JavaScript

    Loring, B., Mitchell, D. & Kinder, J., 8 Jun 2019, PLDI'19: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, p. 425-438 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. E-pub ahead of print

    On Deception-Based Protection Against Cryptographic Ransomware

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 6 Jun 2019, DIMVA 2019: 16th Conference on Detection of Intrusions and Malware & Vulnerability Assessment. Springer, p. 219-239 21 p. (Lecture Notes in Computer Science; vol. 11543).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. E-pub ahead of print

    An Evaluation of the Security of the Bitcoin Peer-To-Peer Network

    Tapsell, J., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-6. 6 p.

    Research output: Contribution to conferencePaper

  26. E-pub ahead of print

    E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy

    Hardwick, F. S., Gioulis, A., Akram, R. N. & Markantonakis, K., 3 Jun 2019, p. 1-7. 7 p.

    Research output: Contribution to conferencePaper

  27. Published

    Removing epoxy underfill between neighbouring components using acid for component chip-off

    Heckmann, T., McEvoy, J., Markantonakis, K., Akram, R. N. & Naccache, D., Jun 2019, In : digital investigation. 29, p. 198-209 12 p.

    Research output: Contribution to journalArticle

  28. E-pub ahead of print

    Strong Post-Compromise Secure Proxy Re-Encryption

    Davidson, A., Deo, A., Lee, E. & Martin, K., 30 May 2019, Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings. Jang-Jaccard, J. & Guo, F. (eds.). Springer-Verlag, p. 58-77 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11547 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. E-pub ahead of print

    δ-subgaussian Random Variables in Cryptography

    Murphy, S. & Player, R., 30 May 2019, ACISP 2019 -- The 24th Australasian Conference on Information Security and Privacy. Springer, p. 251-268 18 p. (LNCS; vol. 11547).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Bounded and Approximate Strong Satisfiability in Workflows

    Crampton, J., Gutin, G. & Majumdar, D., 28 May 2019, Proceedings of ACM SACMAT 2019. ACM, p. 179-184 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. E-pub ahead of print

    Functional repair codes: a view from projective geometry

    Ng, S. & Paterson, M., 27 May 2019, In : Designs, Codes and Cryptography. p. 1-22 22 p.

    Research output: Contribution to journalArticle

  32. Published
  33. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Ensuring Secure Application Execution and Platform Specific Execution in Embedded Devices

    Lee, R., Markantonakis, K. & Akram, R. N., 7 May 2019, In : ACM Transactions on Embedded Computing Systems. 18, 3, p. 1-21 21 p., 26.

    Research output: Contribution to journalArticle

  35. Unpublished
  36. Published

    Accessing a New Land: Designing for a Social Conceptualisation of Access

    Coles-Kemp, L. & Jensen, R. B., 2 May 2019, ACM CHI Conference on Human Factors in Computing Systems: CHI'19. ACM, p. 1-12 12 p. 181

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    Teaching as a Collaborative Practice: Reframing Security Practitioners as Navigators

    Williams, P. & Coles-Kemp, L., 27 Apr 2019, Transactions on Edutainment . Pan, Z. (ed.). Springer, Vol. XV. p. 108-128 21 p. (Lecture Notes in Computer Science; vol. XV).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  39. E-pub ahead of print

    An Analysis of NIST SP 800-90A

    Woodage, J. & Shumow, D., 24 Apr 2019, Advances in Cryptology - EUROCRYPT 2019. Ishai, Y. & Rijmen, V. (eds.). p. 151-180 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  40. E-pub ahead of print

    The General Sieve Kernel and New Records in Lattice Reduction

    Albrecht, M., Ducas, L., Herold, G., Kirshanova, E., Postlethwaite, E. & Stevens, M., 24 Apr 2019, EUROCRYPT 2019. p. 717-746 30 p. (Lecture Notes in Computer Science; vol. 11477).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. E-pub ahead of print

    Factoring Products of Braids via Garside Normal Form

    Merz, S-P. & Petit, C., 6 Apr 2019, p. 646-678. 33 p.

    Research output: Contribution to conferencePaper

  42. E-pub ahead of print

    Group Signatures with Selective Linkability

    Garms, L. & Lehmann, A., 6 Apr 2019, 22nd International Conference on Practice and Theory of Public Key Cryptography. p. 190-220 31 p. (Lecture Notes in Computer Science; vol. 11442).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. E-pub ahead of print

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    The Estonian Data Embassy and the Applicability of the Vienna Convention: An Exploratory Analysis

    Robinson, N., Kask, L. & Krimmer, R., 3 Apr 2019, p. 391-396. 6 p.

    Research output: Contribution to conferencePaper

  45. Unpublished

    Cold Boot Attacks on Post-Quantum Schemes

    Villanueva Polanco, R., 8 Mar 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  46. Published

    libInterMAC: Beyond Confidentiality and Integrity in Practice

    Albrecht, M., Hansen, T. & Paterson, K., 8 Mar 2019, In : IACR Transactions on Symmetric Cryptology. 2019, 1, p. 46-83 38 p.

    Research output: Contribution to journalArticle

  47. Published

    Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

    Ankele, R., Dobraunig, C., Guo, J., Lambooij, E., Leander, G. & Todo, Y., 8 Mar 2019, IACR Transactions on Symmetric Cryptology. 1 ed. Paris, France: Ruhr-Universität Bochum, Vol. 2019. p. 192-235 44 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Majority vote ensembles of conformal predictors

    Cherubin, G., Mar 2019, In : Machine Learning. 108, 3, p. 475–488 14 p.

    Research output: Contribution to journalArticle

  49. Published

    Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things

    Darwish, S., Nouretdinov, I. & Wolthusen, S., Mar 2019, Security and Privacy Trends in the Industrial Internet of Things. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  50. Published

    Security issues in a group key establishment protocol

    Mitchell, C. J., Mar 2019, In : The Computer Journal. 62, 3, p. 373-376 4 p.

    Research output: Contribution to journalArticle

  51. Unpublished

    Randomness in Cryptography: Theory Meets Practice

    Hutchinson, D., 23 Feb 2019, (Unpublished) 174 p.

    Research output: ThesisDoctoral Thesis

  52. Published

    Not-equal: Democratizing research in digital innovation for social justice

    Crivellaro, C., Coles-Kemp, L., Dix, A. & Light, A., 22 Feb 2019, In : Interactions. 26, 2, p. 70-73 4 p.

    Research output: Contribution to journalArticle

  53. E-pub ahead of print

    Lossy Trapdoor Permutations with Improved Lossiness

    Auerbach, B., Kiltz, E., Poettering, B. & Schoenen, S., 3 Feb 2019, p. 230-250. 21 p.

    Research output: Contribution to conferencePaper

  54. E-pub ahead of print

    Novel implementation of defence strategy of relay attack based on cloud in RFID systems

    Xu, H., Shen, W., Li, P., Mayes, K., Wang, R., Li, D. & Yang, S., 30 Jan 2019, In : International Journal of Information and Computer Security. 11, 2, p. 120-144 25 p.

    Research output: Contribution to journalArticle

  55. E-pub ahead of print

    Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

    Ankele, R. & Kölbl, S., 13 Jan 2019, Selected Areas in Cryptography 2018. Lecture Notes in Computer Science ed. Calgary, Canada: Springer, Vol. 11349. p. 163-190 28 p. (Lecture Notes in Computer Science; vol. 11349).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Documenting Greenland: Popular Geopolitics on Film

    Dodds, K-J. & Jensen, R. B., 4 Jan 2019, Arctic Cinemas and the Documentary Ethos. Kaganovsky, L., MacKenzie, S. & Westerstahl Stenport, A. (eds.). Bloomington: University of Indiana Press, 29 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  57. Submitted

    A Central Limit Framework for Ring-LWE Decryption

    Murphy, S. & Player, R., 2019, (Submitted).

    Research output: Working paper

  58. Forthcoming

    A critique of game-based definitions of receipt-freeness for voting

    Fraser, A., Quaglia, E. & Smyth, B., 2019, (Accepted/In press).

    Research output: Contribution to conferencePaper

  59. Published

    Analogue

    Squire, R., Searles-Adey, P. & Jensen, R. B., 2019, Society and Space

    Research output: Other contribution

  60. Unpublished

    Analysis and Manipulation of Android Apps and Malware in Real-Time

    Khan, S., 2019, (Unpublished) 205 p.

    Research output: ThesisDoctoral Thesis

  61. Unpublished

    Black-box Security: Measuring Black-box Information Leakage via Machine Learning

    Cherubin, G., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  62. Unpublished
  63. Unpublished

    Generic Access Control of Cloud Storage Using Attribute-Based Cryptography

    Xu, Z., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  64. Unpublished

    Language in the Age of Algorithmic Reproduction: A Critique of Linguistic Capitalism

    Thornton, P., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  65. Unpublished

    Machine Learning Techniques for Evolving Threats

    Jordaney, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  66. Published

    Making Digital Technology Research Human: Learning from Clowning as a Social Research Intervention

    Coles-Kemp, L. & Stang, F., 2019, In : Rivista Italiana di Studi sull’Umorismo (RISU). 2, 1, p. 35-45 11 p.

    Research output: Contribution to journalArticle

  67. Unpublished

    On Enhancing the Security of Time Constrained Mobile Contactless Transactions

    Gurulian, I., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  68. Unpublished

    Schemes and Applications for Binding Hardware and Software in Computing Devices

    Lee, R., 2019, (Unpublished)

    Research output: ThesisDoctoral Thesis

  69. Published

    Some singular value inequalities via convexity

    Leka, Z., 2019, In : Linear and Multilinear Algebra. 67, 2, p. 360-369 10 p.

    Research output: Contribution to journalArticle

  70. Unpublished
  71. Unpublished

    THE CYBER SECURITY DILEMMA AND THE SECURITISATION OF CYBERSPACE

    Hersee, S., 2019, (Unpublished) 348 p.

    Research output: ThesisDoctoral Thesis

  72. Unpublished

    The Detection Of Malicious Activities Within A Robotic Swarm

    Sargeant, I., 2019, (Unpublished) 238 p.

    Research output: ThesisDoctoral Thesis

  73. Published

    Towards A Better Understanding of Browser Fingerprinting

    Al-Fannah, N. M., 2019

    Research output: ThesisDoctoral Thesis

  74. Published

    Web Password Recovery: A Necessary Evil?

    Al Maqbali, F. & Mitchell, C. J., 2019, Proceedings of the Future Technology Conference (FTC) 2018, Volume 2: Vancouver, November 2018. Springer-Verlag, p. 324-341 18 p. (Advances in Intelligent Systems and Computing; vol. 881).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. 2018
  76. E-pub ahead of print

    Efficient Analysis to Protect Control into Critical Infrastructures

    Zhang, S. & Wolthusen, S., 30 Dec 2018, p. 226-229. 4 p.

    Research output: Contribution to conferencePaper

  77. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Your Code Is My Code: Exploiting a Common Weakness in OAuth 2.0 Implementations

    Li, W., Mitchell, C. J. & Chen, T., 22 Dec 2018, Security Protocols XXVI: 26th International Workshop, Cambridge, UK, March 19–21, 2018, Revised Selected Papers. Matyáš, V., Švenda, P., Stajano, F., Christianson, B. & Anderson, J. (eds.). Springer, p. 24-41 18 p. (Lecture Notes in Computer Science; vol. 11286).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. E-pub ahead of print

    Stealthy Injection Attacks Against IEC61850’s GOOSE Messaging Service

    Wright, J. & Wolthusen, S., 13 Dec 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print
  84. E-pub ahead of print

    The Authorization Policy Existence Problem

    Berge, P., Crampton, J., Gutin, G. & Watrigant, R., 28 Nov 2018, In : IEEE Transactions on Dependable and Secure Computing. p. 1-12 12 p.

    Research output: Contribution to journalArticle

  85. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Dome, sweet home: climate shelters past, present and future

    Squire, R., Searles-Adey, P. & Jensen, R. B., 23 Nov 2018, Nature.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  88. E-pub ahead of print

    Identity Confidentiality in 5G Mobile Telephony Systems

    Khan, H., Dowling, B. & Martin, K., 21 Nov 2018, Security Standardisation Research: 4th International Conference, SSR 2018. Cremer, C. & Lehmann, A. (eds.). Switzerland: Springer, [Cham], p. 120-142 23 p. (Lecture Notes in Computer Science; vol. 11322).

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  89. Forthcoming

    On Key Assignment Schemes and Cryptographic Enforcement Mechanisms for Information Flow Policies

    Farley, N., 12 Nov 2018, (Accepted/In press) 187 p.

    Research output: ThesisDoctoral Thesis

  90. Forthcoming

    Deep Learning Application in Security and Privacy - Theory and Practice: A Position Paper

    Meister, J. A., Akram, R. N. & Markantonakis, K., 7 Nov 2018, (Accepted/In press) The 12th WISTP International Conference on Information Security Theory and Practice (WISTP'2018). Blazy, O. & Yeun, C. Y. (eds.). Brussels, Belgium: Springer-Verlag, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Mitigating CSRF attacks on OAuth 2.0 systems

    Li, W., Mitchell, C. J. & Chen, T. M., 1 Nov 2018, Proceedings of 2018 16th Annual Conference on Privacy, Security and Trust (PST): 28-30 Aug 2018. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. In preparation
  93. Published

    Can We Reduce the Duration of Untreated Psychosis? A Systematic Review and Meta-Analysis of Controlled Interventional Studies

    Oliver, D., Davies, C., Crossland, G., Lim, S., Gifford, G., McGuire, P. & Fusar-Poli, P., Nov 2018, In : Schizophrenia bulletin. 44, 6, p. 1362–1372 11 p.

    Research output: Contribution to journalArticle

  94. Published

    Host mobility key management in dynamic secure group communication

    Daghighi, B., Mat Kiah, M. L., Iqbal, S., Habib Ur Rehman, M. & Martin, K., Nov 2018, In : Wireless Networks. 24, 8, p. 3009–3027 19 p.

    Research output: Contribution to journalArticle

  95. Published

    Coming of Age: A Longitudinal Study of TLS Deployment

    Kotzias, P., Razaghpanah, A., Amann, J., Paterson, K. G., Vallina-Rodriguez, N. & Caballero, J., 31 Oct 2018, Proceedings of the Internet Measurement Conference 2018, IMC 2018, Boston, MA, USA, October 31 - November 02, 2018. p. 415-428 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Forthcoming

    Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks

    Grubbs, P., Lacharite, M-S., Minaud, B. & Paterson, K., 31 Oct 2018, (Accepted/In press) IEEE Security & Privacy . IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingChapter

  97. E-pub ahead of print

    Cryptanalysis of MORUS

    Ashur, T., Eichlseder, M., Lauridsen, M., Leurent, G., Minaud, B., Rotella, Y., Sasaki, Y. & Viguier, B., 27 Oct 2018, p. 35-64. 30 p.

    Research output: Contribution to conferencePaper

  98. Published
  99. Published

    Implementing RLWE-based Schemes Using an RSA Co-Processor

    Albrecht, M., Hanser, C., Hoeller, A., Pöppelmann, T., Virdia, F. & Wallner, A., 14 Oct 2018, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES). Ruhr University of Bochum, Vol. 2019, Issue 1.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  100. Published

    Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance

    Davidson, A., Katsumata, S., Nishimaki, R. & Yamada, S., 12 Oct 2018, In : IACR Cryptology ePrint Archive. 2018, 982, p. 1-28 28 p.

    Research output: Contribution to journalArticle

  101. Published

    Enabling Fair ML Evaluations for Security

    Pendlebury, F., Pierazzi, F., Jordaney, R., Kinder, J. & Cavallaro, L., 8 Oct 2018, p. 2264-2266. 3 p.

    Research output: Contribution to conferencePoster

  102. Published

    Prime and Prejudice: Primality Testing Under Adversarial Conditions

    Albrecht, M., Massimo, J., Paterson, K. & Somorovsky, J., 8 Oct 2018, 25th ACM Conference on Computer and Communications Security 2018. p. 281-298 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1 2 3 4 5 6 7 8 ...19 Next