Home > Publications

Publications

36601 - 36700 out of 39,660Page size: 100
  1. Conference contribution › Research
  2. Published

    'Roellig in charge': a reassessment of the cantata repertoire in Zerbst between 1749 and 1765

    Springthorpe, N., 2017, Fasch-Studien 14: 'Fasch und die Konfessionen': Bericht über die Internationale Wissenschaftliche Konferenz vom 21. bis 22. April 2017 im Rahmen der 14. Internationalen Fasch-Festtage in Zerbst. Beeskow: Ortus Musikverlag, p. 225-252 27 p. (Fasch-Studien; vol. XIV).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    ROTOR: A Tool for Renaming Values in OCaml's Module System

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 28 May 2019, IWOR '19 Proceedings of the 3rd International Workshop on Refactoring. IEEE Press, p. 27-30 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Rule Value Reinforcement Learning for Cognitive Agents

    Child, C. & Stathis, K., 1 May 2006, Proc. of 5th International Conference on Autonomous Agents an d Multi-agent Systems (AAMAS06). p. 792-794 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Saadiyat and sovereign wealth in the United Arab Emirates: the making of a premier island destination

    Chong, D., 2016, The Art Marketing in Global Perspective (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Safe Specification of Operator Precedence Rules

    Afroozeh, A., van den Brand, M., Johnstone, A., Scott, E. & Vinju, J., 2013, Software Language Engineering Lecture Notes in Computer Science . Vol. 8225. p. 137-156 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Saladin and Gift-Giving

    Phillips, J., 3 Jan 2020, The History of Syria, 1099-1250: Conflict and Co-existence. Hillenbrand, C. (ed.). Edinburgh University Press, p. 307-320

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Salem numbers and Pisot numbers from stars

    McKee, J., Smyth, C. J. & Rowlinson, P., 1999, Number Theory in Progress: Number ThProceedings of the International Conference on Number Theory in Honor of Andrzej Schinzel, held in Zakopane, Poland, June 30 – July 9, 1997. Part I: Diophantine Problems and Polynomials. de Gruyter, p. 309-319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Salience and Asset Prices

    Bordalo, P., Gennaioli, N. & Shleifer, A., May 2013, American Economic Review, Papers & Proceedings. Vol. 103(3). p. 623-628

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Saturation algorithms for model-checking pushdown systems

    Hague, M. & Carayol, A., May 2014, Proceedings of the 14th International Conference on Automata and Formal Languages . 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Saturation of Concurrent Collapsible Pushdown Systems

    Hague, M., 12 Dec 2013, FSTTCS: Foundations of Software Technology and Theoretical Computer Science. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Scalable communication middleware for permissioned distributed ledgers

    Barger, A., Manevich, Y., Mandler, B., Bortnikov, V., Laventman, G. & Chockler, G., 22 May 2017, SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage Conference. New York: ACM, p. 1 1 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Scalable Group Membership Services for Novel Applications

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1998, Proceedings of the DIMACS Workshop on Networks in Distributed Computing. Merritt, M. & Shavit, N. (eds.). American Mathematical Society, p. 23-42 20 p. (DIMACS Series in Discrete Mathematics and Theoretical Computer Science; vol. 45).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Scalable RFID pseudonym protocol

    Song, B. & Mitchell, C. J., 2009, NSS 2009, Network & System Security, 19-21 October 2009, Gold Coast, Queensland, Australia. IEEE Computer Society Press, p. 216-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Science as a vocation? Hybrid academics in overlapping institutional and career spaces

    Lam, A., Jun 2019, National Science Foundation (NSF) Workshop: 'Science as a Vocation: A Centennial Perspective', Boston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Scriptcloud.com: Content Clouds for Screenplays

    McKie, S., 2 Jan 2008, Semantic Media Adaptation and Personalization, Second International Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    SDN-Actors: Modeling and Verification of SDN Programs

    Albert, E., Gómez-Zamalloa, M., Rubio, A., Sammartino, M. & Silva, A., 12 Jul 2018, Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Springer-Verlag, p. 550-567 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Searches for gravitational effects at the TeV scale with the ATLAS detector

    Berry, T., 18 Mar 2014, Proceedings of the European Physical Society Conference on High Energy Physics. Proceedings of Science, p. 1-6 6 p. PoS(EPS-HEP 2013)261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Secure implementations for typed session abstractions

    Corin, R., Denielou, P-M., Fournet, C., Bhargavan, K. & Leifer, J., 2007, 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings. LOS ALAMITOS: IEEE COMPUTER SOC, p. 170-186 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

    Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M. & Darwish, S., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 777-784 8 p. 6296048

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Securing a Community Cloud

    Baiardi, F. & Sgandurra, D., 1 Jun 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. p. 32-41 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Security and Integrity of a Distributed File Storage in a Virtual Environment

    Sala, G., Sgandurra, D. & Baiardi, F., 1 Sep 2007, Fourth International IEEE Security in Storage Workshop. p. 58-69 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P., Aug 2014, Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, p. 1-19 19 p. (Lecture Notes in Computer Science; vol. 8616).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Security Server-Based Architecture for Mobile Ad Hoc Networks

    Darwish, S., Taylor, S. J. E. & Ghinea, G., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 926-930 5 p. 6296071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Security V&V Within Software SMEs: A Socio-Technical Interaction Network Analysis

    Kreeger, M. N. & Harindranath, G., 22 Jun 2017, Proceedings of the 2017 International Conference on Information Resources Management (Conf-IRM 2017). Janczewski, L., Cunha, M. A. & Sánchez, A. (eds.). Santiago, Chile: Conf-IRM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Security Verification and Validation by Software SMEs: Theory versus Practice

    Kreeger, M. N. & Harindranath, G., 2012, Proceedings of the 2012 International Conference on Information Resources Management (Conf-IRM 2012). Brandtweiner, R. & Janczewski, L. (eds.). Vienna, Austria: Conf-IRM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Security vulnerabilities in DNS and DNSSEC

    Ariyapperuma, S. & Mitchell, C. J., 2007, Proceedings of ARES 2007, The International Conference on Availability, Reliability and Security, Vienna, April 2007. IEEE Computer Society Press, p. 335-342 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Sedimentation in structurally-confined narrow basins: toward the identification of uncommon depositional system

    Longhitano, S. G., Casciano, C., Chiarella, D., Sabato, L. & Tropeano, M., 2016, AAPG Annual Convention & Exhibition 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Sedimentation in tectonically-confined narrow basins: do classical depositional models still work?

    Longhitano, S. G. & Chiarella, D., 2016, Advances in siliciclastic and carbonate sedimentology:concepts and case studies from the Norwegian Continental Shelf. p. 9-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Sedimentology of a mixed (bioclastic/siliciclastic) Pliocene succession near Acerenza (Southern Apennines, Basilicata, Italy

    Chiarella, D., Longhitano, S. G., Sabato, L. & Tropeano, M., 2008, 26th IAS 2009 – Books of Abstract. p. 78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Sediments segregation rate as tool for discriminating depositional environments in ancient mixed (silici-/bioclastic) shallow-water marine system (Pliocene, Southern Apennines, Italy)

    Chiarella, D. & Longhitano, S. G., 2009, 27th IAS 2009 – Books of Abstract. p. 469

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Selective mixture of Gaussians clustering for location fingerprinting

    Nguyen, K. & Luo, Z., 5 Dec 2014, 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (i-Locate, MOBIQUITOUS 2014). London, UK: ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Selective, multi-level modelling for accelerated simulation of large, heterogeneous corporate telecommunications networks

    Pitts, J., Luo, Z., Nyong, D. & Cosmas, J., 1998, 15th IEE UK Teletraffic Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Self-calibrating probability forecasting

    Vovk, V., Shafer, G. & Nouretdinov, I., 2004, Advances in Neural Information Processing Systems. Thrun, S., Saul, L. & Schoelkopf, B. (eds.). Cambridge, MA: MIT Press, Vol. 16. p. 1133-1140 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Self-Esteem as a Moderator of the Effects of Mortality Salience on Consumer Disposing Behavior

    Atalay, S., Türe, M. & Young, K., 2010, Proceedings of the 39th EMAC Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Self-organization and novelty: pre-configurations of emergence in early British Cybernetics

    Soler-Adillon, J. & Penny, S., 24 Jun 2014, Norbert Wiener in the 21st Century (21CW), 2014 IEEE Conference on. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Semantics of Architectural Connectors

    Fiadeiro, J. L. & Lopes, A., 1997, TAPSOFT. Springer, Vol. 1214. p. 505-519 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Semantics of Interworking Knowledge Based Systems

    Reichwein, G. & Fiadeiro, J. L., 1993, EPIA. Springer, Vol. 727. p. 93-104 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Semi-Algebraic Proofs, IPS Lower Bounds and the τ-Conjecture: Can a Natural Number be Negative?

    Alekseev, Y., Grigoriev, D., Hirsch, E. & Tzameret, I., Jun 2020, STOC 2020: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing. Association for Computing Machinery (ACM), p. 54-67 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Senescent ground tree rewrite systems

    Hague, M., 14 Jul 2014, CSL-LICS '14 Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Ameen, N. & Shah, M., 2019, Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Sensor Network Grids: Agent Environment combined with QoS in Wireless Sensor Networks

    Stathis, K., Kafetzoglou, S. & Bromuri, S. P. A. N. S., 1 Jun 2007, Proceedings of the 3rd International Conference on Autonomic and Autonomous Systems (ICAS'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Separable states of $N$ quantum bits

    Schack, R. & Caves, C. M., 1999, Proceedings of the X. International Symposium on Theoretical Electrical Engineering. Mathis, W. & Schindler, T. (eds.). Magdeburg: Otto-von-Guericke University, p. 73-78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Serverless protocols for inventory and tracking with a UAV

    Mtita, C., Laurent, M., Sauveron, D., Akram, R. N., Markantonakis, K. & Chaumette, S., 9 Nov 2017, Digital Avionics Systems Conference (DASC), 2017 IEEE/AIAA 36th. St. Petersburg, Florida, USA: IEEE Computer Society Press, p. 1-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Service Extraction from Legacy Systems

    Matos, C., 2008, Proceedings of the International Conference on Graph Transformation (ICGT). Ehrig, H., Heckel, R., Rozenberg, G. & Taentzer, G. (eds.). Springer-Verlag, Vol. 4758. p. 505-507 3 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Service providers perceptions of Japans e-government services using the importance-performance (IPA) model

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2012, Asian Conference on Information Systems, Siem Reap, Cambodia, 06 - 08 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Service-oriented modelling of automotive systems

    Bocchi, L., Fiadeiro, J. L. & Lopes, A., 1 Jan 2008, Proceedings - International Computer Software and Applications Conference. p. 1059-1064 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Set cover problems in role-based access control

    Chen, L. & Crampton, J., 2009, Proceedings of 14th European Symposium on Research in Computer Security. Springer, p. 689-704 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Setting the Stage: Environmental Conditions in Beringia as People Entered the New World.

    Elias, S., 2002, The First Americans: The Pleistocene Colonization of the New World. Jablonski, N. (ed.). San Francisco: California Academy of Sciences, p. 9-26 (Memoirs of the California Academy of Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Shallow magma chamber formation and evolution

    Barnett, Z. & Gudmundsson, A., 2013, Rock Fractures in Geological Processes: Abstracts of the Presentations at the Symposium. University Press Göttingen

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Share ownership and trade unions: sleeping with the enemy?

    Sen Gupta, S., 2007, International Industrial Relations Association (IIRA), Manchester.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Share ownership and unions: are they compatible in the present industrial climate?

    Sen Gupta, S., 2010, British Universities Industrial Relations Association (BUIRA), Manchester.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Sharing Data through Confidential Clouds: An Architectural Perspective

    Sgandurra, D., Di Cerbo, F., Trabelsi, S., Martinelli, F. & Lupu, E., 7 Aug 2015, Proceedings - 1st International Workshop on TEchnicaland LEgal Aspects of Data pRIvacy and Security, TELERISE 2015. p. 58-61 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Shifting the mainstream: Conference Keynote Speech

    Conroy, C., 2003, Shifting Aesthetic: Disability and Performance: Conference Proceedings. London Arts Board

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Shiite Marja’iyya: The Association of Shiite Quietism and Activism

    Kalantari, M., 28 Mar 2012, British Society for Middle Eastern Studies Annual Conference: LSE, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Short Proofs for the Determinant Identities

    Hrubes, P. & Tzameret, I., 19 May 2012, Proceedings of the 44th Annual ACM Symposium on the Theory of Computing (STOC). p. 193-212

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Short Propositional Refutations for Dense Random 3CNF Formulas

    Muller, S. & Tzameret, I., Jun 2012, Proceedings of the 27th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS): 25-28 June 2012. p. 501-510 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Short-term periodicity tidal cycles within ancient mixed siliciclastic/bioclastic deposits: examples from Pliocene shallow-water successions of southern Apennines (Italy)

    Longhitano, S. G. & Chiarella, D., 2008, 26th IAS 2009 – Books of Abstract. p. 174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Should I Keep or Should I Give: The Effects of Mortality Salience on Disposing

    Atalay, S. & Türe, M., 2009, NA - Advances in Consumer Research . Vol. 36. p. 820-821

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. E-pub ahead of print

    Simple Encrypted Arithmetic Library - SEAL v2.1

    Chen, H., Laine, K. & Player, R., 19 Nov 2017, Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Springer-Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science ; vol. 10323 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Simple Power Analysis of Unified Code for ECC Double and Add

    Walter, C. D., 2004, CHES 2004. Joye, M. & Quisquater, J-J. (eds.). Springer, Vol. 3156. p. 191-204 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Simple techniques for enhancing the robustness of DSR

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of the 3rd Scandinavian Workshop on Wireless Ad-hoc Networks (ADHOC '03), Stockholm, Sweden, May 2003. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes

    Freire, E. S. V., Paterson, K. G. & Poettering, B., 2013, CT-RSA 2013. Dawson, E. (ed.). Springer, Vol. 7779. p. 101-114 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    SIMPLE: developing a LBS positioning solution

    Wierenga, J. & Komisarczuk, P., 2005, Proceedings of the 4th International Conference on Mobile and Ubiquitous Multimedia, MUM 2005, Christchurch, New Zealand, December 8-10, 2005. p. 48-55 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution