Home > Publications

Publications

37001 - 37100 out of 41,090Page size: 100
  1. Conference contribution › Research
  2. E-pub ahead of print

    High System-Code Security with Low Overhead

    Wagner, J., Kuznetsov, V., Candea, G. & Kinder, J., 20 Jul 2015, (E-pub ahead of print) 2015 IEEE Symposium on Security and Privacy. IEEE, p. 866-879 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Highly Pristine Organic Matter in a Xenolith Clast in the Zag H Chrondrite

    Kebukawa, Y., Ito, M., Zolensky, ME., Nakato, A., Suga, H., Takahashi, Y., Takeichi, Y., Mase, K., Chan, Q. & Fries, M., 20 Mar 2017, 48th Lunar and Planetary Science Conference, held 20-24 March 2017, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    High-Precision Arithmetic in Homomorphic Encryption

    Chen, H., Laine, K., Player, R. & Xia, Y., 7 Mar 2018, (E-pub ahead of print) Topics in Cryptology – CT-RSA 2018: The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings. Springer, p. 116-136 21 p. (Lecture Notes in Computer Science ; vol. 10808 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    History of Quaternary Science

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 10-18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Host-Based Security Sensor Integrity in Multiprocessing Environments

    Mcevoy, R. & Wolthusen, S. D., May 2010, Information Security, Practice and Experience: 6th International Conference, ISPEC 2010. Springer-Verlag, p. 138-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    Household food waste simulation model: Investigation of interventions for staple food items waste

    Kandemir, C., Quested, T., Reynolds, C., Fisher, K. & Devine, R., 10 Jun 2019, (Unpublished) Household food waste simulation model: Investigation of interventions for staple food items waste.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    How ‘search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Proceedings. 1 ed. Academy of Management, Vol. 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    How ‘Search’ Has Become the Watchword of the Digital Organisation

    Hafezieh, N. & Pollock, N., 2018, Academy of Management Global Proceedings. 2018 ed. Academy of Management, Vol. Surrey.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    How damaging is caldera collapse for a volcanic edifice?

    Drymoni, K., Browning, J. & Gudmundsson, A., 2017, JOINT ASSEMBLY TSG-BGA-VMSG.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    How do knowledge workers with flexible jobs manage constant connectivity? An affordance perspective

    Farivar, F., Eshraghian, F. & Hafezieh, N., 2020, Academy of Management Proceedings. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    How do management ideas diffuse? Lessons from the global spread of corporate social responsibility

    Preuss, L., Mar 2013, 40th annual conference of the Academy of International Business – UK and Ireland Chapter (AIB-UKI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    How Do Online Communities of Patients Aggregate on Twitter? An Affordance Perspective

    Bernardi, R., 11 Dec 2016, Proceedings of the Thirty Seventh International Conference on Information Systems: 2016 International Conference on Information Systems (ICIS 2016), December 11-14, 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    How Hezbollah affects Lebanon’s sovereignty

    Van Efferink, L., 2010, (Unpublished) Political Studies Association Graduate Network, University of Oxford.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Unpublished

    How important are national industrial relations systems in shaping restructuring in MNCs?

    Edwards, T., Coller, X., Ortiz, L., Rees, C. & Wortmann, M., Jul 2004, (Unpublished) IESE/DMU Conference on 'Multinationals and the International Diffusion of Organizational Forms and Practices'. Barcelona.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    How private is your period? A systematic analysis of menstrual app privacy policies

    Shipp, L. & Blasco Alis, J., 2020, Proceedings on Privacy Enhancing Technologies 2020 (PoPETs 2020). Vol. 2020(4). p. 491-510 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    How to give FAST Advice

    Stathis, K., 1 Oct 1994, Proceedings of the 7th Symposium and Exhibition on Industrial Applications of Prolog (INAP'94). p. 59-67 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    How to grant less permissions to facebook applications

    Costantino, G., Martinelli, F. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 55-60 6 p. 6947733

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    How to identify all cheaters in Pinch's scheme

    Yeun, C. Y. & Mitchell, C. J., 1998, Proceedings of JWIS '98, Singapore, December 1998. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Human resource Management, Organisational Performance, Employee Attitudes and Behaviours: Exploring the linkages

    Tsai, C-J., Edwards, P. & Sen Gupta, S., 2007, European Academy of Management (EURAM), Paris, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Human rights policies and corporate financial performance: Evidence from UK corporations

    Preuss, L. & Brown, D., Mar 2010, annual meeting of the International Association for Business and Society .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Hungarian IT: Coping with economic transition and globalisation

    Harindranath, G., 2004, Proceedings of the 2004 European Conference on Information Systems (ECIS), Turku School of Economics and Business Administration, Turku, Finland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Hybrid metallic mesoscopic structures: Some unanswered questions

    Petrashov, V., 2003, TOWARDS THE CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 255-261 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Hybrid Publicly Verifiable Computation

    Alderman, J., Janson, C., Crampton, J. & Cid, C., 2 Feb 2016, Topics in Cryptology - CT-RSA 2016. Sako, K. (ed.). Springer, Vol. 9610. p. 147-163 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Hydrogen Isotopes in Beetle Chitin

    Grocke, D., van Hardenbroeck, M., Elias, S. & Sauer, P., 2011, Chitin: Formation and Diagenesis. Gupta, S. N. (ed.). Springer, p. 105-116

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Unpublished

    Hype Cycles of the Digital Economy: Productisation of Expectations and the Gartner Hype Cycle

    Pollock, N., Williams, R. & Hafezieh, N., 2021, (Unpublished) Society for the Advancement of Socio-Economics (SASE).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Hypersensitivity to perturbation on an NMR quantum computer

    Schack, R. & Brun, T. A., 2000, Quantum Communication, Computing, and Measurement 2. Kumar, P., D'Ariano, G. M. & Hirota, O. (eds.). New York: Kluwer, p. 257-262

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Hypersensitivity to perturbation: An information-theoretical characterization of classical and quantum chaos

    Schack, R. & Caves, C. M., 1997, Quantum Communication, Computing, and Measurement. Hirota, O., Holevo, A. S. & Caves, C. M. (eds.). New York: Plenum Press, p. 317-330

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Hypertesting: The Case for Automated Testing of Hyperproperties

    Kinder, J., Mar 2015, 3rd Workshop on Hot Issues in Security Principles and Trust (HotSpot 2015). p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Hypothesis elimination on a quantum computer

    Soklakov, A. N. & Schack, R., 2004, Quantum Communication, Measurement and Computing (QCMC'04). Barnett, S. M. (ed.). Melville, New York: AIP Press, p. 151

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    I feel attached: Motivation and Tourists’ Emotions as Antecedents of Place Attachment

    Prayag, G., Hosany, S. & Soscia, I., 2014, European Marketing Academy (EMAC) 43rd Annual Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Submitted

    I.R.R.I.T.A.T.E: Warning! This is an Artist's Book

    Sandhu, K., 2014, (Submitted) Perversions of Paper.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. E-pub ahead of print

    IBC-C: A Dataset for Armed Conflict Event Analysis

    Zukov Gregoric, A., Veyhe, B. & Luo, Z., Aug 2016, (E-pub ahead of print) Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics: Aug 7 to 12th 2016. p. 374-379 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    ICARUS: Intelligent Coupon Allocation for Retailers Using Search

    Swift, S., Shi, A., Crampton, J. & Tucker, A., 2005, Proceedings of 2005 IEEE Congress on Evolutionary Computation. IEEE Computer Society Press, p. 182-189 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    ICT Adoption & Use in UK SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2007, Proceedings of the European Conference on Information Management and Evaluation, Conservatoire National des Arts et Metiers (CNAM), Montpellier, France, September. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    ICT Enabling Customer Agility: A Dynamic Capabilities Perspective

    Elbanna, A., Hallikainen, P. & Merisalo-Rantanen, H., Dec 2017, Thirty Eighth International Conference on Information Systems (ICIS). South Korea

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    ICT in early education: reasons for insufficient application

    Stanisavljevic Petrovic, Z., Pavlovic, D. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Budapest, Rumania: "Carol I" National Defense University, Vol. 2. p. 227 232 p. 36

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    ICT in small firms: Factors affecting the adoption and use of ICT in Southeast England SMEs

    Harindranath, G., Dyerson, R. & Barnes, D., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    ICT in South African SMEs: A study of the Manufacturing and Logistics sectors: BEST PAPER in ICT, IT and E-Business in the Small Firm Sector track, 36th ISBE Conference 2013, Cardiff, UK

    Gono, S., Harindranath, G. & Özcan, G. B., 13 Nov 2013, Proceedings of ISBE 2013, November, Cardiff. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    ICT use in SMES: A comparison between the North West of England and the Province of Genoa

    Dyerson, R., Harindranath, G., Barnes, D. & Spinelli, R., 2009, ICE-B 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON E-BUSINESS. SETUBAL: INSTICC-INST SYST TECHNOLOGIES INFORMATION CONTROL, p. 244-251 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    ICT4DWhat? Using the Choice Framework to Operationalise the Capability Approach to Development

    Kleine, D., 19 Apr 2009, Proceedings of the IEEE/ACM International Conference on Information Technology and Development 2009 in Doha, Qatar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    ICTs and hope for development: a theoretical framework

    Krishna Raja Gopalan, S. & Heeks, R., 2015, IFIP WG 9.4: Social Implications of Computers in Developing Countries: 13th International Conference on Social Implications of Computers in Developing Countries. Oslo, p. 414-428 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Unpublished

    ICTs and the city: Impacts on place and mobility. A case study of Campinas, Brazil

    Poveda Villalba, S., 2014, (Unpublished) CivCity: Symposium on Civilisation, Infrastructure and the City. University College London Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Identification in the Limit of Substitutable Context Free Languages

    Clark, A. & Eyraud, R., 2005, Proceedings of The 16th International Conference on Algorithmic Learning Theory. Jain, S., Simon, H. U. & Tomita, E. (eds.). p. 283-296

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, LCN 2008, The 33rd IEEE Conference on Local Computer Networks, The Conference on Leading Edge and Practical Computer Networking, Hyatt Regency Montreal, Montreal, Quebec, Canada, 14-17 October 2008, Proceedings. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Identification of malicious web pages through analysis of underlying DNS and web server relationships.

    Seifert, C., Welch, I., Komisarczuk, P., Aval, C. U. & Endicott-Popovsky, B., 2008, Local Computer Networks, 2008. LCN 2008. 33rd IEEE Conference on. p. 935-941 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Identification of malicious web pages with static heuristics

    Seifert, C., Welch, I. & Komisarczuk, P., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 91-96 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Identification of Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011. p. 33-40 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Identification of resource allocation trends in irregular ATM networks

    Cosmas, J., Pitts, J., Bocci, M., Luo, Z., Nyong, D. & Rai, S., Mar 1997, Proceeding of Fourth UKTS on Performance Modelling and Evaluation of ATM Networks. p. 24/1-24/12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Identifying and Analyzing Web Server Attacks

    Seifert, C., Endicott-Popovsky, B., Frincke, D. A., Komisarczuk, P., Muschevici, R. & Welch, I., 2008, Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008. p. 151-161 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Identifying manipulated images

    Nightingale, S., Wade, K. & Watson, D., Jun 2015, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Identifying patient experience from online resources via sentiment analysis and topic modelling

    Bahja, M. & Lycett, M., 6 Dec 2016, Proceedings - 3rd IEEE/ACM International Conference on Big Data Computing, Applications and Technologies, BDCAT 2016. Association for Computing Machinery, Inc, p. 94-99 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    IDENTIFYING THE RISKS ASSOCIATED WITH AGILE SOFTWARE DEVELOPMENT: AN EMPIRICAL INVESTIGATION

    Elbanna, A., 2014, ..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Igneous Intrusions in the Carnarvon Basin, NW Shelf, Australia

    McClay, K., Scarselli, N. & Jitmahantakul, S., 31 Aug 2013, Proceedings of the Western Australian Basins Conference. 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Il 'Furioso' spiritualizzato

    Anelotti, A., 2019, ‘Dreaming again on things already dreamed’: 500 years of 'Orlando Furioso' (1516-2016) . Dorigatti, M. & Pavlova, M. (eds.). Oxford-New York: Peter Lang

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Unpublished

    Illiquidity, investment styles and January returns in United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. In preparation

    IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS

    Agyemang, G., Lehman, C. R. & Annisette, M., 9 Jul 2013, (In preparation) IMMIGRATION AND NEO-LIBERALISM: THREE STORIES AND COUNTER ACCOUNTS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Implementable Internationalization Strategies for Companies from Emerging Economies

    Aboutalebi, R., 23 Nov 2011, In: EAMSA (Euro-Asia Management Studies Association), 28th Annual Conference: Strategies of international development in Euro-Asian Business. 23-26 November 2011, University of Gothenburg, Gothenburg, Sweden.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Implementation aspects of SET/EMV

    Jarupunphol, P. & Mitchell, C. J., 2002, Towards the Knowledge Society: eCommerce, eBusiness and eGovernment, The 2nd IFIP Conference on e-commerce, e-business and e-government, IFIP I3E 2002, Lisbon, Portugal, October 2002. Monteiro, J. L., Swatman, P. M. C. & Tavares, L. V. (eds.). Kluwer Academic Publishers, p. 305-315 11 p. (IFIP Conference Proceedings; no. 233).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. E-pub ahead of print

    Implementation Correctness for Replicated Data Types, Categorically

    Gadducci, F., Melgratti, H., Roldán, C. & Sammartino, M., 25 Nov 2020, (E-pub ahead of print) Theoretical Aspects of Computing – ICTAC 2020 - 17th International Colloquium, 2020, Proceedings. Pun, V. K., Stolz, V. & Simao, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 283-303 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12545 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Implementation of a component-by-component algorithm to generate small low-discrepancy samples

    Doerr, B., Gnewuch, M. & Wahlström, M., 1 Jul 2009, Monte Carlo and Quasi-Monte Carlo Methods 2008. L'Ecuyer, P. & Owen, A. B. (eds.). Montreal, Canada: Springer, p. 323-338 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Implementation of agents for connection admission control on an ATM testbed

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 2000, On The Way to Information Society: Five Years of European ACTS Research on Intelligence in Services and Networks. IOS Press, p. 413-426

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Implementation of CERN Secondary Beam Lines T9 and T10 in BDSIM

    D'Alessandro, G. L., Boogert, S., Gibson, S., Nevay, L., Shields, W., Bernhard, J., Gerbershagen, A. & Rosenthal, M. S., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 3746-3748 3 p. THPGW069

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Implementation techniques for inductive types in Plastic

    Callaghan, P. & Luo, Z., 2000, Types for Proofs and Programs, Proc of Inter Conf of TYPES'99. LNCS 1956.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Implementing a Caching Service for Distributed CORBA Objects

    Chockler, G., Dolev, D., Friedman, R. & Vitenberg, R., 2000, Proceedings of the 2nd IFIP/ACM International Conference on Distributed systems platforms (Middleware '00). Springer-Verlag, p. 1-23 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Implementing a model checker for Lego

    Yu, S. & Luo, Z., 1997, Proc. of the 4th Inter Symp. of Formal Methods Europe, FME'97: Industrial Applications and Strengthened Foundations of Formal Methods. LNCS 1313.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Implementing Candidate Graded Encoding Schemes from Ideal Lattices

    Albrecht, M., Cocis, C., Laguillaumie, F. & Langlois, A., 30 Dec 2015, Advances in Cryptology – ASIACRYPT 2015. Iwata, T. & Cheon, J. H. (eds.). Springer, p. 752-775 24 p. ( Lecture Notes in Computer Science; vol. 9453).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. E-pub ahead of print

    Implementing Grover Oracles for Quantum Key Search on AES and LowMC

    Jaques, S., Naehrig, M., Roetteler, M. & Virdia, F., 1 May 2020, (E-pub ahead of print) Advances in Cryptology – EUROCRYPT 2020. Springer, p. 280-310 31 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    IMPORTANT DETERMINANTS OF FOREIGN COMPANY PERFORMANCE IN CHINA: BIG DATA ANALYSIS

    Wang, C. & Giouvris, E., 2018, BAI-winter Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Impostor: A single sign-on system for use from untrusted devices

    Pashalidis, A. & Mitchell, C. J., 2004, Proceedings of IEEE Globecom 2004, Global Telecommunications Conference, Dallas, Texas, USA, November/December 2004. IEEE, Vol. 4. p. 2191-2195

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. E-pub ahead of print

    Improved Classical Cryptanalysis of SIKE in Practice

    Costello, C., Longa, P., Naehrig, M., Renes, J. & Virdia, F., 29 Apr 2020, (E-pub ahead of print) Public-Key Cryptography – PKC 2020. Springer, p. 505-534 30 p. (Lecture Notes in Computer Science; vol. 12111).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Improved Higgs Naturalness with Supersymmetry

    Gripaios, B. & West, S., 30 Oct 2006, Proceedings of SUSY06.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Improved privacy-preserving training using fixed-Hessian minimisation

    Ogilvie, T., Player, R. & Rowell, J., 15 Dec 2020, Proceedings of the 8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography: WAHC 2020. p. 6-18 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage

    Lacharite, M-S., Minaud, B. & Paterson, K., 26 Jul 2018, 2018 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

    Lee, E., 20 Jul 2019, Progress in Cryptology – LATINCRYPT 2017: International Conference on Cryptology and Information Security in Latin America. Springer, p. 66-85 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. E-pub ahead of print

    Improving Air Interface User Privacy in Mobile Telephony

    Khan, M. & Mitchell, C. J., 9 Dec 2015, (E-pub ahead of print) Security Standardisation Research, Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Springer-Verlag, p. 165-184 20 p. (Lecture Notes in Computer Science; vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Improving interpretations of trust claims

    Sel, M., 24 May 2017, Trust Management X - 10th IFIP WG 11.11 International Conference, IFIPTM 2016, Proceedings. Vassileva, J., Mauw, S., Habib, S. M. & Muhlhauser, M. (eds.). Springer New York LLC, p. 164-173 10 p. (IFIP Advances in Information and Communication Technology; vol. 473).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Improving IP address autoconfiguration security in MANETs using trust modelling

    Hu, S. & Mitchell, C. J., 2005, Mobile Ad-hoc and Sensor Networks: First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005. Proceedings. Jia, X., Wu, J. & He, Y. (eds.). Springer-Verlag, Vol. 3794. p. 83-92 10 p. (Lecture Notes in Computer Science; vol. 3794).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Improving model quality through foundational ontologies: Two contrasting approaches to the representation of roles

    de Cesare, S., Henderson-Sellers, B., Partridge, C. & Lycett, M., 2015, Advances in Conceptual Modeling - ER 2015 Workshops, AHA, CMS, EMoV, MoBiD, MORE-BI, MReBA, QMMQ, and SCME, Proceedings. Springer Verlag, Vol. 9382. p. 304-314 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9382).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Improving Planning Performance in PDDL+ Domains via Automated Predicate Reformulation

    Franco, S., Vallati, M., Lindsay, A. & McCluskey, T. L., 2019, Computational Science - ICCS 2019 : 19th International Conference, Faro, Portugal, June 12–14, 2019, Proceedings, Part V. Rodrigues, J. M. F., Cardoso, P. J. S., Monteiro, J. M., Lam, R., Krzhizhanovskaya, V. V., Lees, M. H., Dongarra, J. J. & Sloot, P. M. A. (eds.). Springer, Vol. 11540. p. 491-498 8 p. (Lecture Notes in Computer Science; vol. 11540).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Improving Reliable Probabilistic Prediction by Using Additional Knowledge

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 193-200 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Improving Self-organized Resource Allocation with Effective Communication

    Kafali, O. & Yolum, P., 2012, Agents and Peer-to-Peer Computing. Beneventano, D., Despotovic, Z., Guerra, F., Joseph, S., Moro, G. & Pinninck, A. (eds.). Springer Berlin / Heidelberg, Vol. 6573. p. 35-46 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Improving the mental health of BME men: Researching men's experiences

    Robinson, M., Keating, F. & Robertson, S., 18 Nov 2013, Journal of Mens Health. 3 ed. Vol. 7. p. 304 305 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    In a New Land: Mobile Phones, Amplified Pressures and Reduced Capabilities

    Coles-Kemp, L., Jensen, R. B. & Talhouk, R., Apr 2018, CHI '18: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-13 13 p. 584

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    In search for theory: What hampers innovation

    Guenther, E., Hueske, A-K., Hoelzle, K., Kesting, P., Linnenluecke, M. & Preuss, L., Aug 2011, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Incentive Engineering for Outsourced Computation in the Face of Collusion

    Rezaei Khouzani, M., Pham, V. & Cid, C., 2014, Proceedings of WEIS 2014 – 13th Annual Workshop on the Economics of Information Security,. 21 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. E-pub ahead of print

    Increasing the Security of Wireless Communication through Relaying and Interference Generation

    Rose, L., Quaglia, E. & Valentin, S., 11 May 2017, (E-pub ahead of print) 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Incubating New Entrepreneurship Practices: The Case of Plan9 Incubator in Pakistan

    Shahid, A. R. & Morlacchi, P., 2019, Fourth Annual Entrepreneurship as Practice Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. E-pub ahead of print

    In-Cycle Sequential Topology Faults and Attacks: Effects on State Estimation

    Gul, A. & Wolthusen, S., 30 Dec 2018, (E-pub ahead of print) Critical Information Infrastructures Security - 13th International Conference, CRITIS 2018, Revised Selected Papers. Luiijf, E., Žutautaitė, I. & Hämmerli, B. M. (eds.). Springer Verlag, p. 17-28 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11260 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard

    Baiocco, A. & Wolthusen, S., 2018, Proceedings of the 2018 IEEE PES Innovative Smart Grid Technologies Conference. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Individuals’ smartphone security behaviour: similarities and differences in developing countries

    Shah, M. & Ameen, N., 2019, Data, Organisations and Society Conference, Coventry University.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Indonesian tectonics: Subduction, extension, provenance and more

    Hall, R., 2014, Proceedings Indonesian Petroleum Association, 38th Annual Convention. p. IPA14-G-360 1-13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Inducing Syntactic Categories by Context Distribution Clustering

    Clark, A., 2000, Proc. of Conference on Computational Natural Language Learning. p. 91-94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Inductive Confidence Machine for pattern recognition

    Surkov, D., Gammerman, A. & Vovk, V., 2002, Proceedings of the ICDM 2002 Workshop on the Foundation of Data Mining and Knowledge Discovery. Lin, T. & Ohsuga, S. (eds.). Shimane Medical University, p. 249-255 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Inductive confidence machines for regression

    Papadopoulos, H., Proedrou, K., Vovk, V. & Gammerman, A., 2002, Proceedings of the Thirteenth European Conference on Machine Learning. Elomaa, T., Mannila, H. & Toivonen, H. (eds.). London: Springer, p. 345-356 12 p. (Lecture Notes in Computer Science; vol. 2430).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Inductive Conformal Martingales for Change-Point Detection

    Volkhonskiy, D., Burnaev, E., Nouretdinov, I., Gammerman, A. & Vovk, V., 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). p. 1-22 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Inductive Venn-Abers Predictive Distribution

    Nouretdinov, I., Volkhonskiy, D., Lim, P., Toccaceli, P. & Gammerman, A., Jun 2018, 7th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2018). Vol. 91. p. 15-36 22 p. (Proceedings of Machine Learning Research).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Inferring protein-protein interactions using interaction network topologies

    Paccanaro, A., Trifonov, V., Yu, H. & Gerstein, M. B., 2005, Proceedings of the International Joint Conference on Neural Networks. p. 161 166 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Influence of erosion on the kinematics of bivergent orogens: Results from scaled sandbox simulations

    Hoth, S., Adam, J., Kukowski, N. & Oncken, O., 2006, TECTONICS, CLIMATE, AND LANDSCAPE EVOLUTION. Willett, SD., Hovius, N., Brandon, MT. & Fisher, DM. (eds.). BOULDER: GEOLOGICAL SOC AMER INC, p. 201-225 25 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Influence of normal-faults on magma propagation with examples from the Hafnarfjall caldera, Iceland, and Santorini, Greece

    Browning, J., Gudmundsson, A. & Drymoni, K., 2019, LASI VI.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Influence of product manufacturing, supplier and technology selection in the configuration of the UK composites supply chain

    Coronado Mondragon, A. E., Mastrocinque, E. & Hogg, P., 15 Jun 2015, Proceedings of the International Conference on Engineering Technologies, Engineering Education and Engineering Management (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 1079–1082 4 p. 235

    Research output: Chapter in Book/Report/Conference proceedingConference contribution