Home > Publications

Publications

37751 - 37800 out of 41,350Page size: 50
  1. Published

    An e-healthcare mobile application: A stakeholders' analysis experience of reading

    Panteli, N., Pitsillides, B., Pitsillides, A. & Samaras, G., 2007, Web Mobile-Based Applications for Healthcare Management. IGI Global, p. 101-117 17 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  2. E-pub ahead of print

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    An Efficient Toolkit for Computing Private Set Operations

    Davidson, A. & Cid, C., 2017, Information Security and Privacy: 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II. Pieprzyk, J. & Suriadi, S. (eds.). Springer Heidelberg, Vol. 2. p. 261-278 18 p. (Lecture Notes in Computer Science; vol. 10343).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2007, 3rd International Workshop on Information Assurance (WIA 2007), April 11-13 2007, New Orleans, Louisiana, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published
  6. Published

    An efficient buyer-seller watermarking protocol based on Chameleon encryption

    Martin, K. M. & Poh, G. S., 2009, Digital Watermarking, 7th International Workshop (IWDW 2008). Springer, Vol. 5450. p. 433-447 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. Unpublished
  8. Published

    An Economic Model of Whistle-Blower Policy

    Heyes, A. & Kapur, S., May 2009, In: Journal of Law, Economics, & Organization. 25, 1, p. 157-182 26 p.

    Research output: Contribution to journalArticlepeer-review

  9. Unpublished
  10. Unpublished

    An Economic Analysis on Human Costs in Armed Conflict

    Lee, U. R., 2013, (Unpublished)

    Research output: ThesisDoctoral Thesis

  11. Published

    An ecological context for the Post-Roman Archaeology of the Somerset Moors (South West England, UK)

    Housley, R. A., Straker, V., Chambers, F. M. & Lageard, J. G. A., 2007, In: Journal of Wetland Archaeology. 7, p. 1-22 22 p.

    Research output: Contribution to journalArticlepeer-review

  12. Published

    An ecological comparison of Impatiens glandulifera Royle in the native and introduced range

    Tanner, R. A., Jin, L., Shaw, R., Murphy, S. T. & Gange, A. C., Aug 2014, In: Plant Ecology. 215, 8, p. 833-843 11 p.

    Research output: Contribution to journalArticlepeer-review

  13. Unpublished
  14. Published

    An early terrestrial biota preserved by Visean vulcanicity in Scotland

    Rolfe, W. D. I., Durant, G., Fallick, A. E., Hall, A. J., Large, D., Scott, A. C., Smithson, T. R. & Walkden, G., 1990, Volcanism and fossil biotas. . Lockley, M. & Rice, A. (eds.). Geological Society of America Special Publication , Vol. 244. p. 13-24 12 p. (Geological Society of America Special Publication ; vol. 244).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  15. Published

    An Early Private Indenture of Retainer: The Agreement Between Hugh Despenser the Younger and Sir Robert De Shirland

    Saul, N., Jun 2013, In: The English Historical Review. 128 , 532, p. 519-534

    Research output: Contribution to journalArticlepeer-review

  16. E-pub ahead of print

    An Early Pleistocene hippopotamus from Westbury Cave, Somerset, England: support for a previously unrecognized temperate interval in the British Quaternary record

    Adams, N. F., Candy, I. & Schreve, D. C., 4 Oct 2021, (E-pub ahead of print) In: Journal of Quaternary Science.

    Research output: Contribution to journalArticlepeer-review

  17. Published

    An early Pennsylvanian waterhole deposit and its fossil biota in a dryland alluvial plain setting, Joggins, Nova Scotia

    Falcon-Lang, H. J., Rygel, M., Gibling, M. R. & Calder, J. H., 2004, In: Journal of the Geological Society. 161, 2, p. 209-222

    Research output: Contribution to journalArticlepeer-review

  18. Published

    An early Carboniferous (Mississippian), Tournaisian, megaspore assemblage from Three Mile Plains, Nova Scotia, Canada

    Glasspool, I. J. & Scott, A. C., May 2005, In: Review of Palaeobotany and Palynology. 134, 3-4, p. 219-236 18 p.

    Research output: Contribution to journalArticlepeer-review

  19. Published

    An autosomal transcript in skeletal muscle with homology to dystrophin

    Love, D. R., Hill, D. F., Dickson, G., Spurr, N. K., Byth, B. C., Marsden, R. F., Walsh, F. S., Edwards, Y. H. & Davies, K. E., 1989, In: Nature. 339, 6219, p. 55-8 4 p.

    Research output: Contribution to journalArticlepeer-review

  20. Published

    An automated proof of the correctness of a compiling specification

    Scott, E., 1993, In: Workshops in Computing. p. 392-402

    Research output: Contribution to journalArticlepeer-review

  21. Published

    An Auto-Delegation Mechanism for Access Control Systems

    Crampton, J. & Morisset, C., 2010, Proceedings of 6th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    An authorization framework resilient to policy evaluation failures

    Crampton, J. & Huth, M., 2010, Computer Security – ESORICS 2010: 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010: Proceedings. Springer, p. 472-487 16 p. (Lecture Notes in Computer Science; vol. 6345).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    An Augmented Affine Projection Algorithm for the Filtering of Noncircular Complex Signals

    Cheong Took, C., 2010, In: Signal Processing. 90, 6, p. 1788-1799

    Research output: Contribution to journalArticlepeer-review

  24. Published

    An audit of tuberculosis health services in prisons and immigration removal centres

    Mehay, A., Raj, T., Altass, L., Newton, A., O'Moore, E., Railton, C., Tan, H., Story, A. & Frater, A., 30 May 2016, In: Journal of public health (Oxford, England).

    Research output: Contribution to journalArticlepeer-review

  25. Published

    An attack on some multi-party key agreement protocols

    Paterson, K. G., 2006, In: IEE Proceedings on Information Security. 153, 2, p. 59-60 2 p.

    Research output: Contribution to journalArticlepeer-review

  26. Published

    An Attack on Signed NFC Records and Some Necessary Revisions of NFC Specifications

    Saeed, Q. & Walter, C., Mar 2012, In: International Journal for Information Security Research. 2, 1/2, p. 325-334

    Research output: Contribution to journalArticlepeer-review

  27. Forthcoming

    An Attack Analysis of Managed Pressure Drilling Systems on Oil Drilling Platforms

    McEvoy, R. & Wolthusen, S. D., 2014, (Accepted/In press) Proceedings of the 9th International Workshop on Critical Information Infrastructures Security. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    An Atlas of Industrial Protest in Britain, 1750–1990

    Charlesworth, A. (ed.), Gilbert, D. (ed.), Randall, A. (ed.), Southall, H. (ed.) & Wrigley, C. (ed.), 24 Jan 1996, Palgrave Macmillan. 256 p.

    Research output: Book/ReportBook

  29. Published

    An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.

    Rantos, K. & Markantonakis, K., 2004, SEC'04. p. 351-366 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    An assessment of the tsunami risk in Muscat and Salalah, Oman, based on estimations of probable maximum loss

    Browning, J. & Thomas, N., 1 Jun 2016, In: International Journal of Disaster Risk Reduction. 16, p. 75-87 14 p.

    Research output: Contribution to journalArticlepeer-review

  31. Published

    An assessment of the long-term preservation of the DNA of a bacterial pathogen in ethanol-preserved archival material

    Barnes, I., Holton, J., Vaira, D., Spigelman, M. & Thomas, M. G., Dec 2000, In: JOURNAL OF PATHOLOGY. 192, 4, p. 554-559 6 p.

    Research output: Contribution to journalArticlepeer-review

  32. Published

    An assessment of mass discrimination in MC-ICPMS using Nd isotopes

    Vance, D. & Thirlwall, M., 1 May 2002, In: Chemical Geology. 185, 3-4, p. 227-240 14 p.

    Research output: Contribution to journalArticlepeer-review

  33. Unpublished
  34. Published

    An ash cloud, airspace and environmental threat

    Adey, P., Anderson, B. & Guerrero, L. L., 1 Jul 2011, In: Transactions of the Institute of British Geographers. 36, 3, p. 338-343 6 p.

    Research output: Contribution to journalArticlepeer-review

  35. Published

    An Artist’s Approach to the Modular Synthesizer in Experimental Electronic Music Composition and Performance

    Bruno, C., Feb 2016, In: eContact!. 17, 4

    Research output: Contribution to journalSpecial issuepeer-review

  36. Published

    An Art of the Ugly in Schelling’s Philosophie der Kunst: Questions concerning the ‘umgekehrt Symbolische’ of §103

    Whistler, D., 25 Nov 2019, In: Schelling-Studien. 7, p. 199-213 15 p.

    Research output: Contribution to journalArticlepeer-review

  37. Published

    An Argumentative Model for Service-oriented Agents

    Morge, M., McGinnis, J., Bromuri, S., Mancarella, P. & Stathis, K., 1 Mar 2008, Proc. of the International Symposium on Architectures for Intelligent Theory-Based Agents. Balduccini, M. & Baral, C. (eds.). p. 6 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    An Architecture to Support Multiple Subscriber Identity Applications Accessing Multiple Mobile Telecommunication Access Network Systems

    Francis, L., Mayes, K. & Markantonakis, K., 2008, THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 386-395 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    An Architecture for Audit Logging in a Smart Card Environment

    Markantonakis, K., Mar 1999, An Architecture for Audit Logging in a Smart Card Environment.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    An Architectural Support for Self-Adaptive Software for Treating Faults

    De Lemos, R. & Fiadeiro, J. L., 1 Jan 2002, Proceedings of the first ACM SIGSOFT Workshop on Self-Healing Systems (WOSS'02). p. 39-42 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  41. Published

    An architectural approach to mobility - The handover case study

    Oliveira, C., Wermelinger, M., Fiadeiro, J. L. & Lopes, A., 1 Jan 2004, Proceedings - Fourth Working IEEE/IFIP Conference on Software Architecture (WICSA 2004). p. 305-308 4 p.

    Research output: Chapter in Book/Report/Conference proceedingOther contribution

  42. Published

    An Arbitrary Line

    Cave, S., 30 Nov 2018, Broken Sleep Books. 98 p.

    Research output: Book/ReportBook

  43. Published

    An Araki-Lieb-Thirring inequality for geometrically concave and geometrically convex functions

    Audenaert, K., 2013, In: Linear Algebra and Its Applications. 438, 8, p. 3454-3462

    Research output: Contribution to journalArticlepeer-review

  44. Published

    An approximate algorithm for combinatorial optimization problems with two parameters

    Blokh, D. & Gutin, G., 1996, In: Australasian Journal of Combinatorics. 14, p. 157-164

    Research output: Contribution to journalArticlepeer-review

  45. Published

    An approach to early evaluation of informational privacy requirements

    Barn, B. S., Primiero, G. & Barn, R., 13 Apr 2015, p. 1370-1375. 6 p.

    Research output: Contribution to conferencePaperpeer-review

  46. Published

    An Appraisal of Australian Maritime Strategy: Part II

    Haggman, A., 28 Nov 2015, Future Foreign Policy.

    Research output: Other contribution

  47. Published

    An Appraisal of Australian Maritime Strategy: Part I

    Haggman, A., 7 Aug 2015, Future Foreign Policy.

    Research output: Other contribution

  48. Published

    An application-oriented framework for wireless sensor network key establishment

    Martin, K. M. & Paterson, M. B., 2008, Electronic Notes in Theoretical Computer Science: Proceedings of the Third Workshop on Cryptography for Ad-hoc Networks WCAN'07. 2 ed. Vol. 192. p. 31-41 11 p. (Electronic Notes in Theoretical Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  49. Published

    An Application of Univariate and Multivariate Approaches in fMRI to Quantifying the Hemispheric Lateralization of Acoustic and Linguistic Processes

    McGettigan, C., Evans, S., Rosen, S., Agnew, Z. K., Shah, P. & Scott, S. K., Mar 2012, In: Journal of Cognitive Neuroscience. 24, 3, p. 636-652 17 p.

    Research output: Contribution to journalArticlepeer-review

  50. Published

    An application of the Theory of Planned Behaviour to truck driving behaviour and compliance with regulations

    Poulter, D., Chapman, P., Bibby, P., Clarke, D. & Crundall, D., 2008, In: Accident Analysis and Prevention. 40, p. 2058-2064

    Research output: Contribution to journalArticlepeer-review