Home > Publications

Publications

37651 - 37675 out of 39,872Page size: 25
  1. Published

    Truncated Stochastic Approximation with Moving Bounds: Convergence

    Sharia, T., Jul 2014, In: Statistical Inference for Stochastic Processes. 17, p. 163-179 17 p.

    Research output: Contribution to journalArticlepeer-review

  2. Unpublished

    Truncated Stochastic Approximation with Moving Bounds

    Zhong, L., 2015, (Unpublished) 139 p.

    Research output: ThesisDoctoral Thesis

  3. Published

    Truncation attacks on MACs

    Mitchell, C. J., Jun 2003, In: Electronics Letters. 39, 20, p. 1439-1440 2 p.

    Research output: Contribution to journalArticlepeer-review

  4. Published

    Trust Accounting?

    Froud, J., Haslam, C., Johal, S., Shaoul, J. & Williams, K., 1996.

    Research output: Working paper

  5. Published

    Trust and conflict within virtual inter-organizational alliances: a framework for facilitating knowledge sharing

    Panteli, N. & Sockalingam, S., Jun 2005, In: Decision Support Systems. 39, 4, p. 599-617 19 p.

    Research output: Contribution to journalArticlepeer-review

  6. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. In preparation

    Trust and Reconciliation

    Nettelfield, L., 2015, (In preparation) Peace Works. United States Institute for Peace

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

  8. Published

    Trust and temporary virtual teams: Alternative explanations and dramaturgical relationships

    Panteli, N. & Duncan, E., 1 Dec 2004, In: Information Technology & People. 17, 4, p. 423-441 19 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Trust in me: Trustworthy others are seen as more physically similar to the self

    Farmer, H., McKay, R. & Tsakiris, M., 2014, In: Psychological Science. 25, 1, p. 290–292 3 p.

    Research output: Contribution to journalArticlepeer-review

  10. Published

    Trust in me: Allegiance choices in a post-split terrorist movement

    Morrison, J., 2016, In: Aggression and Violent Behavior. 28, p. 47-56 10 p.

    Research output: Contribution to journalArticlepeer-review

  11. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Published
  13. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK general election

    Ampofo, L., Anstead, N. & O'Loughlin, B., 2011, In: Information, Communication and Society.

    Research output: Contribution to journalArticlepeer-review

  16. Forthcoming

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK General Election

    O'Loughlin, B. & Anstead, N., 2012, (Accepted/In press) Social Media and Democracy: Innovations in Participatory Politics. Loader, B. & Mercea, D. (eds.). Abingdon and New York: Routledge, p. 91 108 p. (Routledge research in political communication).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  18. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  20. Published

    Trusted Computing: Providing security for Peer-to-Peer Networks

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Proc. Fifth International Conference on Peer-to-Peer Computing. Caronni, G. (ed.). IEEE Computer Society Press, p. 117-124 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

  22. Published

    Trusted markets: the exchanges of Islamic companies

    Özcan, G. & Çokgezen, M., 2006, In: Comparative Economic Studies. 48, 1, p. 132-155

    Research output: Contribution to journalArticlepeer-review

  23. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology