Home > Publications

Publications

37376 - 37400 out of 40,623Page size: 25
  1. Conference contribution › Research
  2. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, (E-pub ahead of print) 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Removing connected obstacles in the plane is FPT

    Eiben, E. & Lokshtanov, D., 8 Jun 2020, 36th International Symposium on Computational Geometry, SoCG 2020. Cabello, S. & Chen, D. Z. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. LIPIcs-SoCG-2020-39. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 164).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Forthcoming

    Rent generation mechanism of first-order and second-order capabilities: integrating resource based view and dynamic capabilities view framework

    Qaiyum, S. & Wang, C. L., 22 Oct 2015, (Accepted/In press) The 38th Annual Institute for Small Business and Entrepreneurship Conference, Glasgow, 11-12 November. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., Lanzi, A. A. & Monga, M., 2005, 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Replaying Programs Allowing Interrupts on a Multiprocessor

    Audenaert, K. & Levrouw, L. J., 1993, Int'l Workshop on Systems Engineering for Real Time Applications, SERTA '93. Cirencester: IEE Press, p. 107-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Representative sets and irrelevant vertices: New tools for kernelization

    Kratsch, S. & Wahlström, M., 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS). IEEE, p. 450-459 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Unpublished

    Reprogramming landscapes of play: navigation and narrative in Geocaching

    Lowe, J., 31 Aug 2018, (Unpublished) Landscapes of Digital Games session at RGS-IBG 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L., 1 Oct 2017, Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Research Populations in International Context

    Aboutalebi, R. & Tan, H., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Researching the practical ethics of discretion

    Evans, A., 27 Aug 2015, 2015 EGPA Annual Conference: Permanent Study Group XIII: Public Policy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Residual Nominal Automata

    Moerman, J. & Sammartino, M., 26 Aug 2020, LIPCs. Germany: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 2017. p. 44:1-44:21 21 p. 44

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Resilience Analysis of Software-Defined Networks Using Queueing Networks

    Nweke, L. O. & Wolthusen, S. D., 30 Mar 2020, 2020 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Resolution with Counting: Dag-Like Lower Bounds and Different Moduli

    Part, F. & Tzameret, I., 13 Jan 2020, 11th Innovations in Theoretical Computer Science Conference (ITCS) 2020, January, 2020, Seattle, WA, USA. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, p. 1-37 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Resolving performance conflicts in new wind turbine blade designs

    Peesapati, V., Cotton, I., Rashid, L. S., Brown, A., Jamshidi, P. & Hogg, P. J., 1 Dec 2009, European Wind Energy Conference and Exhibition 2009, EWEC 2009. Vol. 1. p. 260-287 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Response of Acropora to warm climates; lessons from the geological past

    White, C., Bosence, D. & Wallace, C. C., Jul 2008, Proceedings of the 11th International Coral Reef Symposium, Ft. Lauderdale, Florida, 7-11 July 2008 Session number 1 . Riegl, B. & Dodge, R. E. (eds.). Davie, Florida: Nova Southeastern University National Coral Reef Institute, p. 7-12 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Response of Chrysomelidae to Quaternary environmental changes.

    Elias, S. & Kuzmina, S., 2008, Research on Chrysomelidae. Jolivet, P., Santiago-Blay, J. & Schmitt, M. (eds.). Brill, Vol. 1. p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    RESPONSE OF THE HOMOGENEOUSLY PRECESSING DOMAIN TO LONGITUDINAL PUMPING

    BUNKOV, Y. M., DMITRIEV, V. V., FEHER, A., GAZO, E., KUPKA, M., NYEKI, J. & SKYBA, P., 1992, PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MACROSCOPIC QUANTUM PHENOMENA. Benacka, S. & Kedro, M. (eds.). BRATISLAVA: SLOVAK ACAD SCIENCES INST ELECTRICAL ENGINEERING, p. 49-53 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Responsibility in paradise? CSR tools of companies domiciled in tax havens

    Preuss, L., Sep 2009, 8th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution