Home > Publications

Publications

38301 - 38350 out of 41,106Page size: 50
  1. Conference contribution › Research
  2. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Paterson, K., Peer, G. & Smart, N., 2017, Computer Security – ESORICS 2017. Springer, p. 29-46 18 p. (Lecture Notes in Computer Science; vol. 10492).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Time independent and time dependent states of atoms in static external fields

    O'Mahony, P. F., Moser, I., Mota-Furtado, F. & dos Santos, J. P., 1998, ATOMS AND MOLECULES IN STRONG EXTERNAL FIELDS. NEW YORK: PLENUM PRESS DIV PLENUM PUBLISHING CORP, p. 169-180 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    Time is of the Essence: Spatiotemporalities of Food Delivery Platform Work in China

    Wu, P. F. & Zheng, Y., 13 May 2020, (E-pub ahead of print) Proceedings of the European Conference on Information Systems (ECIS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Time Pattern Analysis of Malware by Circular Statistics

    Pan, L., Tomlinson, A. & Koloydenko, A., 3 Jul 2017, Architectures for Networking and Communications Systems (ANCS), 2017 ACM/IEEE Symposium on. IEEE, p. 119-130 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Time Specific Encryption

    Paterson, K. & Quaglia, E., 2010, SCN. Springer, Vol. 6280. p. 1-16 16 p. (Lecture Notes in Computer Science; vol. 6280).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Time-Resolved Transverse Beam Profile Measurements with a Rest Gas Ionisation Profile Monitor Based on Hybrid Pixel Detectors

    Levasseur, S., Gibson, S., Bodart, D., Huschauer, H., Schneider, G., Storey, J., Bertsche, W., Sandberg, H., Satou, K. & Sapinski, M., Jun 2018, 9th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPAL075

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Time-Storage Trade-Offs for Cryptographically-Enforced Access Control

    Crampton, J., 2011, ESORICS: Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Atluri, V. & Diaz, C. (eds.). Springer, Vol. LNCS 6879. p. 245-261 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Unpublished

    To use or not to use Technology: Empowerment and ICTs

    Poveda Villalba, S., 2014, (Unpublished) To use or not to use Technology: Empowerment and ICTs. Human Development and Capability Association (HDCA)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Tokenisation Blacklisting Using Linkable Group Signatures

    Umar, A., Gurulian, I., Mayes, K. & Markantonakis, K., 14 Jun 2017, (E-pub ahead of print) Security and Privacy in Communication Networks: 12th EAI International Conference on Security and Privacy in Communication Networks. p. 182-198 17 p. (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Too Much Information: Questioning Security in a Post-Digital Society

    Coles-Kemp, L., Jensen, R. B. & Heath, C. P. R., Apr 2020, CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, p. 1-14 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Tool support for component-based semantics

    van Binsbergen, L. T., 14 Mar 2016, Companion Proceedings of the 15th International Conference on Modularity.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Tool Support for Coordination-Based Software Evolution

    Gouveia, J., Koutsoukos, G., Andrade, L. F. & Fiadeiro, J. L., 2001, TOOLS (38). IEEE Computer Society Press, p. 184-196 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Top Quark Measurements with ATLAS

    Bozson, A., 5 Mar 2019, Proceedings of the Tenth High-Energy Physics International Conference. Narison, S. (ed.). SLAC eConf, Vol. C180906. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Tourism in Canada’s North: Evaluating Experiences in Kluane National Park and Reserve, Yukon

    Prazeres, L., 2008, 12th Canadian Congress on Leisure Research Proceedings. Montréal, Canada, p. 349-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Toward a Tentative Strategy Implementation Model

    Aboutalebi, R. & Tan, H., 10 Sep 2013, In: BAM (British Academy of Management), 27th Annual Conference of BAM: Managing to Make a Difference. 10-12 September 2013, Aintree Racecourse, Liverpool, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Toward Modelling Organisational Success

    Aboutalebi, R., 7 Sep 2009, In: International Forum for Contemporary Chinese Studies, 2nd Conference of the International Forum for Contemporary Chinese Studies. 7-9 September 2009, University of Nottingham, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Toward the automation of business process ontology generation

    De Cesare, S., Juric, D. & Lycett, M., 18 Sep 2014, Proceedings - 16th IEEE Conference on Business Informatics, CBI 2014. Institute of Electrical and Electronics Engineers Inc., Vol. 1. p. 70-77 8 p. 6904139

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Towards a Common Notion of Privacy Leakage on Public Database

    Kiyomoto, S. & Martin, K. M., 2010, Proceedings of Fifth International Conference on Broadband, Wireless Computing, Communication and Applications (BWCCA’10). IEEE Computer Society Press, p. 186-191

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Towards a conceptualization of the emergent properties of Twitter as an information and news sharing environment.

    Soler-Adillon, J., Freixa, P., Sora, C. & Ribas, J. I., 1 Jul 2014, Periodismo actual y futuro: investigación, docencia e innovación. Cortiñas-Rovira, S. (ed.). Barcelona: Sociedad Española de Periodistica, p. 390 397 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. E-pub ahead of print

    Towards a Framework for Testing the Security of IoT Devices Consistently

    Lally, G. & Sgandurra, D., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, Vol. 11263. p. 88-102 15 p. (Lecture Notes in Computer Science ; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Towards a model facilitating discussions about Cyber Attacks and Defences

    Happa, J., Fairclough, G., Goldsmith, M. & Creese, S., 2014, Proceedings of the Workshop on Ethics and Policies for Cyber Warfare. NATO Cooperative Cyber Defence Centre of Excellence (CCDCoE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Towards a new tectonic model of the Askja caldera

    Browning, J., Gudmundsson, A. & Thordarson, T., 2015, Volcanic and Magmatic Studies Group Proceedings 2015. Vol. VMSG2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Towards a Verification Logic for Rewriting Logic

    Fiadeiro, J. L., Maibaum, T. S. E., Martí-Oliet, N., Meseguer, J. & Pita, I., 2000, WADT. Springer, Vol. 1827. p. 438-458 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Unpublished

    Towards a Virtual Sense of Place: Exploring 'Walking Simulator' Video Games

    Lowe, J., 30 Aug 2017, (Unpublished) Geographies of Digital Games session at RGS-IBG 2017.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Towards an architectural approach to location-aware business processes

    Aoumeur, N., Fiadeiro, J. & Oliveira, C., 1 Jan 2004, 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises. Vol. 13. p. 147-152 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Towards an Interdisciplinary Definition of Trust Using Logical Partitioning

    Moin, S. M. A., Devlin, J., McKechnie, S. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Towards Automated Diagnosis of Basal Cell Carcinoma

    Larraona-Puy, M., Ghita, A., Zoladek, A., Koloydenko, A., Perkins, W., Leach, I., Varma, S., Williams, H. & Notingher, I., 2010, American Institute of Physics Conference Series. Vol. 1267. p. 364-365 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Towards Composable Threat Assessment for Medical IoT (MIoT)

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2017, The fourth International Workshop on Privacy and Security in HealthCare 2017 (PSCare17).. Procedia Computer Sciences, Vol. 113. p. 627-632 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Towards Distributed Collaborative Workflow Management for Mobile Devices

    Kocúrová, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, Data-Driven Process Discovery and Analysis - First International Symposium, SIMPDA 2011, Campione d'Italia, Italy, June 29 - July 1, 2011, Revised Selected Papers. p. 1-20 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Towards enforcing on-the-fly policies in BYOD environments

    Costantino, G., Martinelli, F., Saracino, A. & Sgandurra, D., 5 Nov 2014, 2013 9th International Conference on Information Assurance and Security, IAS 2013. Institute of Electrical and Electronics Engineers Inc., p. 61-65 5 p. 6947734

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Towards General Algorithms for Grammatical Inference

    Clark, A., 1 Oct 2010, Algorithmic Learning Theory, 21st International Conference. Hutter, M., Stephan, F., Vovk, V. & Zeugmann, T. (eds.). Springer, p. 11-30

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Towards improved distributed collaborative workflow management for mobile devices

    Kocurova, A., Oussena, S., Komisarczuk, P., Clark, T. & Kramer, D., 2011, First International Symposium on Data-Driven Process Discovery and Analysis (SIMPDA 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Forthcoming

    Towards Improving Code-Stylometry Analysis in Underground Forums

    Blasco Alis, J., Pastrana, S., Suarez-Tangil, G. & Tereszkowski-Kaminski, M., 1 Aug 2021, (Accepted/In press) 22nd Privacy Enhancing Technologies Symposium (PETS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Towards robust and efficient computation in dynamic peer-to-peer networks

    Augustine, J., Pandurangan, G., Robinson, P. & Upfal, E., 2012, Proceedings of the Twenty-Third Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2012, Kyoto, Japan, January 17-19, 2012. p. 551-569 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Towards Runtime Support for Norm-Governed Multi-Agent Systems

    Urovi, V., Bromuri, S., Stathis, K. & Artikis, A., 2010, Principles of Knowledge Representation and Reasoning: Proceedings of the Twelfth International Conference, KR 2010, Toronto, Ontario, Canada, May 9-13, 2010. Lin, F., Sattler, U. & Truszczynski, M. (eds.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Towards Static Analysis of Virtualization-Obfuscated Binaries

    Kinder, J., Oct 2012, Proc. 19th Working Conf. Reverse Engineering (WCRE 2012). IEEE, p. 61-70

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Towards trusted execution of multi-modal continuous authentication schemes

    Shepherd, C., Akram, R. & Markantonakis, K., 3 Apr 2017, Proceedings of the 32nd ACM SIGAPP Symposium On Applied Computing (SAC '17). Marrakech, Morocco: ACM, p. 1444-1451 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Trace formulae for quantum graphs

    Bolte, J. & Endres, S., 2008, Analysis on Graphs and Its Applications. Exner, P., Keating, J. P., Kuchment, P., Sunada, T. & Teplyaev, A. (eds.). American Mathematical Society, p. 247-259 13 p. (Proceedings of Symposia in Pure Mathematics; vol. 77).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Trace measures in business and society research

    Preuss, L., 2015, Annual Meeting of the International Association for Business and Society.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Tracing Man-in-the-Middle in monoidal categories

    Pavlovic, D., 2012, Proceedings of CMCS 2012. Pattinson, D. & Schroeder, L. (eds.). Springer-Verlag, p. 28pp (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Tracing Success in the Voluntary Use of Open Technology in Organisational Setting

    Elbanna, A. & Linderoth, H. C. J., 2013, .. p. 89-104

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Tracing the global spread of CSR

    Preuss, L., Jun 2013, International Association for Business and Society (IABS) Annual Meeting.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Tracking the global diffusion of management ideas

    Preuss, L., Aug 2014, Annual Meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Trade-offs in corporate sustainability: Towards an analytical framework

    Hahn, T., Figge, F., Pinkse, J. & Preuss, L., Aug 2010, annual meeting of the Academy of Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Trade-offs in cryptographic implementations of temporal access control

    Crampton, J., 2009, Proceedings of 14th Nordic Workshop on Secure IT Systems. Springer, p. 72-87 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Tradition and Modernity in Buddhist Storytelling

    Utairat, M., 2016, Presenting the Theatrical Past, IFTR World Congress 2016, Stockholm, Sweden .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Traditional and (or) new media: teachers' work experience and application of media in schools

    Pavlovic, D., Stanisavljevic Petrovic, Z. & Soler-Adillon, J., 21 Apr 2016, eLearning Vision 2020!: Proceedings of the 12th International Scientific Conference "eLearning and Software for Education" Bucharest, April 21 - 22, 2016 . Roceanu, I. (ed.). Bucharest, Romania: "Carol I" National Defense University, Vol. 2. p. 182-187 6 p. 29

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Traffic control and resource management using a multi-agent system

    Luo, Z., Bigham, J., Cuthbert, L. & Hayzelden, A., 1999, Broadband Communications: Convergence of Network Technologies. Tsang, D. H. K. & Kuhn, P. J. (eds.). USA: Kluwer Academic Publishers, p. 595-606

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Traffic management in satellite ATM bridge

    Sun, Z., Komisarczuk, P., Coakley, FP. & Evans, BG., 1994, Teletraffic Symposium, 11th. Performance Engineering in Telecommunications Networks. IEE Eleventh UK. p. 8B-1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Training Data and Rationality

    Mersinas, K., Sobb, T., Sample, C., Bakdash, J. & Ormrod, D., Oct 2019, European Conference on the Impact of Artificial Intelligence and Robotics. Griffiths, P. & Kabir, M. N. (eds.). Oxford, UK: Academic Conferences and Publishing International Limited, p. 225-232 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution