Home > Publications

Publications

38301 - 38325 out of 42,610Page size: 25
  1. Conference contribution › Research
  2. Published

    Formalizing threat models for virtualized systems

    Sgandurra, D., Karafili, E. & Lupu, E., 2016, Data and Applications Security and Privacy - 30th Annual IFIP WG 11.3 Conference, DBSec 2016, Proceedings. Springer-Verlag, Vol. 9766. p. 251-267 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9766).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives

    Bost, R., Minaud, B. & Ohrimenko, O., 30 Oct 2017, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security: CCS '17. Association for Computing Machinery (ACM), p. 1465-1482 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Forthcoming

    Four Attacks and a Proof for Telegram

    Albrecht, M., Marekova, L., Paterson, K. & Stepanovs, I., 3 Jul 2021, (Accepted/In press) IEEE S&P 2022. Vol. 1. p. 223-242 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    FRACTURE TOUGHNESS AND CRACK PROPAGATION IN POLYESTER RESINS.

    Gatward, C. H., Hogg, P. J. & Hull, D., 1 Dec 1985, Deformation Yield and Fracture of Polymers. London, Engl: Plastics & Rubber Inst

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence

    Malek, W. W., Mayes, K. & Markantonakis, K., 2008, Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications. Berlin, Heidelberg: Springer-Verlag, p. 118-132 15 p. (CARDIS '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Fredholm Multiple Kernel Learning for Semi-Supervised Domain Adaptation

    Wang, W., Wang, H., Zhang, C. & Gao, Y., 2017, Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17). AAAI Press, p. 2732-2738 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data

    Lacharite, M-S. & Paterson, K., 1 Mar 2018, IACR Transactions on Symmetric Cryptology. 1 ed. Ruhr-Universität Bochum, Vol. 2018. p. 277-313 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    From Boundary Spanning to Creolization: Cross-cultural Strategies from the Offshore Provider’s Perspective

    Abbott, P., Zheng, Y., Du, R. & Willcocks, L. P., 2010, AmericasConference of Information Systems 2010.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    From conformal to probabilistic prediction

    Vovk, V., Petej, I. & Fedorova, V., 2014, COPA 2014 Proceedings.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    From Makerspaces to MOOCs: Recalibrating historical thinking for the digital age

    Gigliotti, S., Shep, S., Dudding, M., Plummer, M., Priestley, R. & Towl, L., 1 May 2016, There and back: Charting flexible pathways in open, mobile and distance education. p. 195-199

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Forthcoming

    From matrix pivots to graphs in surfaces: exploring combinatorics through partial duals

    Moffatt, I., 2 Oct 2021, (Accepted/In press) European Congress of Mathematics Portorož, 20–26 June.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    From me to we: Understanding how a new collective practice is born

    Khanijou, R., Cappellini, B. & Hosany, S., 2019, 10th EIASM Interpretive Consumer Research Conference, Lyon, 9-10 May.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    From Quantum Interference to Bayesian Coherence and Back Round Again

    Fuchs, C. A. & Schack, R., 2009, Foundations of Probability and Physics 5: AIP Conference Proceedings Vol. 1101. Accardi, L., Adenier, G., Fuchs, C. A., Jaeger, G., Khrennikov, A., Larsson, J-A. & Stenholm, S. (eds.). Melville, New York: American Institute of Physics, p. 260-279

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    From Separation Logic to First‐Order Logic

    Calcagno, C., Gardner, P. & Hague, M., 2005, FoSSaCS: Foundations of Software Science and Computation Structures.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    From Start-up to Maturity: studies based in three Chinese pharmaceutical and medical device companies’

    Zheng, Y., Li, X. & Wang, C. L., 17 Jul 2009, The Annual Conference of the Academy of Innovation and Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    From the individual to the collective: religion and memory in Roman Britain

    Kamash, Z., 2016, Cultural Memories in the Roman Empire. Galinsky, K. & Lapatin, K. (eds.). Getty Museum Press, p. 153-169 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    From the Mouths of Mothers: Using drama and service user testimonies to facilitate reflective learning for qualified social workers who are working with children and families who are affected by child sexual abuse

    Leonard, K., Gupta, A., Stuart-Fisher, A. & Lowe, K., Jul 2015, EASSW - European Association of Schools of Social Work conference, Milan, Italy..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    From user-centred design to security: building attacker personas for digital banking

    Moeckel, C., 29 Sep 2018, NordiCHI '18 Proceedings of the 10th Nordic Conference on Human-Computer Interaction . Association for Computing Machinery (ACM), p. 892-897 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. In preparation

    From Victim to Perpetrator: On the Blurring of Identities in Soazig Aaron’s Le Nom de Klara (2002)

    Duffy, H., 28 Jul 2019, (In preparation) Victims, Perpetrators and Implicated Subjects : Rethinking Agency at the Intersections of Narrative and Memory.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Frustration and Reactive Aggression: A Response Force Measure

    Arshad, I., Lickley, R., Sebastian, C. & Balsters, J., May 2019, Poster presented at the British Psychological Society Annual Conference in May 2019, Harrogate, UK..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    FSO-CDMA Systems Supporting end-to-end Network Slicing

    R. Raddo, T., Perez-Santacruz, J., Johannsen, U., Dayoubb, I., Haxha, S., Tafur Monroy, I. & Jurado-Navas, A., 20 Sep 2020, Imaging and Applied Optics Congress. Vancouver, BC, Canada, Vancouver, Canada: OSA Technical Digest (Optical Society of America, 2020, 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Forthcoming

    Future trends in Employment Relations: Lessons from SMEs in the creative industry

    Sen Gupta, S., 26 Jun 2019, (Accepted/In press) Lessons from SMEs in the creative industry.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework

    Wolthusen, S. D., 26 May 2011, Proc. 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2011). IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    'Gainst Nature Still: Reading Macbeth's Murder of Duncan

    Uotinen, T., 2011, Villains: Global Persceptives in Villains and Villainy. Genc, B. & Lenhardt, C. (eds.). Inter-Disciplinary Press, p. 157-163 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Games as a Metaphor for Interactive Systems

    Stathis, K. & Sergot, M. J., 1 Aug 1996, People and Computers XI (Proceedings of HCI'96). Sasse, M. A., Cunningham, R. J. & Winder, R. L. (eds.). London, UK: Springer-Verlag, p. 19-33 15 p. (BCS Conference Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution