Home > Publications

Publications

37701 - 37725 out of 39,916Page size: 25
  1. Published

    Trust Management For Secure Information Flows

    Srivatsa, M., Balfe, S., Paterson, K. G. & Rohatgi, P., 2008, Proceedings of the 2008 ACM Conference on Computer and Communications Security (CCS 2008). Ning, P., Syverson, P. F. & Jha, S. (eds.). ACM Press, p. 175-188 14 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. Published
  3. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK general election

    Ampofo, L., Anstead, N. & O'Loughlin, B., 2011, In: Information, Communication and Society.

    Research output: Contribution to journalArticlepeer-review

  6. Forthcoming

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK General Election

    O'Loughlin, B. & Anstead, N., 2012, (Accepted/In press) Social Media and Democracy: Innovations in Participatory Politics. Loader, B. & Mercea, D. (eds.). Abingdon and New York: Routledge, p. 91 108 p. (Routledge research in political communication).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  8. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  10. Published

    Trusted Computing: Providing security for Peer-to-Peer Networks

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Proc. Fifth International Conference on Peer-to-Peer Computing. Caronni, G. (ed.). IEEE Computer Society Press, p. 117-124 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    Trusted markets: the exchanges of Islamic companies

    Özcan, G. & Çokgezen, M., 2006, In: Comparative Economic Studies. 48, 1, p. 132-155

    Research output: Contribution to journalArticlepeer-review

  13. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Trusted Systems: 4th International Conference, InTrust 2012, London, UK, December 17-18, 2012, Proceedings

    Mitchell, C. J. (ed.) & Tomlinson, A. (ed.), 12 Dec 2012, Springer-Verlag. 117 p. (Lecture Notes in Computer Science; no. 7711)

    Research output: Book/ReportAnthology

  16. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Trusted Virtual Disk Images

    Gebhardt, C. & Tomlinson, A., 1 Jul 2009, Future of Trust in Computing. Vieweg and Teubner, p. 197-207 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)

  18. Published

    Truth and death in Iraq under sanctions

    Spagat, M., Sep 2010, In: Significance. 7, 3, p. 116-120 5 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    Truth and deception in Athenian Forensic Narratives: An Assessment of Demosthenes 54 and Lysias 3

    Kremmydas, C., 21 Aug 2019, Forensic Narratives in Athenian Courts. Edwards, M. & Spatharas, D. (eds.). Routledge, p. 211-229 19 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  20. Published

    Truth, Aesthetics, History

    Eaglestone, R., 2005, Critical Pasts: writing criticism, writing history. Smallwood, P. (ed.). Lewisburg: Bucknell University Press / Associated University Presses, p. 171-186

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. Published

    Truth, Language and Art: Benjamin, Davidson and Heidegger

    Bowie, A., Missing, B. (ed.) & Missing, P. (ed.), 1994, Walter Benjamin in the Post-Modern.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  22. Unpublished
  23. Published

    TSP tour domination and Hamilton cycle decompositions of regular digraphs.

    Gutin, G. & Yeo, A., 2001, In: Operations Research Letters. 28, 3, p. 107-111

    Research output: Contribution to journalArticlepeer-review

  24. Published

    Tsunami modeling of a submarine landslide in the Fram Strait

    Berndt, C., Brune, S., Nisbet, E., Zschau, J. & Sobolev, S. V., 9 Apr 2009, In: Geochemistry, Geophysics, Geosystems. 10, 9 p.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    Tudor Queenship: The reigns of Mary and Elizabeth

    Whitelock, A. (ed.) & Hunt, A. (ed.), 2010, Palgrave Macmillan.

    Research output: Book/ReportBook