Home > Publications

Publications

39051 - 39075 out of 42,938Page size: 25
  1. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 13 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 2601-2617 17 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Published

    An In-Depth Symbolic Security Analysis of the ACME Standard

    Bhargavan, K., Bichhawat, A., Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G. & Würtele, T., 29 Oct 2021, In: IACR Cryptology ePrint Archive.

    Research output: Contribution to journalArticle

  3. Published

    An in vivo model for analysis of developmental erythropoiesis and globin gene regulation

    McColl, B. & Kao, B., 1 May 2014, In: The FASEB journal : official publication of the Federation of American Societies for Experimental Biology. 28, 5

    Research output: Contribution to journalArticlepeer-review

  4. E-pub ahead of print

    An Improved SMURF Scheme for Cleaning RFID Data

    Xu, H., Ding, J., Li, P., Sgandurra, D. & Wang, R., 1 May 2018, (E-pub ahead of print) In: International Journal of Grid and Utility Computing. 9, 2, p. 170-178 9 p.

    Research output: Contribution to journalArticlepeer-review

  5. Published

    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data

    Swift, S., Tucker, A., Crampton, J. & Garway-Heath, D., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 2174-2181 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    An Implementation of LF with Coercive Subtyping and Universes.

    Callaghan, P. & Luo, Z., 2001, In: Journal of Automated Reasoning. 27, 1, p. 3-27 25 p.

    Research output: Contribution to journalArticlepeer-review

  7. Published

    An implementation attack against the EPOC-2 public-key cryptosystem

    Dent, A. W., 2002, In: Electronics Letters. 39, 9, p. 412-413 2 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    An imbalance between excitatory and inhibitory neurotransmitters in amyotrophic lateral sclerosis revealed by use of 3-T proton magnetic resonance spectroscopy

    Foerster, B. R., Pomper, M. G., Callaghan, B. C., Petrou, M., Edden, R. A. E., Mohamed, M. A., Welsh, R. C., Carlos, R. C., Barker, P. B. & Feldman, E. L., 1 Aug 2013, In: JAMA neurology. 70, 8, p. 1009-16 8 p.

    Research output: Contribution to journalArticlepeer-review

  9. Published

    An Identity for Kernel Ridge Regression

    Zhdanov, F. & Kalnishkan, Y., 2010, Learning Theory 21st International Conference, ALT 2010, Proceedings: volume 6331 of Lecture Notes in Computer Science. Springer, p. 405-419 (Lecture Notes in Computer Science; vol. 6331).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    An identity for kernel ridge regression

    Zhdanov, F. & Kalnishkan, Y., 18 Feb 2013, In: Theoretical Computer Science. 473, p. 157-178

    Research output: Contribution to journalArticlepeer-review

  11. Published

    An identity based routing path verification scheme for wireless sensor networks

    Khan, H., 2018, In: International Journal of Sensor Networks. 26, 1, p. 54-68 15 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    An hypothetical reconstruction: the Olympias trireme

    Rankov, B., 2008, Historical Boat and Ship Replicas. Conference Proceedings on the Scientific Perspectives and the Limits of Boat and Ship Replicas, Torgelow 2007. Springmann, M-J. & Wernicke, H. (eds.). p. 129-33

    Research output: Chapter in Book/Report/Conference proceedingChapter

  13. Unpublished
  14. Published

    An Historical Comparison of Religious Revival

    Halperin, S., Jun 2018, In: International Studies Review. 20, 2, p. 204-213 10 p.

    Research output: Contribution to journalArticlepeer-review

  15. Published

    An fMRI study of parietal cortex involvement in the visual guidance of locomotion

    Billington, J., Field, D. T., Wilkie, R. M. & Wann, J. P., Dec 2010, In: Journal of Experimental Psychology: Human Perception and Performance. 36, 6, p. 1495-1507 12 p.

    Research output: Contribution to journalArticlepeer-review

  16. Published

    An fMRI Investigation of Preparatory Set in the Human Cerebral Cortex and Superior Colliculus for Pro- and Anti-Saccades

    Furlan, M., Smith, A. T. & Walker, R., 8 Jul 2016, In: PLoS ONE. 11, 7, p. 1-25 25 p., e0158337.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    An eye for design

    Holmes, T., Jan 2011, CS4FN: Computer Science for Fun, 12, p. 14 2 p.

    Research output: Contribution to non-peer-reviewed publicationNewspaper article

  18. Published

    An extensive analysis of disease-gene associations using network integration and fast kernel-based gene prioritization methods

    Valentini, G., Paccanaro, A., Caniza, H., Romero, A. E. & Re, M., Jun 2014, In: Artificial Intelligence in Medicine. 61, 2, p. 63-78 16 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    An extensible, self contained, layered approach to context acquisition

    Kramer, D., Kocurova, A., Oussena, S., Clark, T. & Komisarczuk, P., 2011, Proceedings of the Third International Workshop on Middleware for Pervasive Mobile and Embedded Computing. p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Unpublished

    An Extended Calculus of Constructions

    Luo, Z., 1990, (Unpublished) Univ of Edinburgh.

    Research output: ThesisDoctoral Thesis

  21. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 7 Mar 2014, In: ArXiv.org.

    Research output: Contribution to journalArticle

  22. An Expressive Model for the Web Infrastructure: Definition and Application to the BrowserID SSO System

    Fett, D., Küsters, R. & Schmitz, G., 13 Nov 2014, Proceedings - IEEE Symposium on Security and Privacy. Institute of Electrical and Electronics Engineers Inc., p. 673-688 16 p. 6956594. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. An Exploratory Study to Examine Big Data Application on Services and SCM

    Shah, S. & Theodosoulaki, A., 15 Apr 2019, 2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018. Institute of Electrical and Electronics Engineers Inc., p. 155-159 5 p. 8691279. (2018 IEEE International Conference on Technology Management, Operations and Decisions, ICTMOD 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    An exploratory study of the upper middle-class consumer attitudes towards counterfeiting in China

    Priporas, C., Chen, Y., Zhao, S. & Tan, H., Mar 2020, In: Journal of Retailing and Consumer Services. 53, p. 1-8 8 p., 101959.

    Research output: Contribution to journalArticlepeer-review

  25. Published

    An exploratory study investigating new ways of increasing the numbers of young men with depression who access primary care services.

    Luzon, O., Pilling, S., Leibowitz, J., Cape, J. & Tylee, A., 2004, In: Psychology and Health. 19, Supp 1, p. 107 108 p.

    Research output: Contribution to journalArticlepeer-review