Home > Publications

Publications

34601 - 34700 out of 39,044Page size: 100
  1. Conference contribution › Research
  2. Published

    Blasting Open the Historical Continuum: Antihistoricism in Benjamin, Dick & Le Guin

    Gene-Rowe, F., Mar 2015, Sideways in Time Conference. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    BLOCH OSCILLATIONS IN A JOSEPHSON CIRCUIT

    Boulant, N., Ithier, G., Nguyen, F., Bertet, P., Pothier, H., Vion, D., Urbina, C. & Esteve, D., 2007, CONTROLLABLE QUANTUM STATES: MESOSCOPIC SUPERCONDUCTIVITY AND SPRINTRONICS. SINGAPORE: WORLD SCIENTIFIC PUBL CO PTE LTD, p. 71-76 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    BNA 2017 Festival of Neuroscience: Abstract Book: Using in vitro systems to study the role of isoform-specific Apolipoprotein E processing in Alzheimer’s Disease

    Marsh, J., Dickson, J. & Alifragis, P., 7 Apr 2017, Brain and Neuroscience Advances. Dalley, J. (ed.). SAGE Publications Ltd, Vol. 1. p. 173 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    BOOM: Taking boolean program model checking one step further

    Basler, G., Hague, M., Kroening, D., Ong, C-H. L., Wahl, T. & Zhao, H., 2010, TACAS: Tools and Algorithms for the Construction and Analysis of Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Boomerang Connectivity Table: A New Cryptanalysis Tool

    Cid, C., Huang, T., Peyrin, T., Sasaki, Y. & Song, L., 2018, Advances in Cryptology – EUROCRYPT 2018. Rijmen, V. & Nielsen, J. B. (eds.). Springer Heidelberg, p. 683–714 32 p. (Lecture Notes in Computer Science; vol. 10821).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Boosting search guidance in problems with semantic attachments

    Bernardini, S., Fox, M., Long, D. & Piacentini, C., 5 Jun 2017, Proceedings International Conference on Automated Planning and Scheduling, ICAPS 2017. AAAI Press, p. 29-37 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Bounded and Approximate Strong Satisfiability in Workflows

    Crampton, J., Gutin, G. & Majumdar, D., 28 May 2019, Proceedings of ACM SACMAT 2019. ACM, p. 179-184 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Brand Meanings in Kinetic Circulation: Consumer Reception of Brand Paratexts

    Hackley, C., Jun 2019, Consumer Culture Theory Conference 2019: Concordia University, Montreal, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Breaking An Identity-Based Encryption Scheme based on DHIES

    Albrecht, M. & Paterson, K., 2011, IMA International Conference on Cryptography and Coding. Chen, L. (ed.). Springer, Vol. 7089. p. 344-355 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Breaking the Liardet-Smart Randomized Exponentiation Algorithm

    Walter, C. D., 2002, CARDIS '02. USENIX, p. 59-68 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Brief Announcement: Gossiping with Latencies

    Gilbert, S., Robinson, P. & Sourav, S., 25 Jul 2017, PODC '17 : Proceedings of the ACM Symposium on Principles of Distributed Computing. Association for Computing Machinery (ACM), p. 255-257 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Brief announcement: gracefully degrading consensus and k-set agreement under dynamic link failures

    Schwarz, M., Winkler, K., Schmid, U., Biely, M. & Robinson, P., 2014, Proceedings of the 2014 ACM symposium on Principles of distributed computing. p. 341-343 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Brief Announcement: Regional Consecutive Leader Election in Mobile Ad-Hoc Networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Algorithms for Sensor Systems - 6th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2010, Bordeaux, France, July 5, 2010, Revised Selected Papers. p. 89-91 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Brief Announcement: Space Bounds for Reliable Multi-Writer Data Store: Inherent Cost of Read/Write Primitives

    Chockler, G., Dobre, D., Shraer, A. & Spiegelman, A., Oct 2015, Distributed Computing: 29th International Symposium, DISC 2015, Tokyo, Japan, October 7-9, 2015, Proceedings. Moses, Y. (ed.). 1 ed. Springer-Verlag Berlin Heidelberg, Vol. 9363. p. 673-674 2 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Brief Announcement: Weak Synchrony Models and Failure Detectors for Message Passing (k-)Set Agreement

    Biely, M., Robinson, P. & Schmid, U., 2009, Distributed Computing, 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings. Springer Berlin / Heidelberg, p. 360-361 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. E-pub ahead of print

    Bright ICT and Unbounded Employment: Typology of Crowdworkers and Their Lived and Envisaged Career Trajectory in Nigeria

    Idowu, A. & Elbanna, A., 19 May 2019, IFIP WG 8.6 Conference 2019. p. 470-486 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Broken hearted: How to attack ECG biometrics

    Eberz, S., Paoletti, N., Roeschlin, M., Kwiatkowska, M., Martinovic, I. & Patanè, A., 27 Feb 2017, Network and Distributed System Security Symposium. p. 1-15 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Buddhist Monks' Performance and a Play in the Context of the Buddhist Ritual Event of Giving

    Utairat, M., 2014, Theatre and Stratification, IFTR World Congress, Warwick, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Buffered Communication Analysis in Distributed Multiparty Sessions

    Denielou, P-M. & Yoshida, N., 2010, CONCUR 2010 - CONCURRENCY THEORY. Gastin, P. & Laroussinie, F. (eds.). BERLIN: SPRINGER-VERLAG BERLIN, p. 343-357 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Building Attacker Personas in Practice - a Digital Banking Example

    Moeckel, C., 4 Jul 2018, Proceedings of the 32nd International BCS Human Computer Interaction Conference (HCI 2018). British Computer Society (BCS), p. 1-5 5 p. (Electronic Workshops in Computing (eWiC)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Building general-purpose security services on EMV payment cards

    Chen, C., Tang, S. & Mitchell, C. J., 2013, Security and Privacy in Communication Networks : 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Springer-Verlag, p. 29-44 16 p. (LNICST; vol. 106).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Building next generation Service-Oriented Architectures using Argumentation Agents

    Curcin, V., Ghanem, M., Guo, Y., Stathis, K. & Toni, F., 1 Sep 2006, 3rd International Conference on Grid Services Engineering and Management (GSEM 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Building Power Consumption Models from Executable Timed I/O Automata Specifications

    Barbot, B., Kwiatkowska, M., Mereacre, A. & Paoletti, N., 11 Apr 2016, Hybrid Systems : Computation and Control. p. 195-204 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Building the Bridges -- A Proposal for Merging different Paradigms in Mobile NFC Ecosystem

    Akram, R. N., Markantonakis, K. & Mayes, K., Nov 2012, The 8th International Conference on Computational Intelligence and Security (CIS 2012). Xie, S. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Building Trustworthy Intrusion Detection through VM Introspection

    Baiardi, F. & Sgandurra, D., 1 Aug 2007, Third International Symposium on Information Assurance and Security. p. 209-214 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Business ethics doesn’t reside in tax havens, does it?

    Preuss, L., Apr 2009, annual conference of the UK Association of the European Business Ethics Network (EBEN-UK).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Business Intelligence at Telenor Pakistan

    Shaikh, S. E., Hassan, Z., Farooq, B. & Shahid, A. R., 2012, 33rd International Conference on Information Systems (ICIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Business Success as Network of Networks

    Aboutalebi, R., 22 Oct 2009, In: EAMSA (Euro-Asia Management Studies Association), 26th Annual Conference: Globalization of Technology, Innovation & Knowledge: The Euro-Asia Connection. 22-24 October 2009, Lausanne, Switzerland.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Forthcoming

    Buy low, sell high

    Koolen, W. & Vovk, V., 2012, (Accepted/In press) Proceedings of the Twenty Third International Conference on Algorithmic Learning Theory. Bshouty, N., Stoltz, G., Vayatis, N. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 7568. p. 335 - 349 15 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Bylands: reverse engineering safety-critical systems

    Bull, T., Younger, E., Bennett, K. & Luo, Z., 1995, Proc. of Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Byzantine disk Paxos: Optimal resilience with byzantine shared memory

    Abraham, I., Chockler, G. V., Keidar, I. & Malkhi, D., 2004, Proceedings of the 23rd Annual ACM SIGACT-SIGOPS Symposium on. Principles of Distributed Computing (PODC 2004). ACM, p. 226-235 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    C 2 net: A Cross-Layer Quality of Service (QoS) Architecture for Cognitive Wireless Ad Hoc Networks

    Yau, A. K-L., Komisarczuk, P. & Teal, P. D., 2008, Telecommunication Networks and Applications Conference, 2008. ATNAC 2008. Australasian. p. 306-311 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Caching and Auditing in the RPPM Model

    Crampton, J. & Sellwood, J., 2014, Security and Trust Management - 10th International Workshop. Springer, p. 49-64 16 p. (Lecture Notes in Computer Science; vol. 8743).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    CALF: Categorical automata learning framework

    Van Heerdt, G., Sammartino, M. & Silva, A., Aug 2017, Computer Science Logic 2017, CSL 2017. Goranko, V. & Dam, M. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-24 24 p. 29. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 82).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Unpublished

    Can Digital Inclusion promote freedom? Development as freedom, Freedom as Critical Awakening

    Poveda Villalba, S., 2012, (Unpublished) Can Digital Inclusion promote freedom? Development as freedom, Freedom as Critical Awakening. Department of Geography, Royal Holloway, University of London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Can shadows and reflections help in the detection of photo forgeries?

    Nightingale, S., Wade, K., Faird, H. & Watson, D., 6 Jan 2017, Society for Applied Research in Memory and Cognition.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Can you call the software in your device firmware?

    Hassan, M., Markantonakis, K. & Akram, R., 9 Jan 2017, e-Business Engineering (ICEBE), 2016 IEEE 13th International Conference on. Macau, China: IEEE Computer Society Press, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. E-pub ahead of print

    Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control

    Crampton, J. & Williams, C., 22 Mar 2017, 7th ACM Conference on Data and Application Security and Privacy. ACM Press, p. 47-58 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Capability Building of Developing Country MNEs: the Chinese Experience

    Rui, H., 2015, Proceedings of the 57th Annual Meeting of the Academy of International Business: "Global Networks: Organizations and People". Mudambi, R. & Kiyak, T. (eds.). 2015 Academy of International Business, p. 103 1 p. ID#1653

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Capturing sensemaking patterns during data analysis: A conceptual framework

    Lycett, M. & Marshan, A., 24 Aug 2016, 25th International Conference on Information Systems Development, ISD 2016. Association for Information Systems, p. 106-116 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Carbon Nanotube Bolometer: Transport Properties and Noise Characteristics

    Rod, I., Wirtz, C., Kazakova, O., Panchal, V., Cox, D., Zaehres, H., Posth, O., Lindner, J., Meckenstock, R. & Farle, M., 2012, MAGNETISM AND MAGNETIC MATERIALS V. Perov, N. & Rodionova (eds.). STAFA-ZURICH: TRANS TECH PUBLICATIONS LTD, p. 510-513 4 p. (Solid State Phenomena; vol. 190).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Carbonate budgets for carbonate mounds, Florida, USA

    Bosence, D., 1988, Proceedings of the 6th International Coral Reef Symposium. Choat, J. H., Barnes, D., Borowitzka, M. A., Coll, J. C., Davies, P. J., Flood, P., Hatcher, B. G., Hopley, D., Hutchings, P. A., Kinsey, D., Orme, G. R., Pichon, M., Sale, P. F., Sammarco, P., Wallace, C. C., Wilkinson, C., Wolanski, E. & Bellwood, O. (eds.). Vol. 2. p. 529-534 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Card-present Transactions On The Internet Using The Smart Card Web Server

    Kyrillidis, L., Chazalet, B., Mayes, K. & Markantonakis, K., 2013, Proceedings of TrustCom 2013. IEEE Computer Society, p. 611-619 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    CardSpace-Liberty Integration for CardSpace Users

    Al-Sinani, H., Alrodhan, W. & Mitchell, C. J., 2010, Proceedings of the 9th Symposium on Identity and Trust on the Internet 2010 (IDtrust 2010), Gaithersburg, MD, USA, 13-15 April 2010. ACM Press, p. 12-25 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 14 Nov 2019, Central European Cybersecurity Conference 2019. ACM, p. 1-4 4 p. 9

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Casting the Outcast: Perspectives on Acting Style

    Conroy, C., 2003, Conference Proceedings: Finding The Spotlight.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Causality Re-Ordering Attacks on the IEC 60870-5-104 Protocol

    Baiocco, A. & Wolthusen, S., 24 Dec 2018, Proceedings of the 2018 IEEE PES General Meeting. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Cavity Beam Position Monitor System for ATF2

    Boogert, S., Ainsworth, R., Boorman, G., Swinson, C., Molloy, S., Aryshev, A., Honda, Y., Tauchi, T., Terunuma, N., Urakawa, J., Frisch, J., May, J., McCormick, D., Nelson, J., Smith, T., Smith, G., Woodley, M., Heo, A., Kim, E-S., Kim, H-S. & 5 others, Kim, Y., Lyapin, A., Park, H., Ross, M. & Shin, S., 2010, Proceedings of IPAC'10, Kyoto, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Cérémonie et néoclassicisme à Fontainebleau

    Charlton, D., 2014, D'un 'Orphée', l'autre: 1762-1859...Métamorphoses d'un mythe . Ramaut, A. & Saby, P. (eds.). Saint-Étienne : Publications de l'Université de Saint-Étienne, p. 57-68 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Certificate translation

    Borselius, N. & Mitchell, C. J., 2000, Proceedings of NORDSEC 2000 - 5th Nordic Workshop on Secure IT Systems, Reykjavik, Iceland, 12/13 October 2000. p. 289-300 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Challenges in developing Capture-HPC exclusion lists

    Puttaroo, M., Komisarczuk, P. & Amorim, R. C. D., 2014, Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014. p. 334 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Challenges of security and trust in Avionics Wireless Networks

    Akram, R., Markantonakis, K., Kariyawasam, S., Ayub, S., Seem, A. & Atkinson, R., 13 Sep 2015, 2015 IEEE/AIAA 34th Digital Avionics Systems Conference (DASC). IEEE Computer Society, p. 4B1-1-4B1-12

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Challenges of security and trust of mobile devices as digital avionics component

    Akram, R. & Markantonakis, K., 9 Jun 2016, Integrated Communications Navigation and Surveillance (ICNS), 2016. IEEE Computer Society, p. 1C4-1-1C4-11 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Unpublished

    'Changing Measurement Boundaries in Banks'

    Anagnostopoulos, I., 2009, (Unpublished) BAA: South East Accounting Group, Kingston University, 10 September 2009 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Changing patterns of employment in privatised Czech enterprises: management action in a transitional context

    Soulsby, A. & Clark, E., 2002, Personalmanagement im transformationsprozess. Lang, R. (ed.). Munich: Rainer Hampp Verlag, p. 201-223 23 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Characterisation of Electro-Optic Pickups for High Bandwidth Diagnostics at the High Luminosity LHC

    Arteche, A., Bashforth, S., Bosco, A., Gibson, S., Penman, I., Krupa, M. & Lefevre, T., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 1-4 4 p. WEPGW088

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Characterising renaming within OCaml's module system: theory and implementation

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 8 Jun 2019, PLDI 2019 Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation. Association for Computing Machinery (ACM), p. 950-965 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Characterising the Signal Processing System for Beam Position Monitors at the Front End Test Stand

    Boorman, G., Gibson, S., Gale, J., Rajaeifar, N., Jolly, S., Lawrie, S. & Letchford, A., Jan 2016, 4th International Beam Instrumentation Conference : IBIC2015, Melbourne, Australia. Geneva: JACoW Publishing, p. 526-529 4 p. TUPB073

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Characteristics of Smith-Purcell radiation in millimeter wavelength region

    Naumenko, G., Potylitsyn, A., Karataev, P., Bleko, V., Sukhikh, L., Shevelev, M. & Popov, Y., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). UK: IOP PUBLISHING LTD, Vol. 732. p. 1-9 9 p. 012018. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Checking cryptographic API usage with composable annotations

    Mitchell, D., van Binsbergen, L. T., Loring, B. & Kinder, J., 25 Dec 2017, ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation (PEPM 2018). p. 53-59 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    CheR: Cheating resilience in the cloud via smart resource allocation

    Roberto, D. P., Lombardi, F., Martinelli, F. & Sgandurra, D., 2014, Foundations and Practice of Security - 6th International Symposium, FPS 2013, Revised Selected Papers. Springer-Verlag, Vol. 8352 LNCS. p. 339-352 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8352 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Child, adolescent and family psychiatry and psychology services: psychology departments: some issues in setting up information systems.

    Berger, M., 1989, Clinic Services: Monitoring, Evaluation and Microcomputers: Occasional Papers, No.1. Berger, M. (ed.). Association for Child Psychology and Psychiatry

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Unpublished

    Children, childhood and youth: online and offline

    Kleine, D., Hollow, D. & Poveda Villalba, S., 2014, (Unpublished) Children, childhood and youth: online and offline. Royal Geographical Society (with IBG)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    CIM Justification

    Pilkington, A., 1989, IFS.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Ciphers for MPC and FHE

    Albrecht, M., Rechberger, C., Schneider, T., Tiessen, T. & Zohner, M., 14 Apr 2015, Advances in Cryptology -- EUROCRYPT 2015. Oswald, E. & Fischlin, M. (eds.). Springer, p. 430-454 25 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Circumventing Cheating on Power Auctioning in Resource Constrained Micro-Grids

    Marufu, A., Kayem, A. V. D. M. & Wolthusen, S., 26 Jan 2017, Proceedings of the 14th International Conference of Smart City (SmartCity 2016). IEEE Press, p. 1380-1387 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Civic Empowerment through Digitalisation: The Case of Greenlandic Women

    Wendt, N., Jensen, R. B. & Coles-Kemp, L., Apr 2020, ACM CHI Conference on Human Factors in Computing Systems: CHI'20. ACM, p. 1-13 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Unpublished

    Civil society organisations shaping corporate social responsibility: a comparison of NGO and trade union involvement

    Preuss, L., Rees, C. & Gold, M., Jul 2014, (Unpublished) 30th European Group for Organizational Studies (EGOS) Colloquium. Rotterdam

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Unpublished

    Civil society organisations shaping CSR: what role for organised labour?

    Preuss, L., Rees, C. & Gold, M., Aug 2015, (Unpublished) Academy of Management (AoM) Annual Meeting. Vancouver

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Unpublished

    Civil society organizations shaping CSR: what role for trade unions?

    Preuss, L., Rees, C. & Gold, M., Jun 2015, (Unpublished) 65th British Universities Industrial Relations Association (BUIRA) Annual Conference. Leicester

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Class War on Wonga: morality of inequality

    Chong, D., 2014, 6th Critical Finance Studies Conference (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Classification of acute leukaemia from gene expression data using confidence machines

    Bellotti, T., Luo, Z. & Gammerman, A., May 2006, IEEE International Conference on Granular Computing . p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. E-pub ahead of print

    Classification of Malware Families Based on Runtime Behaviour

    Geden, M. & Happa, J., 23 Sep 2018, International Symposium on Cyberspace Safety and Security. p. 33-48 16 p. (Lecture Notes in Computer Science; vol. 11161).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Classifying android malware through subgraph mining

    Martinelli, F., Saracino, A. & Sgandurra, D., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer-Verlag, Vol. 8247 LNCS. p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Client-based CardSpace-OpenID Interoperation

    Al-Sinani, H. S. & Mitchell, C. J., 2011, Proceedings of ISCIS, 26th International Symposium on Computer and Information Sciences, London, UK, 26-28 September 2011. Gelenbe, E., Lent, R. & Sakellari, G. (eds.). London: Springer-Verlag, p. 387-393 (Lecture Notes in Electrical Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Clinical translation of Raman-based multimodal spectral histopathology for margin assessment during surgery of basal cell carcinoma

    Boitor, R., Kong, K., Varma, S., Koloydenko, A., Williams, H. & Notingher, I., 22 Jul 2019, Proceedings SPIE, Medical Laser Applications and Laser-Tissue Interactions IX, 110790G . SPIE - INT SOC OPTICAL ENGINEERING, Vol. 11079. p. 1-4 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Clique Cover and Graph Separation: New Incompressibility Results

    Cygan, M., Kratsch, S., Pilipczuk, M., Pilipczuk, M. & Wahlström, M., 2012, ICALP (1). p. 254-265 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Cloud Security is Not (Just) Virtualization Security: A Short Paper

    Christodorescu, M., Sailer, R., Schales, D. L., Sgandurra, D. & Zamboni, D., 2009, Proceedings of the 2009 ACM Workshop on Cloud Computing Security. New York, NY, USA: ACM, p. 97-102 6 p. (CCSW '09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Cloud Storage File Recoverability

    Gorke, C., Janson, C., Armknecht, F. & Cid, C., 2 Apr 2017, SCC '17 Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing. New York, NY, USA: ACM, p. 19-26 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    CloudSafetyNet: Detecting Data Leakage between Cloud Tenants

    Priebe, C., Muthukumaran, D., O'Keeffe, D., Eyers, D. M., Shand, B., Kapitza, R. & Pietzuch, P. R., 2014, Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW '14, Scottsdale, Arizona, USA, November 7, 2014. p. 117-128 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Coding schemes for two-dimensional position sensing

    Burns, J. & Mitchell, C. J., 1993, Cryptography and Coding III: Proceedings of the third IMA Cryptography and Coding Conference, Cirencester, December 1991. Ganley, M. J. (ed.). Oxford University Press, p. 31-66 36 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Coercions in Hindley-Milner systems

    Kießling, R. & Luo, Z., 2004, Types for Proofs and Programs, Proc. of Inter. Conf. of TYPES'03. LNCS'3085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Coercive subtyping and lexical semantics (extended abstract)

    Luo, Z. & Callaghan, P., 1998, Logical Aspects of Computational Linguistics (LACL'98).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Coercive Subtyping in Lambda-Free Logical Frameworks

    Adams, R., 2009, Proceedings of the Fourth international Workshop on Logical Frameworks and Meta-Languages. Cheney, J. & Felty, A. (eds.). New York: ACM, p. 30-39 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Coercive subtyping in type theory

    Luo, Z., 1997, CSL'96, LNCS'1258.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Cognitive assessment in MS

    Langdon, D., Dec 2015, Neurodegenerative disease management. 6S ed. Vol. 5. p. 43-45 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Cognitive Radio-based Wireless Sensor Networks: Conceptual design and open issues

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, The 34th Annual IEEE Conference on Local Computer Networks, LCN 2009, 20-23 October 2009, Zurich, Switzerland, Proceedings. p. 955-962 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Cognitive strategic groups: Real or artefact?

    Robson, J. & van der Heijden, H., 2012, British Academy of Management (BAM) conference. Cardiff

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Coherence and transitivity in coercive subtyping

    Luo, Y. & Luo, Z., 2001, Proc. of the 8th Inter. Conf. on Logic for Programming, Artificial Intelligence and Reasoning (LPAR'01), LNAI 2250.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Coherent Cherenkov radiation as an intense THz source

    Bleko, V., Karataev, P., Konkov, A., Kruchinin, K., Naumenko, G., Potylitsyn, A. & Vaughan, T., 1 Jul 2016, Journal of Physics: Conference Series. Karataev, P., Potylitsyn, A., Tyukhtin, A. & Strikhanov, M. (eds.). IOP PUBLISHING LTD, Vol. 732. p. 1-7 7 p. 012006. (Radiation from Relativistic Electrons in Periodic Structures; vol. 732).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    COHERENT DIFFRACTION RADIATION AS A TOOL FOR LONGITUDINAL BEAM PROFILE DIAGNOSTICS AT CTF3

    Lekomtsev, K., Blair, G., Boorman, G., Karataev, P., Micheler, M., Corsini, R. & Lefevre, T., Sep 2010, Proceedings of Linear Accelerators Conference: LINAC'10, Tsukuba, Japan.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Coherent Diffraction Radiation Longitudinal Beam Profile Monitor for CTF3.

    Micheler, M., Blair, G., Boorman, G., Karataev, P., Lekomtsev, K., Molloy, S., Corsini, R., Lefevre, T. & Dabrowski, A., May 2010, Proceedings of 1st International Particle Accelerator Conference: IPAC'10. p. 1143-1145 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Cold Boot Attacks on NTRU

    Paterson, K. G. & Villanueva-Polanco, R., 2017, Progress in Cryptology – INDOCRYPT 2017 - 18th International Conference on Cryptology in India, Proceedings. Springer-Verlag, Vol. 10698 LNCS. p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10698 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Cold Boot Key Recovery by Solving Polynomial Systems with Noise

    Albrecht, M. & Cid, C., 2011, Applied Cryptography and Network Security - 9th International Conference, ACNS 2011. Springer, p. 57-72 16 p. (Lecture Notes in Computer Science - LNCS; vol. 6715).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Coleoptera and Trichoptera

    Elias, S., 2001, Tracking Environmental Change Using Lake Sediments: Biological And Statistical Techniques. Smol, J. P. & Last, W. M. (eds.). Kluwer Academic Publishers, Vol. 4. p. 67-80

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Collaborative and Ubiquitous Consumer Oriented Trusted Service Manager

    Akram, R. N., Markantonakis, K. & Sauveron, D., 1 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Liu, Y. (ed.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Collaborative Diagnosis of Exceptions to Contracts (Extended Abstract)

    Kafali, O., Toni, F. & Torroni, P., 2011, AAMAS 2011: 10th International Conference on Autonomous Agents and Multiagent Systems. p. 1167-1168 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Collaborative value co-creation in crowd-sourced online communities- acknowledging and resolving competing commercial and communal orientations

    Whalley, A., 1 Oct 2011, Research In Consumer Behaviour. Emerald Group Publishing Ltd., Vol. 13. p. 1 18 p. 1

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Collapsible Pushdown Automata and Recursion Schemes

    Hague, M., Murawski, A. S., Ong, C-H. L. & Serre, O., 2008, LICS '08: 23rd Annual IEEE Symposium on Logic in Computer Science. IEEE Computer Society Press, p. 452-461

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Collimation of Partially Stripped Ion Beams in the LHC

    Abramov, A., Nevay, L., Bruce, R., Fuster-Martinez, N., Gorzawski, A., Krasny, M., Molson, J., Redaelli, S. & Schaumann, M., 21 Jun 2019, 10th International Particle Accelerator Conference. JACoW Publishing, p. 700-703 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution