Home > Publications

Publications

37501 - 37600 out of 41,091Page size: 100
  1. Conference contribution › Research
  2. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    On the pricing of commonality across various liquidity proxies in the London Stock Exchange

    Lim, S. & Giouvris, E., 2015, (Unpublished) On the pricing of commonality across various liquidity proxies in the London Stock Exchange.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, (E-pub ahead of print) Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., Jul 2021, ISSAC 2021. ACM, p. 289-296 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    On the undecidability of asynchronous session subtyping

    Lange, J. & Yoshida, N., 16 Mar 2017, Foundations of Software Science and Computation Structures - 20th International Conference, FOSSACS 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Esparza, J. & Murawski, A. S. (eds.). Springer Verlag, p. 441-457 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10203 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On the use of variable user goals to measure perceived usefulness

    Matook, S. & van der Heijden, H., 2007, Proceedings of the European Conference on Information Systems (ECIS). St Gallen, Switzerland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    On the Way to 'Euphonia': Berlioz's Promotion of Earlier Music

    Charlton, D., 2015, Von Gluck zu Berlioz.: Die französische Oper zwischen Antikenrezeption und Monumentalität.. Betzwieser, T. & Mauksch, S. (eds.). Würzburg: Konigshausen & Neumann, p. 139-58 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake

    Qu, Y., Wu, P. F. & Wang, X., 6 Apr 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On-line confidence machines are well-calibrated

    Vovk, V., 2002, Proceedings of the Forty Third Annual Symposium on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, p. 187-196 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Online conformal prediction for classifying different types of herbal medicines with electronic nose

    Zhan, X., Guan, X., Wu, R., Wang, Z., Wang, Y., Luo, Z. & Li, G., 4 Nov 2018, IET Doctoral Forum on Biomedical Engineering, Healthcare, Robotics and Artificial Intelligence 2018: BRAIN 2018. IET Conference Publications, Vol. 2018. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Online distance learning as a public policy tool for development

    Kromidha, E., 2013, Proceedings of the European Consortium for Political Research 2013 General Conference, 8-9 September 2013. Bordeaux, France

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Online Instructors: How does the presence on e-learning platforms matter?

    Wallace, A. & Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: E-business. The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    On-line network resource consumption prediction with confidence

    Luo, Z., 2007, Second International Conference on Communications and Networking in China, 2007. CHINACOM '07. . p. 104-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Online Prediction of Ovarian Cancer

    Zhdanov, F., Vovk, V., Burford, B., Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, Proceedings of the 12th Conference on Artificial Intelligence in Medicine. p. 375-379 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    On-line Prediction with Kernels and the Complexity Approximation Principle

    Gammerman, A., Kalnishkan, Y. & Vovk, V., 2004, Uncertainty in Artificial Intelligence, Proceedings of the Twentieth Conference. Chickering, M. & Halpern, J. (eds.). AUAI Press, p. 170-176

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    On-Line Probability, Complexity and Randomness

    Chernov, A., Shen, A., Vereshchagin, N. & Vovk, V., 2008, Proceedings of the Nineteenth International Conference on Algorithmic Learning Theory. Freund, Y., Gyorfi, L., Turan, G. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 5254. p. 138-153 16 p. (Lecture Notes in Artificial Intelligence; vol. 5254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    On-line Regression Competitive with Changing Predictors

    Busuttil, S. & Kalnishkan, Y., 2007, Algorithmic Learning Theory, 18th International Conference, ALT 2007, Proceedings: 4754 of Lecture Notes in Computer Science. Springer, p. 181-195 (Lecture Notes in Computer Science,; vol. 4754).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    On-line regression competitive with reproducing kernel Hilbert spaces

    Vovk, V., 2006, Theory and Applications of Models of Computation. Proceedings of the Third Annual Conference on Computation and Logic. Cai, J-Y., Cooper, S. & Li, A. (eds.). Berlin: Springer, Vol. 3959. p. 452-463 12 p. (Lecture Notes in Computer Science; vol. 3959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Online Total Ionisation Dosimeter (TID) monitoring using semiconductor based radiation sensors in the isis proton synchrotron

    Harryman, D., Sep 2016, International Beam Instrumentation Conference 2016. p. 379-382 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Open Game Tournaments in STARLITE

    Hopkins, J., Kafali, O. & Stathis, K., 4 May 2015, Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). IFAAMAS, p. 1927-1928 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Open Innovation and The Erosion of the Traditional Information Systems Project’s Boundaries

    Elbanna, A., 2008, IFIP WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Opening the black boxes of TAM: Towards a mixed methods approach

    Wu, P. F., 1 Dec 2009, ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Opéra Comique: Identity and Manipulation

    Charlton, D., 2001, Reading Critics Reading: Opera and Ballet Criticism in France from the Revolution to 1848. Parker, R. & Smart, M. A. (eds.). Oxford: Oxford University Press, p. 13-45 32 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Opéra-comique and the computer

    Charlton, D., 1992, Grétry et l'Europe de l'Opéra-Comique. Vendrix, P. (ed.). Liège: Mardaga, p. 367-78 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Optimal regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2011, FOMC'11, The Seventh ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing (part of FCRC 2011), San Jose, CA, USA, June 9, 2011, Proceedings. p. 52-61 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Optimal Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 20 Aug 2018, International Symposium on Mathematical Foundations of Computer Science. p. 1-14 14 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Optimisation and validation of a minimum data set for the identification and quality control of EST expression libraries

    Milnthorpe, A. T. & Soloviev, M., 2013, BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms. p. 278-281 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Or gate Bayesian networks for text classification: A discriminative alternative approach to multinomial naive Bayes

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2008, Actas del XIV Congreso Español sobre Tecnologías y Lógica Fuzzy. p. 385-390 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    ORC: an Ontology Reasoning Component for Diabetes

    Kafali, O., Sindlar, M., Weide, T. V. D. & Stathis, K., 2013, 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed'13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Organic components in interplanetary dust particles and their implications for the synthesis of cometary organics

    Chan, Q. H. S., Franchi, I. A. & Wright, I. P., Jul 2017, 80th Annual Meeting of the Meteoritical Society 2017. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Organisational cultural factors and strategic sensemaking in the opportunity exploration and exploitation processes

    Wang, C. L., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Organisational Success: Fact or Fiction

    Aboutalebi, R., 8 Oct 2009, In: Graduate Conference on Social Sciences and Management, the 3rd Graduate Conference on Social Sciences and Management, 8-9 October 2009, University of Bradford, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Organisational Success: Impacts of Ethic/Values, Organisation’s Social Responsibility, and Culture

    Aboutalebi, R., 5 Nov 2009, In: European Parliament, the 6th Conference on Ethics in Business, Corporate Culture & Spirituality. 5-6 November 2009, European Parliament, Brussels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Organizational diversity and shared vision: resolving the paradox of opportunity exploration and exploitation

    Wang, C. L., 2007, Strategic Management Society Special Conference on Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Organizational misfits and positive identity construction: Practitioner-academics as agents of change

    Lam, A., Jul 2018, 34th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Organizing Is Projects for Innovation: A Collective Mindfulness Perspective

    Elbanna, A. & Murray, D., 2009, The 15th Americas Conference on Information Systems . San Francisco

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Organo-Carbonate Association in Carbonaceous Chondrites

    Chan, QHS., Zolensky, ME. & Fries, M., 2015, 78th Annual Meeting of the Meteoritical Society. Vol. 1856. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Overcoming the utility problem in heuristic generation: Why time matters

    Barley, M., Franco, S. & Riddle, P., 10 Dec 2014, Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, ICAPS 2014: Portsmouth, New Hampshire, USA, June 21-26, 2014. Chien, S. A., Do, M. B., Fern, A. & Ruml, W. (eds.). AAAI Press, p. 38-46 9 p. (Proceedings International Conference on Automated Planning and Scheduling, ICAPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Overview of Fossil Beetles

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 153-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Overview of Laserwire Beam Profile and Emittance Measurements for High Power Proton Accelerators

    Gibson, S., Boorman, G., Bosco, A., Gabor, C., Letchford, A., Pozimski, J., Savage, P. & Hofmann, T., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK. p. 531-534 4 p. TUPF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Oxygenation at the onset of the Neoproterozoic – evidence from North China

    Zhou, Y., Basu, A., Dickson, A., Zhu, M. & Shields, G. A., 2021, Goldschmidt 2021 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Packrat middens: archives of desert biotic history

    Elias, S., 1995, Encyclopedia of Environmental Biology. Nierenburg, W. A. (ed.). San Diego, California: Academic Press, Vol. 3. p. 19-35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    PAIGE: Towards a hybrid-edge design for privacy-preserving intelligent personal assistants

    Liang, Y., O'Keeffe, D. & Sastry, N., 27 Apr 2020, EdgeSys 2020 - Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2020. Association for Computing Machinery, Inc, p. 55-60 6 p. (EdgeSys 2020 - Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Pairings for elliptic curves over finite commutative rings

    McKee, J. & Galbraith, S. D., 2005, Cryptography and Coding, Cirencester. p. 392-409 (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    PAL+: a lambda-free logical framework

    Luo, Z., 2000, Inter Workshop on Logical Frameworks and Meta-languages (LFM 2000).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Palaeocurrent data representation in tectonically-driven basins: insight from Ager Basin (Miocene, Spain) and Catanzaro Strait (Pleistocene, Italy)

    Chiarella, D. & Gioia, D., 2013, Geophysical Research Abstracts. Vol. 15. p. 9937

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Paleoclimatic studies: Insects and climate change

    Elias, S. A., 1996, SYMPOSIUM ON ENVIRONMENTAL APPLICATIONS. BOSTON: AMER METEOROLOGICAL SOC, p. 211-213 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Paleoecology and Late Quaternary environments of the Colorado Rockies

    Elias, S., 2001, Structure and Function of an Alpine Ecosystem, Niwot Ridge, Colorado. Bowman, W. (ed.). London: Oxford University Press, p. 285-303

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Pancake: Frequency Smoothing for Encrypted Data Stores

    Grubbs, P., Khandelwal, A., Lacharite, M-S., Brown, L., Li, L., Agarwal, R. & Ristenpart, T., Aug 2020, 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, p. 2451-2468 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published
  76. Published

    Paradoxes of Visibility in Activism: The Inter-play of Online Power Dynamics Between Activists and the State in the Egyptian Revolution

    Azer, E., Zheng, Y. & Harindranath, G., 29 Sep 2018, The 12th Mediterranean Conference on Information Systems. Corfu, Greece

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Parameter Learning in Bayesian Belief Networks

    Luo, Z. & Gammerman, A., 1992, Proceeding of IPMU'92. p. 25-28

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Parameterised Multiparty Session Types

    Yoshida, N., Denielou, P-M., Bejleri, A. & Hu, R., 2010, FOUNDATIONS OF SOFTWARE SCIENCE AND COMPUTATIONAL STRUCTURES, PROCEEDINGS. Ong, L. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 128-145 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Parameterised Pushdown Systems with Non‐Atomic Writes

    Hague, M., 2011, FSTTCS: Foundations of Software Technology and Theoretical Computer Science.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Parameterized Algorithms for Zero Extension and Metric Labelling Problems

    Reidl, F. & Wahlstrom, M., 2018, ICALP 2018 Track A. Vol. 107. p. 94:1-94:14 14 p. (Leibniz International Proceedings in Informatics ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Parameterized and Approximation Algorithms for the Load Coloring Problem

    Barbero, F., Gutin, G., Jones, M. & Sheng, B., 9 Nov 2015, 10th International Symposium on Parameterized and Exact Computation. Schloss Dagstuhl –Leibniz Center for Informatics, p. 43-54 12 p. (LIPIcs).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Parameterized Complexity and Kernelizability of Max Ones and Exact Ones Problems

    Kratsch, S., Marx, D. & Wahlström, M., 2010, Mathematical Foundations of Computer Science 2010 : 35th International Symposium, MFCS 2010. Hlinený, P. & Kucera, A. (eds.). Brno, Czech Republic: Springer, Vol. 6281. p. 489-500 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Parameterized Complexity of Conflict-Free Set Cover

    Jacob, A., Majumdar, D. & Raman, V., 1 Jul 2019, Computer Science – Theory and Applications - 14th International Computer Science Symposium in Russia, CSR 2019, Proceedings. Kucherov, G. & van Bevern, R. (eds.). Springer-Verlag, Vol. 11532 LNCS. p. 191-202 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11532 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Parameterized Complexity of Deletion to Scattered Graph Classes

    Jacob, A., Majumdar, D. & Raman, V., 4 Dec 2020, The 15th International Symposium on Parameterized and Exact Computation. LIPIcs, Vol. 180. p. 1-17 17 p. 18

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Parameterized Complexity of MaxSat Above Average

    Crowston, R., Gutin, G., Jones, M., Raman, V. & Saurabh, S., 2012, LATIN 2012: Lect. Notes Comput. Sci.. Springer-Verlag, Vol. 7256. p. 184--194

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Parameterized Complexity of the $k$-Arc Chinese Postman Problem

    Gutin, G., Jones, M. & Sheng, B., 6 Mar 2014, European Symposium on Algorithms 2014. Springer-Verlag, Vol. 8737. p. 530-541 (Lecture Notes in Computer Science; vol. 8737).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Parameterized Directed k-Chinese Postman Problem and k Arc-Disjoint Cycles Problem on Euler Digraphs

    Gutin, G., Jones, M., Sheng, B. & Wahlström, M., 2014, Proceedings of WG 2014.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Parameterized Pre-Coloring Extension and List Coloring Problems

    Gutin, G., Majumdar, D., Ordyniak, S. & Wahlström, M., 27 Feb 2020, LIPIcs, Proceedings of STACS 2020. Vol. 154. p. 1-18 18 p. 15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. E-pub ahead of print

    Parameterized Resiliency Problems via Integer Linear Programming

    Crampton, J., Gutin, G., Koutecky, M. & Watrigant, R., 14 Apr 2017, (E-pub ahead of print) CIAC 2017, 10th International Conference on Algorithms and Complexity May 26, 2017 - May 28, 2017. Springer, Vol. 10236. p. 164-176 13 p. (Lecture Notes in Computer Science; vol. 10236).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Parameterized Study of the Test Cover Problem

    Crowston, R., Gutin, G., Jones, M., Saurabh, S. & Yeo, A., 2012, MFCS 2012: Lecture Notes in Computer Science . Vol. 7464. p. 283-295

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Parameterized Two-Player Nash Equilibrium

    Hermelin, D., Huang, C-C., Kratsch, S. & Wahlström, M., 2011, Graph-Theoretic Concepts in Computer Science : 37th International Workshop, WG 2011. Kolman, P. & Kratochvíl, J. (eds.). Teplá Monastery, Czech Republic: Springer, Vol. 6986. p. 215-226 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Parent Subsidiary Relationship of EM MNCs: The Chinese Experience

    Rui, H., 2011, Proceedings of the 53rd Annual Meeting of the Academy of International Business: "International Business for Sustainable World Development". Makino, S. & Kiyak, T. (eds.). 2011 Academy of International Business

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Pareto Bid Estimation for Multi-Issue Bilateral Negotiation under User Preference Uncertainty

    Bagga, P., Paoletti, N. & Stathis, K., 5 Aug 2021, FUZZ-IEEE 2021. IEEE Xplore

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    PAriCheck: an efficient pointer arithmetic checker for C programs

    Younan, Y., Philippaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 13 Apr 2010, ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. Beijing, China: ACM, p. 145-156 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Parity to Safety in Polynomial Time for Pushdown and Collapsible Pushdown Systems

    Hague, M., Meyer, R., Muskalla, S. & Zimmermann, M., 20 Aug 2018, International Symposium of Mathematical Foundations of Computer Science. p. 1-15 15 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Partial Awareness

    Piermont, E. & Joseph Y. Halpern, 2019, Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Partial key recovery attacks on XCBC, TMAC and OMAC

    Mitchell, C. J., 2005, Cryptography and Coding: 10th IMA International Conference, Cirencester, UK, December 19-21, 2005. Proceedings. Smart, N. (ed.). Springer-Verlag, Vol. 3796. p. 155-167 13 p. (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Partially Distribution-Free Learning of Regular Languages from Positive Samples

    Clark, A. & Thollard, F., 2004, Proceedings of COLING. p. 85-91

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Partially Preserved Colonnades in Greek Architecture: the Probability of Matching Column Drums

    Mustonen, S. & Pakkanen, J., 2004, Making the Connection to the Past. CAA 99: Computer Applications and Quantitative Methods in Archaeology. Proceedings of the 27th Conference, Dublin, April 1999. Fennema, K. & Kamermans, H. (eds.). Leiden, p. 57–59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Participation, dialogue and curriculum development in school based AIDS education

    McLaughlin, C., Cobbett, M. & Kiragu, S., 2012, AIDS 2012.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Particle Tracking for the FETS Laser Wire Emittance Scanner

    Pozimski, J. & Gibson, S., 19 Sep 2013, 2nd International Beam Instrumentation Conference. p. 503-506 4 p. TUPF05

    Research output: Chapter in Book/Report/Conference proceedingConference contribution