Home > Publications

Publications

36701 - 36800 out of 41,090Page size: 100
  1. Conference contribution › Research
  2. Published

    Dynamic capabilities for sustainability

    Preuss, L. & Dyerson, R., Jul 2012, 11th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Dynamic data integration using web services

    Zhu, F., Turner, M., Kotsiopoulos, I., Bennett, K., Russell, M., Budgen, D., Brereton, P., Keane, J., Layzell, P., Rigby, M. & Xu, J., 2004, IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 262-269 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Dynamic Forced Partitioning of Robust Hierarchical State Estimators for Power Networks

    Baiocco, A. & Wolthusen, S. D., 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Dynamic Linkages between the European and US stock markets”

    Xiao, L. & Dhesi, G., 4 Nov 2010, Proceedings of the 3rd BIFE Conference IEEE Computer Society, City University of Hong Kong.. IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Dynamic Multirole Session Types

    Denielou, P-M. & Yoshida, N., 2011, POPL 11: PROCEEDINGS OF THE 38TH ANNUAL ACM SIGPLAN-SIGACT SYMPOSIUM ON PRINCIPLES OF PROGRAMMING LANGUAGES. NEW YORK: ACM, p. 435-446 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Dynamic Parameter Reconnaissance for Stealthy DoS Attack within Cloud Systems

    Alarifi, S. & Wolthusen, S. D., 2014, Proceedings of the 15th Joint IFIP TC6/TC11 Conference on Communications and Multimedia Security (CMS 2014). Springer-Verlag, p. 73 85 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Dynamic pricing and benchmarking in AirBnB

    Sims, J., Ameen, N. & Bauer, R., 2019, UK Academy of Information Systems (UKAIS). p. 1-29 29 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Dynamic Programming on Nominal Graphs

    Hoch, N., Montanari, U. & Sammartino, M., 2015, Proceedings Graphs as Models. Rensink, A. & Zambon, E. (eds.). Electronic Proceedings in Theoretical Computer Science, Vol. 181. p. 80-96 17 p. (EPTCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Dynamics, robustness and fragility of trust

    Pavlovic, D., 2008, Proceedings of FAST 2008. Degano, P., Guttman, J. & Martinelli, F. (eds.). Springer-Verlag, Vol. 5491. p. 97-113 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Earthquake focal mechanisms and recent faulting: a seismotectonic analysis in the Vordufell area, South Iceland Seismic Zone

    Angelier, J., Rognvaldsson, S., Bergerat, F., Gudmundsson, A., Jakobsdottir, S. & Stefansson, R., 1996, Seismology in Europe. Thorkelsson, B. (ed.). Reykjavik: Iceland Meteorological Office, Reykjavik, p. 199-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Easy Impossibility Proofs for k-Set Agreement in Message Passing Systems

    Biely, M., Robinson, P. & Schmid, U., 2011, Principles of Distributed Systems - 15th International Conference, OPODIS 2011, Toulouse, France, December 13-16, 2011. Proceedings. p. 299-312 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Eavesdropping Attacks on High-Frequency RFID Tokens

    Hancke, G. P., 1 Jul 2008, Workshop on RFID Security -- RFIDSec'08. Budapest, Hungary, 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    ECC, an Extended Calculus of Constructions

    Luo, Z., 1 Jun 1989, Logics in Computer Science (LICS 1989).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Ecological Studies on two Carbonate Sediment-Producing Algae

    Bosence, D., 1977, Fossil Algae. Flügel, E. (ed.). Springer Berlin / Heidelberg, p. 270-278 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Ecological Succession from Corals to Coralline Algae in Eocene Patch Reefs, Northern Spain

    Taberner, C. & Bosence, D., 1985, Paleoalgology: Contemporary Research and Applications. Toomey, D. F. & Nitecki, M. H. (eds.). Springer Berlin / Heidelberg, p. 226-236 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    E-commerce and the media - Influences on security risk perceptions

    Jarupunphol, P. & Mitchell, C. J., 2002, Internet Technologies, Applications and Societal Impact, The 1st IFIP Workshop on Internet Technologies, Applications and Societal Impact, WITASI '02, Wroclaw, Poland, October 2002. Cellary, W. & Iyengar, A. (eds.). Kluwer Academic Publishers, p. 163-173 11 p. (IFIP Conference Proceedings; no. 232).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Ecosystems of Trusted Execution Environment on smartphones - a potentially bumpy road

    Umar, A., Akram, R. N., Mayes, K. & Markantonakis, K., 27 Mar 2017, Mobile and Secure Services (MobiSecServ), 2017 Third International Conference on. Urien, P. & Piramuthu, S. (eds.). IEEE, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Forthcoming

    Ecrire, trobar: le troubadour entre création et représentation

    Harvey, R., 2015, (Accepted/In press) L’Italie et les troubadours (XIIIe-XVe siècles). Paris: Classiques Garnier

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Effect of rerouting on NGN VoIP Quality

    Komisarczuk, P. & Koudrin, A., 2007, Telecommunication Networks and Applications Conference, 2007. ATNAC 2007. Australasian. p. 364-370 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Effects of context relevance and perceived risk on user acceptance of mobile information services

    van der Heijden, H., Ogertschnig, M. & van der Gaast, L., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    EFFECTS OF INSECTICIDE APPLICATION ON WEED AND PASTURE PLANT-COMMUNITIES

    Gange, A. & BROWN, V. K., 1991, BRIGHTON CROP PROTECTION CONFERENCE : WEEDS - 1991, VOLS 1-3. FARNHAM: BRITISH CROP PROTECTION COUNCIL, p. 901-910 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Effects of see-through interfaces on user acceptance of small screen information systems

    Acton, T., Golden, W. & van der Heijden, H., 2005, Proceedings of the European Conference on Information Systems (ECIS). Regensburg, Germany

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Effects of Short-Term Thermal Alteration on Organic Matter in Experimentally-Heated Tagish Lake Observed by Raman Spectroscopy

    Chan, QHS., Nakato, A., Zolensky, ME., Nakamura, T., Kebukawa, Y., Maisano, J., Colbert, M. & Martinez, JE., 2017, 48th Lunar and Planetary Science Conference, held 20-24 March 2017, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Efficiency Improvements for Encrypt-to-Self

    Pijnenburg, J. & Poettering, B., Nov 2020, CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race. Association for Computing Machinery, Inc, p. 13-23 11 p. (CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Efficiency of conformalized ridge regression

    Burnaev, E. & Vovk, V., 2014, Proceedings of the Twenty Seventh Annual Conference on Learning Theory: JMLR: Workshop and Conference Proceedings. Vol. 35. p. 605-622 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Efficient Computation of Balanced Structures

    Harris, D. G., Morsy, E., Pandurangan, G., Robinson, P. & Srinivasan, A., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II. p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Efficient implementation of the local capon spectral estimate

    Alty, S. R., Benesty, J. & Jakobsson, A., Sep 2007, 15th European Signal Processing Conference, EUSIPCO 2007 - Proceedings. p. 2125-2128 4 p. (European Signal Processing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Efficient implementation of the time-recursive Capon and APES spectral estimators

    Alty, S. R., Jakobsson, A. & Larsson, E. G., 3 Apr 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 1269-1272 4 p. 7080094

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Efficient Sampling with Small Populations: a Genetic Algorithm Satisfying Detailed Balance

    Watkins, C. & Buttkewitz, Y., 11 Jul 2015, Gecco Companion '15: Proceedings of the Companion Publication of the 2015 Genetic and Evolutionary Computation Conference. p. 1517-1518 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Efficient, correct, unsupervised learning of context-sensitive languages

    Clark, A., 2010, Proceedings of the Fourteenth Conference on Computational Natural Language Learning. p. 28-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Either / Or

    Samson, J., 2008, Rethinking Musical Modernism: Proceedings of the international conference held from October 11 to 13, 2007. Despić, D. & Milin, M. (eds.). Belgrade: Serbian Academy of Sciences and Arts, p. 15-26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Electroantennogram obtained from honeybee antennae for odor detection

    Wang, Y., Zheng, Y., Luo, Z. & Li, G., 2010, Lecture Notes in Computer Science. Springer, Vol. 6063. p. 63-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Electronic Case Management System in the judiciary: Perspectives from the Judiciary of Malawi

    Chawinga, C., Chawinga, W., Majawa, F. & Kapondera, S., 2018, Standing Conference of Eastern Central and Southern African Libraries Associatio.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Embedding knowledge management into business process: The use of threaded discussion forums and knowledge objects at AstraZeneca

    Jashapara, A. & Adelmann, H., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Emergence and mutability of social media work practices

    Hafezieh, N. & Amis, J., 2017, International Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Forthcoming

    Emerging market MNEs' expatriate Management

    Rui, H. & Zhang, M., 16 Mar 2016, (Accepted/In press) Academy of International Business 2016 conference proceeding. AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, (E-pub ahead of print) 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    EMNCs' Knowledge Transfer in Emerging Markets

    Rui, H., Zhang, M. & Shipman, A., 2016, Proceedings of the 58th Annual Meeting of the Academy of International Business . AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Emotions, Satisfaction, and Place Attachment: A Structural Model

    Prayag, G., Van Der Veen, R., Huang, S. & Hosany, S., 2015, 3rd World Research Summit for Tourism and Hospitality and 1st USA-China Tourism Research Summit, Orlando, USA, December 15-19.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Emperor Manuel II Palaeologus’ Unpublished Treatise ‘On the Procession of the Holy Spirit’

    Dendrinos, C., 2006, Proceedings of the 21st International Congress of Byzantine Studies, London 21-26 August 2006. Jeffreys, E., Haarer, F. & Gilliland, J. (eds.). Aldershot: Ashgate, Vol. 3. p. 124-125

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Emplacement of dyke swarms in regions of multiple caldera collapses: the case study of Santorini volcano, Greece

    Drymoni, K., Rust, A., Cashman, K., Browning, J. & Gudmundsson, A., 2020, COV 11.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Unpublished

    Employee autonomy and management control in the quality organization

    Rees, C., Mar 1996, (Unpublished) 14th International Labour Process Conference (ILPC). Aston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Unpublished

    Employee perceptions of quality management: making sense of the paradox

    Rees, C., Jul 1996, (Unpublished) British Universities Industrial Relations Association (BUIRA) 46th Annual Conference. Bradford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Employee Share ownership and Performance: Commitment or Entrapment

    Sen Gupta, S., 2011, Society for the Advancement of Socio Economics, University of Madrid, Madrid, Spain.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Employee Share Ownership and Performance: Golden Path or Golden Handcuffs?

    Sen Gupta, S., Whitfield, K. & McNabb, B., 2006, Labor and Employment Relations Association (LERA), Boston .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Employee Share Ownership and Performance: re-estimation using WERS 2004

    Sen Gupta, S., Whitfield, K. & Pendleton, A., 2009, International Industrial Relations Association (IIRA), Sydney, Australia.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Employee share ownership design and organisational performance: Broad based versus narrow based schemes

    Sen Gupta, S. & Whitfield, K., 2009, British Academy of Management Conference (BAM), Cardiff - Best paper award.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Employee share Ownership in the United Kingdom and South Korea: Comparing the good and the bad days (recession versus boom)

    Sen Gupta, S. & Yoon, Y. J., 2015, Academy of Management Conference, Vancouver, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Unpublished

    Employee voice and employee engagement

    Rees, C. & Alfes, K., Mar 2012, (Unpublished) LSE/CIPD 'Voice and Value' Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Employee voice or vice: employee share ownership schemes and unions drawing on the 2011 WERS dataset

    Sen Gupta, S., 2013, Society for the Advancement of Socio Economics, Bocconi University Milano, Italy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Unpublished

    Empowerment and ICTs: much more than IT skills

    Poveda Villalba, S., 2014, (Unpublished) Empowerment and ICTs: much more than IT skills. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Unpublished

    Empowerment through quality management: rhetoric or reality?

    Rees, C., Apr 1996, (Unpublished) Open University Business School Conference on 'HRM: The Inside Story'. Milton Keynes.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. E-pub ahead of print

    Enabling Robust and Efficient Distributed Computation in Dynamic Peer-to-Peer Networks

    Augustine, J., Pandurangan, G., Robinson, P., Roche, S. & Upfal, E., 17 Dec 2015, (E-pub ahead of print) Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on. IEEE, p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Enabling virtual organisation in mobile worlds

    Komisarczuk, P., Bubendorfer, K. & Chard, K., 2004, 3G Mobile Communication Technologies, 2004. 3G 2004. Fifth IEE International Conference on. p. 123-127 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Encoding the Factorisation Calculus

    Rowe, R., 27 Aug 2015, Proceedings of the Combined 22nd International Workshop on Expressiveness in Concurrency and the 12th Workshop on Structural Operational Semantics (EXPRESS/SOS 2015). Electronic Proceedings in Theoretical Computer Science, Vol. 190. p. 76-90 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Encouraging Self-Regulated Learning Through Electronic Portfolios

    Abrami, P., Pillay, V., Wade, A., Aslan, O., Bures, E. & Bentley, C., 2007, Proceedings from World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education 2007. Bastiaens, T. & Carliner, S. (eds.). AACE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Encrypt-to-self: Securely outsourcing storage

    Pijnenburg, J. & Poettering, B., 12 Sep 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 635-654 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    End-to-end performance analysis for broadband island interconnection via satellite-RACE II/R2074 (Catalyst) project

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1993, Satellite Communications-ECSC-3, 1993., 3rd European Conference on. p. 170-174 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    End-to-end protocol performance in ATM/satellite interconnected LANs

    Komisarczuk, P., Hadjitheodosiou, MH., Coakley, F., Jeans, T. & Smythe, C., 1993, Broadband Services, Systems and Networks, 1993., Second International Conference on. p. 87-91 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    End-to-End Secure and Privacy Preserving Mobile Chat Application

    Akram, R. N. & Ko, R. K. L., 1 Jun 2014, Eighth Workshop in Information Security Theory and Practice (WISTP 2014). Naccache, D. & Sauveron, D. (eds.). Springer, (LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Energy Modulation of Electron Beam in Corrugated Dielectric Waveguide

    Lyapin, A., Lekomtsev, K., Boogert, S., Gibson, S., Aryshev, A., Urakawa, J. & Tishchenko, A., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-3 3 p. WEPTS055

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Energy-efficient key distribution and revocation in tactical networks with asymmetric links

    Reidt, S. & Wolthusen, S. D., 18 Oct 2009, 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Enforcing Business Policies Through Automated Reconfiguration

    Andrade, L. F., Fiadeiro, J. L. & Wermelinger, M., 2001, ASE. IEEE Computer Society Press, p. 426-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Enforcing Mobile Application Security Through Probabilistic Contracts

    Martinelli, F., Matteucci, I., Saracino, A. & Sgandurra, D., 2014, Proceedings of the 2014 ESSoS Doctoral Symposium co-located with the International Symposium on Engineering Secure Software and Systems (ESSoS 2014), Munich, Germany, February 26, 2014.. Joosen, W., Martinelli, F. & Heyman, T. (eds.). CEUR-WS.org, Vol. 1298. (CEUR Workshop Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints

    Cohen, D., Crampton, J., Gagarin, A., Gutin, G. & Jones, M., 2014, FAW 2014. (Lecture Notes in Computer Science; vol. 8497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Enhanced Bunch Monitoring by Interferometric Electro-Optic Methods

    Gibson, S., Arteche, A., Bashforth, S., Bosco, A., Krupa, M. & Lefevre, T., Jun 2018, 9th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 1-4 4 p. WEPAL073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Enhanced Conformal Predictors for Indoor Localisation Based on Fingerprinting Method

    Nguyen, K. & Luo, Z., 2 Oct 2013, 9th IFIP International Conference on Artificial Intelligence Applications & Innovations (AIAI 2013). p. 411-420 10 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Forthcoming

    Enhanced Location Tracking for Tactical MANETs based on Particle Filters and Additional Information Sources

    Ebinger, P., Kuijper, A. & Wolthusen, S. D., Oct 2010, (Accepted/In press) Proc. 2012 Military Communications and Information Systems Conference. Piscataway, NJ, USA: IEEE Computer Society Press, 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Enhancing CardSpace Authentication Using a Mobile Device

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Data and Applications Security and Privacy XXV: 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011, Proceedings. Li, Y. (ed.). Berlin: Springer-Verlag, Vol. 6818. p. 201-216 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Enhancing e-commerce security using GSM authentication

    Khu-smith, V. & Mitchell, C. J., 2003, -Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, p. 72-83 12 p. (Lecture Notes in Computer Science; vol. 2738).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Enhancing EMV Online PIN Verification

    Jayasinghe, D., Akram, R., Markantonakis, K., Rantos, K. & Mayes, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15): International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP-15). Helsinki, Finland: IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Enhancing EMV Tokenisation with Dynamic Transaction Tokens

    Jayasinghe, D., Markantonakis, K., Akram, R. & Mayes, K., 20 Jul 2017, Radio Frequency Identification and IoT Security: RFIDSec 2016. Hancke, G. & Markantonakis, K. (eds.). Springer, p. 107-122 16 p. (Lecture Notes in Computer Science ; vol. 10155).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. E-pub ahead of print

    Enhancing Java Runtime Environment for Smart Cards Against Runtime Attacks

    Akram, R. N., Markantonakis, K. & Mayes, K., 18 Nov 2015, (E-pub ahead of print) Computer Security -- ESORICS 2015: 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part II. Ryan, P. Y. A. & Weippl, E. (eds.). Vienna, Austria: Springer, p. 541-560 20 p. (Lecture Notes in Computer Science; vol. 9327).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Enhancing network performance in Distributed Cognitive Radio Networks using single-agent and multi-agent Reinforcement Learning

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2010, The 35th Annual IEEE Conference on Local Computer Networks, LCN 2010, 10-14 October 2010, Denver, Colorado, USA, Proceedings. p. 152-159 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Enhancing student engagement through memes

    O'Brien, J., Apr 2018, Chartered Association of Business Schools: Learning, Teaching and Student Experience conference 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Enhancing the Key Distribution Model in the RFID-Enabled Supply Chains

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 13 May 2014, The 8th IEEE International Symposium on Security and Multimodality in Pervasive Environment (SMPE 2014). IEEE Computer Society Press, p. 871- 878 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Enhancing the security of cookies

    Khu-smith, V. & Mitchell, C. J., 2001, Information Security and Cryptology - ICISC 2001 - Proceedings of the 4th International Conference, Seoul, Korea, December 2001. Kim, K. (ed.). Springer-Verlag, p. 132-145 14 p. (Lecture Notes in Computer Science; no. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Enhancing the supply chain with composite materials: An analysis supported by IT tools in coach/bus manufacturing

    Coronado Mondragon, A. & Coronado Mondragon, C. E., 8 Jun 2017, Industrial Engineering and Applications (ICIEA), 2017 4th International Conference on. Nagoya, Japan: IEEE Xplore, p. 121-125 5 p. A022

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Enhancing User Authentication in Claim-Based Identity Management

    Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of CTS 2010, the 2010 International Symposium on Collaborative Technologies and Systems, 17-21 May 2010, Chicago, Illinois, USA. IEEE, p. 75-83 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Entanglement in systems of interacting harmonic oscillators

    Audenaert, K., Cramer, M., Eisert, J. & Plenio, M. B., 2006, Proc. 1st Intl. Conf. on “Quantum Computing: Back Action 2006”, Kanpur, India..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Enterprise fragmentation in the economic transition: repackaging assets from Czech state enterprises

    Clark, E., 1999, Enterprise in transition. Split: University of Split, p. 163-167 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Entrepreneurial capitalism and venture capital

    Chong, D., 2015, 9th Critical Management Studies Conference (Leicester: University of Leicester).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Entrepreneurial learning: past research and future challenges

    Wang, C. L. & Chugh, H., 2010, Babson College Entrepreneurship Research Conference .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Entrepreneurship, small family business and Yiwu's historical development

    Rui, H., 2018, International Conference of Family Business and Entrepreneurship, 2-4 May 2018, Bali, Indonesia . International Conference of Family Business and Entrepreneurship

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Enumerating highly non-soluble groups

    Klopsch, B., 2005, FINITE GROUPS 2003. BERLIN 30: WALTER DE GRUYTER, p. 219-227 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Unpublished

    Environmental Storytelling: A Digital Frontier for Narrative Geography

    Lowe, J., 29 Aug 2019, (Unpublished) Geographies of Interactive Digital Narratives session at RGS-IBG 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Epitaxial growing of refractory metal films by laser ablation deposition

    Mikhailov, G. M., Malikov, I. V., Chernikh, A. V. & Petrashov, V., 1996, IEEE/LEOS 1996 SUMMER TOPICAL MEETINGS - ADVANCED APPLICATIONS OF LASERS IN MATERIALS AND PROCESSING, DIGEST. NEW YORK: Elphinstone Institute, p. 56 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Equal amongst Unequals: Comparing the employee share ownership experiencein the UK and Korea

    Sen Gupta, S. & Yoon, Y. J., 2015, Society for the Advancement of Socio Economics, London School of Economics, London.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?

    Mitchell, C. J., 2005, Information Security: 8th International Conference, ISC 2005, Singapore, September 20-23, 2005. Proceedings. Zhou, J., Lopez, J., R. H. D. & Bao, F. (eds.). Springer-Verlag, Vol. 3650. p. 244-258 15 p. (Lecture Notes in Computer Science; vol. 3650).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. E-pub ahead of print

    Error Propagation after Reordering Attacks on Hierarchical State Estimation

    Gul, A. & Wolthusen, S., 18 Dec 2018, (E-pub ahead of print) Proceedings of the Twelfth IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Staggs, J. & Shenoi, S. (eds.). Springer-Verlag, p. 67-79 13 p. (IFIP Advances in Information and Communication Technology; vol. 542).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution