Home > Publications

Publications

38226 - 38250 out of 42,928Page size: 25
  1. Conference contribution › Research
  2. Published

    Cryptographically-enforced hierarchical access control with multiple keys

    Crampton, J., 2007, Proceedings of the 12th Nordic Workshop on Secure IT Systems. p. 49-60 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Crystal Structure Prediction via Oblivious Local Search

    Antypov, D., Deligkas, A., Gusev, V., Rosseinsky, M. J., Spirakis, P. G. & Theofilatos, M., 12 Jun 2020, 18th International Symposium on Experimental Algorithms, SEA 2020. Faro, S. & Cantone, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. 21. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 160).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Crystallography of magnetite plaquettes and their significance as asymmetric catalysts for the synthesis of chiral organics in carbonaceous chondrites

    Chan, QHS. & Zolensky, ME., Oct 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    C-SHORe: A Collapsible Approach to Verifying Higher-Order Programs

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 25 Sep 2013, ICFP: International Conference on Functional Programming. p. 13-24 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    CSR priorities of emerging economy firms: Is Russia different from the other emerging economies

    Preuss, L. & Barkemeyer, R., Sep 2010, 9th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published
  8. Unpublished

    Culture-Centric Studies of Marketing and Consumption in Brazil

    Ferreira, M. C., Figueiredo, B., Pereira, S. & Scaraboto, D., 2 Jul 2014, (Unpublished) Proceedings of the 39th Annual Macromarketing Conference. Macromarketing Society, Inc., p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Curb Your Enthusiasm: Why the Future is Not Stuxnet

    Haggman, A., 2 Jul 2015, Proceedings of the 14th European Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Limited, p. 397-403 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Customer Agility Capabilities at EuroBank: The Role of ICT and Organizational Routines

    Hallikainen, P., Merisalo-Rantanen, H. & Elbanna, A., 2017, Australasian Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Customizing Conventional Patent-based Financial Instruments for Financing Nanotechnology Firms: An Iranian Perspective

    Nasiri, A., 2010, International Conference on Nanotechnology and Biosensors (ICNB). Hong Kong, China

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    'Cyber security is a dark art': The CISO as soothsayer

    Da Silva, J. & Jensen, R. B., 25 Feb 2022, (E-pub ahead of print) ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW). ACM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. E-pub ahead of print

    Cybersecurity Readiness of E-tail Organisations: A Technical Perspective

    Shah, M., Muhammad, R. & Ameen, N., 1 Apr 2020, (E-pub ahead of print) Responsible Design, Implementation and Use of Information and Communication Technology: 19th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2020, Skukuza, South Africa, April 6–8, 2020, Proceedings, Part I. p. 153-160 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    CyberVis: Visualizing the Potential Impact of Cyber Attacks on the Wider Enterprise

    Creese, S., Goldsmith, M., Moffat, N., Happa, J. & Agrafiotis, I., 2013, IEEE Conference on Technologies for Homeland Security.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Dancing with strangers: observing play, movement and interaction in a public square through the lens of a dancer, a writer and a painter

    Coppard, H., 30 Sep 2014, Children and Families in Changing Urban Spaces conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Dare to innovate by taking care of hurdles to innovation

    Guenther, E., Hueske, A-K., Kesting, P., Linnenluecke, M., Moeller, K. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Data caching as a cloud service

    Chockler, G., Laden, G. & Vigfusson, Y., 2010, Proceedings of the 4th ACM/SIGOPS Workshop on Large-Scale Distributed Systems and Middleware (LADIS '10). ACM, p. 18-21 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Data Dependent Power Use in Multipliers

    Walter, C. D. & Samyde, D., 2005, 17th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 4-12 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Data Integrity in Hardware for Modular Arithmetic

    Walter, C. D., 2000, CHES 2000. Koç, Ç. K. & Paar, C. (eds.). Springer, Vol. 1965. p. 204-215 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Data Is a Stream: Security of Stream-Based Channels

    Fischlin, M., Günther, F., Marson, G. A. & Paterson, K., 1 Aug 2015, Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II. Gennaro, R. & Robshaw, M. (eds.). Springer Verlag, Vol. 9216. p. 545-564 20 p. (Lecture Notes in Computer Science; vol. 9216).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Data Structures for Constraint Enforcement in Role-Based Systems

    Crampton, J. & Khambhammettu, H., 2005, Proceedings of the 2005 IASTED Conference on Network and Information Security. p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. E-pub ahead of print

    Data-Driven Robust Control for Type 1 Diabetes Under Meal and Exercise Uncertainties

    Paoletti, N., Liu, K. S., Smolka, S. A. & Lin, S., 1 Sep 2017, (E-pub ahead of print) Computational Methods in Systems Biology. Feret, J. & Koeppl, H. (eds.). Springer, p. 214-232 19 p. (Lecture Notes in Computer Science; vol. 10545).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Dataset Construction and Analysis of Screenshot Malware

    Sbai, H., Happa, J., Goldsmith, M. & Meftali, S., 29 Dec 2020, International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. DCM 4.0: Integration of Industry 4.0 and Demand Chain in Global Manufacturing

    Ganji, E. N., Coutroubis, A. & Shah, S., 13 Aug 2018, 2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8436383. (2018 IEEE International Conference on Engineering, Technology and Innovation, ICE/ITMC 2018 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security

    Weldehawaryat, G., Ambassa, P., Marufu, A., Wolthusen, S. & Kayem, A. V. D. M., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 69-86 18 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    Decidable Models of Integer-Manipulating Programs with Recursive Parallelism

    Hague, M. & Lin, A., 13 Sep 2016, (E-pub ahead of print) Reachability Problems: 10th International Workshop, RP 2016, Aalborg, Denmark, September 19-21, 2016, Proceedings. Springer International Publishing, Vol. 9899. p. 148-162 15 p. (Lecture Notes in Computer Science; vol. 9899).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution