Home > Publications

Publications

38876 - 38900 out of 42,597Page size: 25
  1. Conference contribution › Research
  2. Published

    On quasipolynomial multicut-mimicking networks and kernelization of multiway cut problems

    Wahlström, M., 29 Jun 2020, ICALP 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 168. p. 1-14 14 p. 101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    On Redefinitions of 'Rescue opera'

    Charlton, D., 1992, Music and the French Revolution. Boyd, M. (ed.). 1992: Cambridge University Press, p. 169-88 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    On r-Simple k-Path and Related Problems Parameterized by k/r

    Gutin, G., Wahlstrom, M. & Zehavi, M., Jan 2019, Proceedings of the 2019 Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, p. 1750-1769 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    On Singleton Arc Consistency for CSPs Defined by Monotone Patterns

    Carbonnel, C., Cohen, D. A., Cooper, M. C. & Živný, S., 20 Feb 2018, 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018. Niedermeier, R. & Vallée, B. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 96. p. 19:1-19:15 15 p. 19

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On Subtyping in Type Theories with Canonical Objects

    Lungu, G. & Luo, Z., Nov 2018, Types for Proofs and Programs: Post-proceedings of the 22nd Int. Conf. on Types for Proofs and Programs (TYPES 2016). Leibniz International Proceedings in Informatics, Vol. 97. p. 13:1-13:31 31 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    On the Absence of Predictive Complexity for Some Games

    Kalnishkan, Y. & Vyugin, M. V., 2002, Algorithmic Learning Theory 13th International Conference, ALT 2002, Proceedings: volume 2533 of Lecture Notes in Artificial Intelligence. Springer, (Lecture Notes in Artificial Intelligence; vol. 2533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    On the complexity of universal leader election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 100-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    On the Emergence of Properties in Component-Based Systems

    Fiadeiro, J. L., 1996, AMAST. Springer, Vol. 1101. p. 421-443 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    On the filtering of photoplethysmography signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 7033577

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    On the interplay between strategic performance measurement and managerial accounting change for sustainable development

    Subramaniam, N., 2015, European Network for Research in Organisational & Accounting Change (ENROAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution