Home > Publications

Publications

40781 - 40790 out of 43,202Page size: 10
  1. Published

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK general election

    Ampofo, L., Anstead, N. & O'Loughlin, B., 2011, In: Information, Communication and Society.

    Research output: Contribution to journalArticlepeer-review

  2. Forthcoming

    Trust, confidence, credibility: Citizen responses on Twitter to opinion polls during the 2010 UK General Election

    O'Loughlin, B. & Anstead, N., 2012, (Accepted/In press) Social Media and Democracy: Innovations in Participatory Politics. Loader, B. & Mercea, D. (eds.). Abingdon and New York: Routledge, p. 91 108 p. (Routledge research in political communication).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Published

    Trusted Computing

    Mitchell, C. J. (ed.), 2005, IEE Press. 313 p.

    Research output: Book/ReportAnthology

  4. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings

    Chen, L. (ed.), Mitchell, C. J. (ed.) & Martin, A. (ed.), 2009, Springer-Verlag. 263 p. (Lecture Notes in Computer Science; vol. 5471)

    Research output: Book/ReportAnthology

  6. Published

    Trusted Computing: Providing security for Peer-to-Peer Networks

    Balfe, S., Lakhani, A. D. & Paterson, K. G., 2005, Proc. Fifth International Conference on Peer-to-Peer Computing. Caronni, G. (ed.). IEEE Computer Society Press, p. 117-124 8 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Published

    Trusted computing: Security and applications

    Gallery, E. M. & Mitchell, C. J., 2009, In: Cryptologia. 33, p. 217-245 29 p.

    Research output: Contribution to journalArticlepeer-review

  8. Published

    Trusted markets: the exchanges of Islamic companies

    Özcan, G. & Çokgezen, M., 2006, In: Comparative Economic Studies. 48, 1, p. 132-155

    Research output: Contribution to journalArticlepeer-review

  9. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution