Home > Publications

Publications

34401 - 34500 out of 39,229Page size: 100
  1. Conference contribution › Research
  2. E-pub ahead of print

    A framework for understanding the empowerment effects of telecentres on rural communities in developing countries

    Kapondera, S. K., Bernadi, R. & Panteli, N., 26 Apr 2019, Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part I. Nielsen, P. & Kimaro, H. C. (eds.). Springer, p. 104-115 12 p. (IFIP Advances in Information and Communication Technology; vol. 551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    A Full Operational Semantics for Asynchronous Relational Networks

    Vissani, I., Lopez Pombo, C., Tutu, I. & Fiadeiro, J. L., 30 Dec 2015, Recent Advances in Algebraic Development Techniques. Springer, p. 131-150 20 p. (Lecture Notes in Computer Science; vol. 9463).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. E-pub ahead of print

    A Functional Perspective on Machine Learning via Programmable Induction and Abduction

    Cheung, S., Davariu, V., Ghica, D., Muroya, K. & Rowe, R., 24 Apr 2018, FLOPS 2018: Functional and Logic Programming. Springer, Vol. 10818. p. 84-98 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    A game of prediction with expert advice

    Vovk, V., 1995, Proceedings of the Eighth Annual Conference on Computational Learning Theory . Maass, W. (ed.). New York: ACM Press, p. 51-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    A Gender Agenda

    Broadbent, J., 2015, (Unpublished) Meditari Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    A graph based architectural (re)configuration language

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 1 Jan 2001, 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001. p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A High Power Fibre Laser for Electron Beam Emittance Measurements

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2010, IPAC 2010 - 1st International Particle Accelerator Conference. p. 3227-3229 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    A Holistic Approach to Simulating Beam Losses in the Large Hadron Collider Using BDSIM

    Walker, S., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Nevay, L., Pikhartova, H. & Shields, W., 4 May 2019, 13th International Computational Accelerator Physics Conference: ICAP2018, Key West, FL, USA. JACoW Publishing, p. 221-226 6 p. TUPAF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A Hybrid Model for International Strategy Implementation

    Aboutalebi, R. & Tan, H., 23 Jun 2014, In: AIB (Academy of International Business), 56th annual conference of AIB: International Business, Local Contexts in Global Business. 23-26 June 2014, Beedie School of Business, Simon Fraser University, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A knowledge management perspective on a corporate portal implementation: A case study of a global IT-management consultancy firm

    Le Nguyen, K., Harindranath, G. & Dyerson, R., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A Lambek Calculus with Dependent Types

    Luo, Z., 2015, Types for Proofs and Programs.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A learnable representation for syntax using residuated lattices

    Clark, A., 2009, Proceedings of the Conference on Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A Lightweight Service Registry for Unstable Ad-hoc Networks

    Goncalves, P., Stathis, K. & Peach, N., 16 Nov 2011, Proceedings of the International Joint Conference on Ambient Intelligence (AmI 2011). p. 136-140 (Lecture Notes in Computer Science; vol. 7040/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    A long-range self-similarity approach to segmenting DJ mixed music streams

    Scarfe, T., Koolen, W. M. & Kalnishkan, Y., 2013, Artificial Intelligence Applications and Innovations: Proceedings of the 9th IFIP WG 12.5 International Conference, AIAI 2013, Paphos, Cyprus, September 30 – October 2, 2013. Papadopoulos, H., Andreou, A. S., Iliadis, L. & Maglogiannis, I. (eds.). Springer, p. 235-244 10 p. (IFIP Advances in Information and Communication Technology; vol. 412).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A methodological approach to visual reasoning

    Liu, X., Zhang, G. & Luo, Z., 1989, Proceeding of International workshop on industrial applications of machine intelligence and vision. Japan, p. 50-55

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Unpublished

    A micromorphological assessment of Lateglacial Swedish clay varves from Svinstadsjön, Östergötland – understanding proglacial lake processes and refining a site varve chronology

    Devine, R., 2018, (Unpublished) Conference abstract - Poster presentation.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    A Middleware Framework for Robust Applications in Wireless Ad Hoc Networks

    Chockler, G., Demirbas, M., Gilbert, S. & Newport, C., Sep 2005, Proceeding of the 43rd Allerton Conference on Communication, Control, and Computing. Curran Associates

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A mobile phone based personal narrative system

    Black, R., Waller, A., Tintarev, N., Reiter, E. & Reddington, J., 2011, The proceedings of the 13th international ACM SIGACCESS conference on Computers and accessibility. p. 171-178 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Model for Robust Distributed Hierarchical Electric Power Grid State Estimation

    Baiocco, A., Foglietta, C., Panzieri, S. & Wolthusen, S. D., 19 May 2014, Proceedings of the 2014 IEEE PES Innovative Smart Grid Technologies Conference (ISGT 2014). IEEE Press, p. 1 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A Model for Secure and Mutually Beneficial Software Vulnerability Sharing

    Davidson, A., Fenn, G. & Cid, C., 24 Oct 2016, WISCS '16 Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security. ACM, p. 3-14 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A Modular Hierarchy of Logical Frameworks

    Adams, R., 2004, Types for Proofs and Programs. Berardi, S., Coppo, M. & Damiani, F. (eds.). Springer, Vol. 3085. p. 1-16 16 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A multi-agent based management system for future ATM networks

    Hayzelden, A., Bigham, J. & Luo, Z., 1999, Proceedings of the Fourth International Conference and Exhibition on the Practical Application of Intelligent Agents and Multi-Agents (PAAM'99). p. 179-192

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A multi-agent based management system for service provider negotiation and charging

    Bigham, J., Cuthbert, L., Hayzelden, A. & Luo, Z., 1999, Proceedings of IFIP TC6 Workshop.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A Multi-Robot Platform for the Autonomous Operation and Maintenance of Offshore Wind Farms

    Bernardini, S., Jovan, F., Jiang, Z., Watson, S., Weightman, A., Moradi, P., Richardson, T., Sadeghian, R. & Sareh, S., May 2020, International Conference on Autonomous Agents and Multi-Agent Systems 2020 . p. 1696-1700 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A Multivocal and Multilevel Institutionalist Perspective to Analyse Information Technology Enabled Change in the Public Service in Africa

    Bernardi, R., 2008, IT in the Service Economy: Challenges and Possibilities for the 21st Century: IFIP International Federation for Information Processing. Barrett, M., Davidson, E., Middleton, C. & DeGross, J. (eds.). Boston: Springer, Vol. 267. p. 271-280

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A Mutual Authentication Protocol for Low-Cost RFID Tags Formally Verified Using CasperFDR and AVISPA

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 9 Dec 2013, The 8th Internet Technology and Secured Transactions (ICITST), : The 5th International Workshop on RFID Security and Cryptography (RISC 2013). London: IEEE Computer Society Press, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A New Efficient In Situ Sampling Model for Heuristic Selection in Optimal Search

    Franco, S., Barley, M. W. & Riddle, P. J., 2013, AI 2013: Advances in Artificial Intelligence : 26th Australasian Joint Conference, Dunedin, New Zealand, December 1-6, 2013. Proceedings. Cranefield, S. & Nayak, A. C. (eds.). Springer, p. 178-189 12 p. (Lecture Notes in Computer Science; vol. 8272).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    A new look at user commitment towards information systems: Evidence from Amazon’s Mechanical Turk

    van der Heijden, H., 2012, Proceedings of the European Conference on Information Systems (ECIS). Barcelona, Spain

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A new model to explain the occurrence of volcanism along caldera ring faults

    Browning, J. & Gudmundsson, A., 2014, The Volcanic and Magmatic Studies Group Proceedings 2014. Vol. VMSG 2014 A.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A new security middleware architecture based on fog computing and cloud to support IoT constrained devices

    Razouk, W., Sgandurra, D. & Sakurai, K., 17 Oct 2017, International Conference on Internet of Things and Machine Learning. ACM, p. 1-8 8 p. 35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. E-pub ahead of print

    A Non-wellfounded, Labelled Proof System for Propositional Dynamic Logic

    Docherty, S. & Rowe, R., 14 Aug 2019, TABLEAUX 2019: Automated Reasoning with Analytic Tableaux and Related Methods. Springer, p. 335-352 18 p. (Lecture Notes in Computer Science; vol. 11714).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A novel method for sub-micrometer transverse electron beam size measurements using optical transition radiation

    Aryshev, A., Boogert, S. T., Howell, D., Karataev, P., Terunuma, N. & Urakawa, J., 2010, VIII INTERNATIONAL SYMPOSIUM ON RADIATION FROM RELATIVISTIC ELECTRONS IN PERIODIC STRUCTURES (RREPS-2009). Strikhanov, MN. & Pivovarov, YL. (eds.). BRISTOL: IOP PUBLISHING LTD, p. - 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Novel Scoring Model to Detect Potential Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012. p. 254-263 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    A novel stateless authentication protocol

    Mitchell, C. J., 2013, Security Protocols XVII: 17th International Workshop, Cambridge, UK, April 1-3, 2009, Revised Selected Papers. Christianson, B., Malcolm, J. A., Matyas, V. & Roe, M. (eds.). Springer-Verlag, Vol. 7028. p. 269-274 6 p. (Lecture Notes in Computer Science; no. 7028).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    A paleoenvironmental setting for early Paleoindians in western North America: evidence from the insect fossil record

    Elias, S., 1995, Ancient Peoples and Landscapes. Johnson, E. (ed.). Lubbock, Texas: Texas Tech University Press, p. 255-272

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A Paradigm Shift in Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2010, Proceedings of the 2010 International Conference on Computational Science and Its Applications (ICCSA 2010). Apduhan, B. O., Gervasi, O., Iglesias, A., Taniar, D. & Gavrilova, M. (eds.). Fukuoka, Japan: IEEE Computer Society Press, p. 191-200 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    A Parallel Architecture for Stateful, High-Speed Intrusion Detection

    Foschini, L., Thapliyal, A. V., Cavallaro, L., Kruegel, C. & Vigna, G., 2008, 4th International Conference on Information Systems Security (ICISS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Forthcoming

    A Performant, Misuse-Resistant API for Primality Testing

    Massimo, J. & Kenneth G. Paterson, 18 Aug 2020, (Accepted/In press) Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    A person-to-person Internet payment system

    Al-Meaither, M. & Mitchell, C. J., 2001, Proceedings NordSec 2001 - 6th Nordic Workshop on Secure IT Systems, Lyngby, Denmark, November 2001. p. 5-17 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    A Pilot Study Investigating The Process of Risk Assessment and Re-Accreditation in UK Public Sector Systems

    Davies, M., Happa, J. & I, A., 2015, York Doctoral Symposium on Computer Science and Electronics.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    A Plant-Wide Industrial Process Control Security Problem

    Mcevoy, R. & Wolthusen, S. D., 2011, Critical Infrastructure Protection V: Proceedings of the 5th Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 47-56

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    A Pluralist Approach to Type-Theoretic Foundations.

    Luo, Z., 2013, Inter. Conf. on Type Theory, Homotopy Theory and Univalent Foundations. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A polynomial kernel for 3-leaf power deletion

    Ahn, J., Eiben, E., Kwon, O. J. & Oum, S. I., 18 Aug 2020, 45th International Symposium on Mathematical Foundations of Computer Science, MFCS 2020. Esparza, J., Kral�, D. & Kral�, D. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. MFCS-2020-5. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    A Position Paper: Towards an Utility Computing and Communications Infrastructure

    Bubendorfer, K. & Komisarczuk, P., 2005, Proceedings of the 2005 International Conference on Communications in Computing, CIC 2005, Las Vegas, Nevada, USA. p. 47-53 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System

    Paterson, K. G. & Strefler, M., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015. Bao, F., Miller, S., Zhou, J. & Ahn, G-J. (eds.). ACM, p. 475-482 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. E-pub ahead of print

    A Practical Cryptanalysis of the Algebraic Eraser

    Ben-Zvi, A., Blackburn, S. & Tsaban, B., 21 Jul 2016, Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 179-189 11 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    A Practical Deployment Framework for Use of Attribute-Based Encryption in Data Protection

    Xu, Z. & Martin, K. M., 2013, The 15th IEEE International Conference on High Performance Computing and Communications. IEEE, p. 1593-1598

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    A Practical Fair-Exchange E-Payment Protocol for Anonymous Purchase and Physical Delivery

    Zhang, Q., Markantonakis, K. & Mayes, K., 2006, Proceedings of the IEEE International Conference on Computer Systems and Applications. Washington, DC, USA: IEEE Computer Society Press, p. 851-858 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A Pragmatic System-Failure Assessment and Response Model

    Happa, J., Fairclough, G., Nurse, JRC., Agrafiotis, I., Goldsmith, M. & S, C., 2016, ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy. Vol. 1. p. 503-508 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    A Privacy Preserving Application Acquisition Protocol

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Jun 2012, 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-12). Geyong Min, F. G. M. (ed.). Liverpool, United Kingdom: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    A privacy-aware reputation-based announcement scheme for VANETs

    Chen, LI., Li, Q., Martin, K. M. & Ng, S-L., 2013, Wireless Vehicular Communications (WiVeC), 2013 IEEE 5th International Symposium on. IEEE, p. 1-5

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A probabilistic reasoning system based on a causal graph approach

    Luo, Z. & Gammerman, A., 1990, Proceeding of IEE Colloquium on Knowledge Engineering.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A propagation model of a vulnerability mitigation computer worm - SeaWave

    Al-Salloum, Z. & Wolthusen, S. D., 6 Sep 2011, Proceedings of the 2011 5th International Network and System Security Conference (NSS 2011). IEEE Computer Society Press, p. 347-352

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A protocol compiler for secure sessions in ML

    Corin, R. & Denielou, P-M., 2008, TRUSTWORTHY GLOBAL COMPUTING. Barthe, G. & Fournet, C. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 276-293 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    A Recommender System Approach for Predicting Drug Side Effects

    Galeano Galeano, D. & Paccanaro, A., 2018, IJCNN 2018: International Joint Conference on Neural Networks. IEEE Xplore, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    A Record Composition/Decomposition Attack on the NDEF Signature Record Type Definition

    Saeed, M. Q. & Walter, C. D., 2011, 6th Internat. Conf. for Internet Technology and Secured Transactions (ICITST-2011). p. 283 - 287

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    A reference monitor for workflow systems with constrained task execution

    Crampton, J., 2005, Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM Press, p. 38-47 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Forthcoming

    A Robust Augmented Nodal Analysis Approach to Distribution Network Solution

    Nduka, O., Yu, Y., Pal, B. & Okafor, E., 2020, (Accepted/In press) 2020 IEEE Power and Energy Society General Meeting (PESGM). IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    A Saturation Method for Collapsible Pushdown Systems

    Broadbent, C., Carayol, A., Hague, M. & Serre, O., 2012, ICALP: International Colloquium on Automata, Languages and Programming.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    A scanning tool for PC root public key stores

    Alsaid, A. & Mitchell, C. J., 2005, WEWoRC 2005 - Western European Workshop on Research in Cryptology, Leuven, Belgium, July 2005. Wolf, C., Lucks, S. & Yau, P-W. (eds.). Gesellschaft fuer Informatik , p. 45-52 8 p. (LNI; vol. P-74).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    A scenario method to automatically assess ICT risk

    Baiardi, F., Corò, F., Tonelli, F. & Sgandurra, D., 2014, Proceedings - 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014. IEEE Computer Society, p. 544-551 8 p. 6787327

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    A Scorecard Tool for the Measurement of Performance for Both the Forward and Reverse Supply Chain

    Coronado Mondragon, A. E., 6 Jul 2008, Proceedings of the 13th International Symposium on Logistics (ISL 2008): Integrating the Global Supply Chain. Pawar, KS., Banomyong, R. & Lalwani, CS. (eds.). Nottingham, UK: Nottingham University Business School, Vol. 1. p. 196-203 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A secure and efficient mutual authentication protocol for low-cost RFID systems

    Poulopoulos, G., Markantonakis, K. & Mayes, K., 1 Jan 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 706-711 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    A secure and trusted boot process for Avionics Wireless Networks

    Markantonakis, K. & Akram, R., 9 Jun 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS). IEEE Computer Society, p. 1C3-1-1C3-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. E-pub ahead of print

    A Secure and Trusted Channel Protocol for UAVs Fleets

    Akram, R. N., Markantonakis, K., Mayes, K., Bonnefoi, P. F., Cherif, A., Sauveron, D. & Chaumette, S., 21 Jun 2018, Information Security Theory and Practice - 11th IFIP WG 11.2 International Conference, WISTP 2017, Proceedings. Springer-Verlag, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10741 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A Secure and Trusted Channel Protocol for User Centric Smart Card Ownership Model

    Akram, R. N., Markantonakis, K. & Mayes, K., 16 Jul 2013, 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A SECURE CHANNEL PROTOCOL FOR MULTI- APPLICATION SMART CARDS BASED ON PUBLIC KEY CRYPTOGRAPHY

    Markantonakis, K. & Mayes, K., 2004, Eight IFIP TC-6-11 Conference on Communications and Multimedia Security. Kluwer Academic Publishers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    A secure electronic Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2003, Proceedings of eTransformation, 16th Bled eCommerce Conference, Bled, Slovenia, June 2003. p. 662-674

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    A secure electronic payment scheme for charity donations

    Al-Meaither, M. & Mitchell, C. J., 2003, E-Commerce and Web Technologies - 4th International Conference, EC-Web 2003, Prague, Czech Republic, September 2003, Proceedings. Springer-Verlag, Vol. 2738. p. 50-61 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    A secure GSM-based Murabaha transaction

    Al-Meaither, M. & Mitchell, C. J., 2004, Proceedings of ICTTA 04, The 1st International Conference on Information & Communication Technologies from Theory to Applications, Damascus, Syria, April 2004. IEEE, p. 77-78 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    A secure marketplace for online services that induces good conduct

    Li, Q. & Martin, K. M., 2010, Proceedings of Fourth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2010). p. 65-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    A Security Analysis of Biometric Template Protection Schemes

    Zhou, X., Busch, C., Kuijper, A. & Wolthusen, S. D., 6 Jul 2009, Proceedings of the 6th International Conference on Image Analysis and Recognition (ICIAR 2009). Springer-Verlag, p. 429-438

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    A security architecture for agent-based mobile systems

    Borselius, N., Hur, N., Kaprynski, M. & Mitchell, C. J., 2002, Proceedings - 3G2002, Third International Conference on Mobile Communications Technologies, London, UK, May 2002. IEE Press, p. 312-318 7 p. (Conference Publication; vol. 489).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    A security model for anonymous credential systems

    Pashalidis, A. & Mitchell, C. J., 2004, Information Security Management, Education and Privacy, Proceedings of the 3rd Working Conference on Privacy and Anonymity in Networked and Distributed Systems, I-NetSec'04. Deswarte, Y., Cuppens, F., Jajodia, S. & Wang, L. (eds.). Kluwer Academic Publishers, p. 183-189 (IFIP Conference Proceedings; vol. 148).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    A Security Policy Infrastructure for Tactical Service Oriented Architectures

    Gkioulos, V. & Wolthusen, S., 10 Jun 2017, Proceedings of the Second International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems (CyberICPS 2016). Springer-Verlag, p. 37-51 15 p. (Lecture Notes in Computer Science; vol. 10166).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    A semantical approach to equilibria and rationality

    Pavlovic, D., 2009, Proceedings of CALCO 2009. Kurz, A. & Tarlecki, A. (eds.). Springer-Verlag, Vol. 5728. p. 317-334 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A Semantics of Business Configurations Using Symbolic Graphs

    Mylonakis, N., Orejas, F. & Fiadeiro, J. L., 20 Aug 2015, Proceedings of the 12th IEEE International Conference on Services Computing. IEEE Computer Society Press, p. 146-153 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    A service discovery threat model for ad hoc networks

    Leung, A. & Mitchell, C. J., 2006, Proceedings of the International Conference on Security and Cryptography (SECRYPT 2006), Setubal, Portugal, August 7-10, 2006. INSTICC Press, p. 167-174

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. E-pub ahead of print

    A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID Tags

    Bonnefoi, P-F., Dusart, P., Sauveron, D., Akram, R. & Markantonakis, K., 3 Dec 2015, The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15). IEEE Computer Society, p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    A short-form measure of attitudes towards using mobile information systems

    Ogertschnig, M. & van der Heijden, H., 2004, Proceedings of the 17th Bled Electronic Commerce conference. Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    A Simulation Framework for Photon-Particle Interactions for Laserwires and Further Applications

    Alden, S., Gibson, S. & Nevay, L., 21 Jun 2019, 10th International Particle Accelerator Conference. Geneva: JACoW Publishing, p. 4045-4048 4 p. THPRB095

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    A situated knowledge work context perspective on knowledge management software-organisation misalignments

    Le Nguyen, K., Dyerson, R. & Harindranath, G., 2009, Proceedings of the 2009 European Conference on Information Systems (ECIS), Verona, Italy. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. E-pub ahead of print

    A Smart Card Web Server in the Web of Things

    Kyrillidis, L., Cobourne, S., Mayes, K. & Markantonakis, K., 23 Aug 2017, SAI Intelligent Systems Conference 2016 (IntelliSys 2016). Springer, p. 769-784 16 p. (Lecture Notes in Networks and Systems ; vol. 16).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    A Smart Micro-Grid Architecture for Resource Constrained Environments

    Kayem, A. V. D. M., Meinel, C. & Wolthusen, S., 2017, Advanced Information Networking and Applications (AINA), 2017 IEEE 31st International Conference on. IEEE Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    A sound algorithm for asynchronous session subtyping

    Bravetti, M., Carbone, M., Lange, J., Yoshida, N. & Zavattaro, G., 20 Aug 2019, 30th International Conference on Concurrency Theory, CONCUR 2019. Fokkink, W. & van Glabbeek, R. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 16 p. 38. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 140).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    A Spatial Perspective of Innovation and Development: Innovation Hubs in Zambia and the UK

    Jimenez Cisneros, A. & Zheng, Y., 16 May 2017, 14th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2017, Yogyakarta, Indonesia, May 22-24, 2017, Proceedings. Springer, p. 171-181 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    A static verification framework for message passing in Go using behavioural types

    Lange, J., Ng, N., Toninho, B. & Yoshida, N., 27 May 2018, Proceedings of the 40th International Conference on Software Engineering, ICSE 2018. IEEE Computer Society, p. 1137-1148 12 p. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    A stochastic simulation system and its application to causal models

    Luo, Z. & Gammerman, A., 1990, Proceeding of 3rd International Conference on IPMU in Knowledge-Based Systems. p. 186-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A storage complexity based analogue of Maurer key establishment using public channels

    Mitchell, C. J., 1995, Cryptography and Coding - Proceedings 5th IMA Conference, Cirencester, December 1995. Boyd, C. (ed.). Springer-Verlag, p. 84-93 10 p. (Lecture Notes in Computer Science; no. 1025).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A study of the quantum dot in application to terahertz single photon counting

    Hashiba, H., Antonov, V., Kulik, L. & Komiyama, S., 2008, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. E-pub ahead of print

    A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes

    Albrecht, M., Bai, S. & Ducas, L., 21 Jul 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Robshaw, M. & Katz, J. (eds.). Springer, p. 153-178 26 p. (Lecture Notes in Computer Science; vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A Substitution Operation for Constraints

    Jeavons, P. G., Cohen, D. A. & Cooper, M. C., 1 May 1994, Principles and Practice of Constraint Programming: Second International Workshop, PPCP '94 Rosario, Orcas Island, WA, USA, May 2–4, 1994 Proceedings. Borning, A. (ed.). Vol. 874. p. 1-9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A Surfeit of SSH Cipher Suites

    Albrecht, M., Degabriele, J., Hansen, T. & Paterson, K., 24 Oct 2016, Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1480-1491 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    A Survey of Forensic Localization and Tracking Mechanisms in Short-Range and Cellular Networks

    Wolthusen, S. D. & Al-Kuwari, S., Feb 2009, Digital Forensics and Cyber Crime: First International ICST Conference ICDF2C. Springer-Verlag, p. 19-32

    Research output: Chapter in Book/Report/Conference proceedingConference contribution