Home > Publications

Publications

37526 - 37550 out of 41,084Page size: 25
  1. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  2. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  3. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An Atlas of Industrial Protest in Britain, 1750–1990

    Charlesworth, A. (ed.), Gilbert, D. (ed.), Randall, A. (ed.), Southall, H. (ed.) & Wrigley, C. (ed.), 24 Jan 1996, Palgrave Macmillan. 256 p.

    Research output: Book/ReportBook

  5. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An assessment of the tsunami risk in Muscat and Salalah, Oman, based on estimations of probable maximum loss

    Browning, J. & Thomas, N., 1 Jun 2016, In: International Journal of Disaster Risk Reduction. 16, p. 75-87 14 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    An assessment of the long-term preservation of the DNA of a bacterial pathogen in ethanol-preserved archival material

    Barnes, I., Holton, J., Vaira, D., Spigelman, M. & Thomas, M. G., Dec 2000, In: JOURNAL OF PATHOLOGY. 192, 4, p. 554-559 6 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    An assessment of mass discrimination in MC-ICPMS using Nd isotopes

    Vance, D. & Thirlwall, M., 1 May 2002, In: Chemical Geology. 185, 3-4, p. 227-240 14 p.

    Research output: Contribution to journalArticlepeer-review

  9. Unpublished
  10. Published

    An ash cloud, airspace and environmental threat

    Adey, P., Anderson, B. & Guerrero, L. L., 1 Jul 2011, In: Transactions of the Institute of British Geographers. 36, 3, p. 338-343 6 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    An Artist’s Approach to the Modular Synthesizer in Experimental Electronic Music Composition and Performance

    Bruno, C., Feb 2016, In: eContact!. 17, 4

    Research output: Contribution to journalSpecial issuepeer-review

  12. Published

    An Art of the Ugly in Schelling’s Philosophie der Kunst: Questions concerning the ‘umgekehrt Symbolische’ of §103

    Whistler, D., 25 Nov 2019, In: Schelling-Studien. 7, p. 199-213 15 p.

    Research output: Contribution to journalArticlepeer-review

  13. Published

    An Argumentative Model for Service-oriented Agents

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P. & Stathis, K., 1 Mar 2008, Proc. of the International Symposium on Architectures for Intelligent Theory-Based Agents. Balduccini, M. & Baral, C. (eds.). p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    An Architectural Support for Self-Adaptive Software for Treating Faults

    De Lemos, R. & Fiadeiro, J. L., 1 Jan 2002, Proceedings of the first ACM SIGSOFT Workshop on Self-Healing Systems (WOSS'02). p. 39-42 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  17. Published

    An architectural approach to mobility - The handover case study

    Oliveira, C., Wermelinger, M., Fiadeiro, J. L. & Lopes, A., 1 Jan 2004, Proceedings - Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004). p. 305-308 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  18. Published

    An Arbitrary Line

    Cave, S., 30 Nov 2018, Broken Sleep Books. 98 p.

    Research output: Book/ReportBook

  19. Published

    An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462

    Research output: Contribution to journalArticlepeer-review

  20. Published

    An approximate algorithm for combinatorial optimization problems with two parameters

    Blokh, D. & Gutin, G., 1996, In: Australasian Journal of Combinatorics. 14, p. 157-164

    Research output: Contribution to journalArticlepeer-review

  21. Published

    An approach to early evaluation of informational privacy requirements

    Barn, B. S., Primiero, G. & Barn, R., 13 Apr 2015, p. 1370-1375. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  22. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  23. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  24. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  25. Published

    An Application of Univariate and Multivariate Approaches in fMRI to Quantifying the Hemispheric Lateralization of Acoustic and Linguistic Processes

    McGettigan, C., Evans, S., Rosen, S., Agnew, Z. K., Shah, P. & Scott, S. K., Mar 2012, In: Journal of Cognitive Neuroscience. 24, 3, p. 636-652 17 p.

    Research output: Contribution to journalArticlepeer-review