Home > Publications

Publications

36401 - 36500 out of 41,714Page size: 100
  1. Conference contribution › Research
  2. Submitted

    “Archive and Asylum – experiential memories of Kneehigh Theatre’s performance venue and theatre archive” at Shared Memories II Eastap Conference at the University of Lison, Portugal

    Trenchfield, C., 24 Sep 2019, (Submitted) Shared Memories II Eastap Conference at the University of Lison, Portugal.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    “Breaking down the remaining walls”: Prospects for EU-NATO co-operation

    Miskimmon, A., 2011, Security Policy Library 3/2011. Norwegian Atlantic Committee, (Security Policy Library; vol. 2011, no. 3).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Submitted

    “Kneehigh Theatre Company and Cultural Hybridisation”at Hybrid Practices: Methodologies, Histories, and Performance hosted by the School of Performing Arts at the University of Malta

    Trenchfield, C., 14 Mar 2019, (Submitted) Hybrid Practices: Methodologies, Histories, and Performance hosted by the School of Performing Arts at the University of Malta.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    “Refusing all Definite Form, the Abstract Horror”: Communication, Code and Power in the fiction of Stanislaw Lem

    Gene-Rowe, F., Jun 2015, Current Research in Speculative Fiction, 2015. Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    “The Theatre of the Invisible-Made-Visible”: Shakespeare and the Politics of Perception

    Ryan, K., 12 Sep 2015, Actes des congrès de la Société française Shakespeare. Vol. 33. p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    «In cibo e in ozio». Conviti cavallereschi

    Jossa, S., Jun 2013, Le tavole di corte tra Cinquecento e Settecento (Roma: Bulzoni, 2013). Merlotti, A. (ed.). Bulzoni, p. 59-74 16 p. (Europa delle Corti).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    0bserving play in a public square with a dancer, a writer and a painter.

    Coppard, H., 2014, International Play Association World Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2004, Proceedings: 5th World Wireless Congress (WWC 2004), San Francisco, USA, May 25-28, 2004. Delson Group, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    30 years of Polish Government Spokespersons: History of governmental communication practice and their implications for education of Public Relations in Poland

    Chmiel, M., 2019, 10th International History of Public Relations Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    3D virtual environments and corporate learning: An empirical investigation of benefits

    Massey, A. P., Montoya, M. M. & Wu, P. F., 3 Apr 2013, Proceedings of the Annual Hawaii International Conference on System Sciences. p. 893-902 10 p. 6479940

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    4D-SETL a semantic data integration framework

    De Cesare, S., Foy, G. & Lycett, M., 2016, ICEIS 2016 - Proceedings of the 18th International Conference on Enterprise Information Systems. SciTePress, Vol. 1. p. 127-134 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    A ‘We’ Identity ‘In Action’? Collective Consumption Via Competence Co‐Performance in Newly Cohabited Couples

    Khanijou, R., Cappellini, B. & Hosany, S., 2018, 51st Academy of Marketing Conference, Stirling, 2-5 July.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    A 2-D Laser-wire Scanner at PETRA-III

    Aumeyr, T., Blair, G., Boogert, S., Boorman, G. & Bosco, A., 2010, Proceedings of IPAC'10, Kyoto, Japan. 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    A Bayesian method with reparameterization for diffusion tensor imaging

    Zhou, D., Dryden, I. L., Koloydenko, A. & Li, B., 2008, Proceedings, SPIE conference. Medical Imaging. p. 69142J

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    A blended learning model for practical sessions

    Barreiro, N. & Pinto de Matos, C., 7 Nov 2016, Computer Science and Information Systems (FedCSIS), 2016 Federated Conference on. Gdansk: IEEE, p. 903-912 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    A board game for teaching internet engineering

    Komisarczuk, P. & Welch, I., 2006, Proceedings of the 8th Australasian Conference on Computing Education-Volume 52. p. 117-123 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks

    Askoxylakis, I. G., Sauveron, D., Markantonakis, K., Tryfonas, T. & Traganitis, A., 2008, Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies. Washington, DC, USA: IEEE Computer Society Press, p. 193-202 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    A Buddhist monks’ performance and a play, in the context of the Buddhist ritual event of giving

    Utairat, M., 2015, International Federation for Theatre Research (IFTR) 2015, Hyderabad, India .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published
  21. Published

    A case study on the usability of NXT-G programming language

    Nguyen, K. A., Sep 2011, 23rd Annual Conference in Psychology of Programming (PPIG). York, England, 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    A Categorical Account of Replicated Data Types

    Gadducci, F., Melgratti, H., Roldán, C. & Sammartino, M., Dec 2019, 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, FSTTCS 2019. Chattopadhyay, A. & Gastin, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-15 15 p. 42. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 150).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    A client-side CardSpace-Liberty integration architecture

    Alrodhan, W. & Mitchell, C., 2008, IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA. ACM Press, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Forthcoming

    A closer look at adaptive regret

    Adamskiy, M., Koolen, W., Chernov, A. & Vovk, V., 2012, (Accepted/In press) Proceedings of the Twenty Third International Conference on Algorithmic Learning Theory. Bshouty, N., Stoltz, G., Vayatis, N. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 7568. p. 290 - 304 15 p. (Lecture Notes in Artificial Intelligence).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    A cluster-based approach to consensus based distributed task allocation

    Smith, D., Wetherall, J., Woodhead, S. & Adekunle, A., 2014, 2014 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing. p. 428-431 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    A Coding-Theoretic Approach to Recovering Noisy RSA Keys

    Paterson, K., Polychroniadou, A. & Sibborn, D., 2012, ASIACRYPT 2012. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 386-403 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    A collaborative framework for generating probabilistic contracts

    Martinelli, F., Saracino, A., Sgandurra, D. & Aldini, A., 1 May 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS). p. 139-142 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    A combinatorial framework for frequency hopping multiple access

    Nyirenda, M., Ng, S-L. & Martin, K. M., 2014, Proceedings of the Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory. p. 271 276 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    A Combined Study Investigating the Insoluble and Soluble Organic Compounds in Category 3 Carbonaceous Itokawa Particles Recovered by the Hayabusa Mission

    Chan, QHS., Zolensky, M., Burton, A., Clemett, S., Fries, M. & Kebukawa, Y., 2015, Hayabusa Symposium 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    A comparative analysis of common threats, vulnerabilities, attacks and countermeasures within smart card and wireless sensor network node technologies

    Eagles, K., Markantonakis, K. & Mayes, K., 2007, Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems. Berlin, Heidelberg: Springer-Verlag, p. 161-174 14 p. (WISTP'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    A comparative analysis of online crowdfunding platforms in USA, Europe and Asia

    Kromidha, E., 2015, Proceedings of eChallenges e-2015 Conference, 25-26 November 2015. Vilnius, Lithuania, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    A Comparative GARCH Analysis of Macroeconomic Variables and Returns on FTSE 100 Implied Volatility Index Returns

    Alsheikhmubarak, A. & Giouvris, E., 13 Jul 2017, 43rd International Business Research Conference, Proceedings of : 13 - 15 July 2017, Ryerson University, Toronto, Canada.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    A Comparative GARCH Analysis of Macroeconomic Variables and Returns on FTSE 100 Implied Volatility Index Returns.

    Alsheikhmubarak, A. & Giouvris, E., 24 Jan 2018, International Business Academics Consortium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    A Comparative Study of Strategy Implementation Models

    Aboutalebi, R. & Tan, H., 11 Sep 2012, In: BAM (British Academy of Management), 26th Annual Conference of BAM: Management Research Revisited: Prospects for Theory and Practice. 11-13 September 2012, University of Cardiff, Cardiff, UK.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    A comparison of differential optical absorption spectrometers for measurements of NO2, O3, SO2, and HONO

    Coe, H., Jones, R. L., Colin, R., Carleer, M., Harrison, R. M., Peak, J., Plane, J. M. C., Smith, N., Allan, B., Clemitshaw, K. C., Burgess, R. A., Platt, U., Etzkorn, T., Stutz, J., Pommereau, J. P., Goutail, F., NunesPinharanda, M., Simon, P., Hermans, C. & Vandaele, A. C., 1997, PROCEEDINGS OF EUROTRAC SYMPOSIUM '96 - TRANSPORT AND TRANSFORMATION OF POLLUTANTS IN THE TROPOSPHERE, VOL 2. SOUTHAMPTON: COMPUTATIONAL MECHANICS PUBLICATIONS LTD, p. 757-762 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    A comparison of social tagging designs and user participation

    Bentley, C. & Labelle, P., 2008, Proceedings from DC 2008: International Conference on Dublin Core and Metadata Applications. The Dublin Core Metadata Initiative, p. 205-205

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    A comparison of the cryptographic requirements for digital secure speech systems operating at different bit rates

    Mitchell, C. J., 1984, International conference on Secure Communication Systems, IEE, London, 22-23rd February 1984. IEE Press, p. 32-37 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    A Comparison of Three Implementations of Multi-Label Conformal Prediction

    Wang, H., Liu, X., Nouretdinov, I. & Luo, Z., 3 Apr 2015, Statistical Learning and Data Sciences: Third International Symposium, SLDS 2015, Egham, UK, April 20-23, 2015, Proceedings. Gammerman, A., Vovk, V. & Papadopoulos, H. (eds.). Springer, p. 241-250 10 p. (Lecture Notes in Computer Science; vol. 9047).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    A Comparison of Trust Models

    Sel, M., 15 Sep 2015, ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference. Pohlmann, N., Reimer, H. & Schneider, W. (eds.). Springer-Verlag, p. 206-215 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    A Comparison of Venn Machine with Platt's Method in Probabilistic Outputs

    Zhou, C., Nouretdinov, I., Luo, Z., Adamskiy, M., Coldham, N. & Gammerman, A., 2011, 12th INNS EANN-SIG International Conference, EANN 2011 and 7th IFIP WG 12.5 International Conference, Artificial Intelligence Applications and Innovations 2011, Corfu, Greece, September 15-18, 2011, Proceedings , Part II. . p. 483-

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Submitted

    A Complete Analysis of the BKZ Lattice Reduction Algorithm

    Li, J. & Nguyen, P. Q., 2020, (Submitted) TBC.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    A Completeness Theory for Polynomial (Turing) Kernelization

    Hermelin, D., Kratsch, S., Soltys, K., Wahlström, M. & Wu, X., 2013, IPEC. Springer, Vol. LNCS 8246. p. 202 215 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    A Compositional Approach to Connector Construction

    Lopes, A., Wermelinger, M. & Fiadeiro, J. L., 2001, WADT. Springer, Vol. 2267. p. 201-220 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. A Comprehensive Formal Security Analysis of OAuth 2.0

    Fett, D., Küsters, R. & Schmitz, G., 24 Oct 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1204-1215 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    A Comprehensive Symbolic Analysis of TLS 1.3

    Cremers, C., Horvat, M., Hoyland, J., Scott, S. & van der Merwe, T., 30 Oct 2017, ACM SIGSAC Conference on Computer and Commuincations Security. ACM, p. 1773-1788 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Forthcoming

    A Conceptual Framework for Managing Expectations in Green IS Implementation

    Jackson, S. & Fearon, C., 17 Mar 2016, (Accepted/In press) 22nd IEEE International Technology Management Conference, Trondheim, Norway.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    A Conceptual Framework for Smartphone Security Among Arab Millennials

    Shah, M. & Ameen, N., 2019, UK Academy of Information Systems (UKAIS). p. 1-18 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. A conceptual framework towards continuous transformation of sustainable food manufacturing and logistics

    Ojo, O. O. & Shah, S., Jan 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 209-214 6 p. 9051539. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs

    Hashimoto, K., Katsumata, S., Postlethwaite, E., Prest, T. & Westerbaan, B., 13 Nov 2021, CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 1441-1462 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    A Constructive Approach for Proving Data Structures’ Linearizability

    Lev-Ari, K., Chockler, G. & Keidar, I., 5 Nov 2015, Distributed Computing 29th International Symposium, DISC 2015 Tokyo, Japan, October 7–9, 2015 Proceedings. Moses, Y. (ed.). Springer-Verlag, Vol. 9363. p. 356–370 15 p. 97. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    A context-aware and Intelligent Dynamic Channel Selection scheme for cognitive radio networks

    Yau, K-L. A., Komisarczuk, P. & Teal, P. D., 2009, 4th International ICST Conference on Cognitive Radio Oriented Wireless Networks and Communications, CROWNCOM 2009, Hannover, Germany, June 22-24, 2009. p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    A contingency approach to entrepreneurial leadership: an exploratory case study of two Chinese private enterprises

    Wang, C. L., Tee, D. D. & Ahmed, P. K., 2011, 34th Annual Institute for Small Business and Entrepreneurship Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    A contract-based event driven model for collaborative security in financial information systems

    Baldoni, R., Lodi, G., Chockler, G., Dekel, E., Mulcahy, B. P. & Martufi, G., 2010, ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems. p. 147-153 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    A Cooperative Information System for the Connected Communities

    Pitt, J., Mamdani, E. & Stathis, K., 1 May 1998, Proceedings of COOP'98: Improving the Design of Cooperative Systems. Darses, F. & Zarate, P. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1995, European Conference on Symbolic and Quantitative Approaches to Reasoning and Uncertainty, Lecture Notes in Computer Science . Froidevaux, C. & Kohlas, J. (eds.). Springer, Vol. 946. p. 52-59

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    A cost bounded possibilistic ATMS

    Bigham, J., Luo, Z. & Banerjee, D., 1994, Proceedings of Expert Systems 94 . Bramer, M. A. & Macintosh, A. L. (eds.). p. 161-172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    A criterion for the existence of predictive complexity for binary games

    Kalnishkan, Y., Vovk, V. & Vyugin, M. V., 2004, Proceedings of the Fifteenth International Conference on Algorithmic Learning Theory. Ben-David, S., Case, J. & Maruoka, A. (eds.). Heidelberg: Springer, Vol. 3244. p. 249-263 15 p. (Lecture Notes in Artificial Intelligence; vol. 3244).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. E-pub ahead of print

    A Critique of Game-Based Definitions of Receipt-Freeness for Voting

    Fraser, A., Quaglia, E. & Smyth, B., 26 Sep 2019, (E-pub ahead of print) Provable Security : 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1–4, 2019, Proceedings. Springer, p. 189-205 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    A Cryptographic Analysis of the WireGuard Protocol

    Dowling, B. & Paterson, K. G., 2018, Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Proceedings. Springer-Verlag, p. 3-21 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    A cultural theory analysis of information systems adoption

    Jackson, S., 2010, AMCIS 2010: 16th Americas Conference on Information Systems: Sustainable IT Collaboration around the Globe, Lima, PE, 12 - 15 Aug .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    A device management framework for secure ubiquitous service delivery

    Leung, A. & Mitchell, C. J., 2008, Proceedings: the Fourth International Symposium on Information Assurance and Security (IAS 2008), Naples, Italy, September 2008. Los Alamitos, CA: IEEE Computer Society Press, p. 267-274 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    A dialectic architecture for computational autonomy

    Witkowski, M. & Stathis, K., 2004, Agents and computational autonomy: potential, risks, and solutions. Springer-Verlag, Vol. 2969. p. 261-273 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    A Distributed Treatment of Exceptions in Multiagent Contracts (Preliminary Report)

    Kafali, O. & Yolum, P., 2011, Proceedings of the 9th International Workshop on Declarative Agent Languages and Technologies (DALT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    A Duality in Space Usage between Left-to-Right and Right-to-Left Exponentiation

    Walter, C. D., 2012, CT-RSA. Dunkelman, O. (ed.). Springer, Vol. 7178. p. 84-97 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    A Dynamic and Ubiquitous Smart Card Security Assurance and Validation Mechanism

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Sep 2010, 25th IFIP International Information Security Conference (SEC 2010). Rannenberg, K. & Varadharajan, V. (eds.). Brisbane, Australia: Springer, p. 161-171 11 p. (IFIP AICT Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    A Dynamic Distributed Architecture for Preserving Privacy of Medical IoT Monitoring Measurements

    Darwish, S., Nouretdinov, I. & Wolthusen, S., 2018, 16th International Conference On Smart homes and health Telematics (ICOST'2018). Springer, p. 146-157 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins

    Zhang, Q., Markantonakis, K. & Mayes, K., 2007, A Fair and Anonymous E-commerce Scheme based on Compatible Keys and Digital Coins. China: Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    A Fair Biometric Enabled M-Payment Solution with Anonymity Support

    Zhang, Q., Mayes, K. & Markantonakis, K., 2005, A Fair Biometric Enabled M-Payment Solution with Anonymity Support. Springer-Verlag

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    A FAST Front End Application

    Stathis, K., 1 Apr 1994, Proceedings of the 2nd International Conference on the Practical Applications of Prolog (PAP'94). Sterling, L. (ed.). p. 537-548 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    A Fast Glimpse of Knowledge-Based Front-Ends as Games

    Stathis, K. & Sergot, M. J., 1 Oct 1996, Proc. of 1st International Conference on Successes and Failures of Knowledge-Based Systems in Real World Applications. Batanov, D. & Brezillon, P. (eds.). Bangkok, Thailand: AIT Press, p. 19-33 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    A Faster Fixed-Parameter Approach to Drawing Binary Tanglegrams

    Böcker, S., Hüffner, F., Truss, A. & Wahlström, M., 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Copenhagen, Denmark: Springer, Vol. 5917. p. 38-49 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    A Fibre Coupled, Low Power Laserwire Emittance Scanner at CERN LINAC4

    Gibson, S., Boorman, G., Bosco, A., Kruchinin, K., Hofmann, T., Roncarolo, F., Pozimski, J., Gabor, C. & Letchford, A., 20 Jun 2014, 5th International Particle Accelerator Conference: 15-20 June 2014 Dresden, Germany. p. 3725-3728 4 p. THPME190

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    A flexible object-oriented system for teaching and learning structured IR

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2007, Proceedings of the First International Workshop on Teaching and Learning of Information Retrieval. London (UK), 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    A Formal Adversary Capability Model for SCADA Environments

    Mcevoy, R. & Wolthusen, S. D., 2010, Proceedings of the 5th International Workshop on Critical Information Infrastructures Security (CRITIS 2010). Springer-Verlag, p. 93-103

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. E-pub ahead of print

    A Formal Model for Checking Cryptographic API Usage in JavaScript

    Mitchell, D. & Kinder, J., 15 Sep 2019, (E-pub ahead of print) ESORICS'19: Proceedings of the 24th European Symposium on Research in Computer Security. Springer, Vol. 11735. p. 341-360 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Forthcoming

    A Formal Security Analysis of the W3C Web Payment APIs: Attacks and Verification

    Do, Q. H., Hosseyni, P., Küsters, R., Schmitz, G., Wenzler, N. & Würtele, T., 3 Jul 2021, (Accepted/In press) 43rd IEEE Symposium on Security and Privacy (S&P 2022). Institute of Electrical Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    A formal transformation and refinement method for re-engineering concurrent programs

    Younger, E., Bennett, K. & Luo, Z., 1997, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    A four-element framework for research on the composite materials supply chain

    Mastrocinque, E., Coronado Mondragon, A. E. & Hogg, P., 16 Jun 2015, Engineering Technology, Engineering Education and Engineering Management: Proceedings of the International Conference on Engineering Technologies, Engineering Education and EngineeringManagement (ETEEEM 2014), Hong Kong, 15-16 November 2014. Tan, D. (ed.). CRC Press, p. 423-426 4 p. 94

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. E-pub ahead of print

    A Framework for Cloud ERP System Implementation in Developing Countries: Learning from Lower Local Governments in Uganda

    Mpanga, D. & Elbanna, A., 19 May 2019, (E-pub ahead of print) IFIP WG 8.6 Conference 2019. p. 274-292 19 p. (AICT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    A Framework for Enforcing Constrained RBAC Policies

    Crampton, J. & Khambhammettu, H., 2009, Proceedings of 12th IEEE International Conference on Computational Science and Engineering. IEEE Computer Society Press, p. 195--200

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. A Framework for Improving the Sharing of Manufacturing Knowledge through Micro-Blogging

    Evans, R. D., Gao, J. X., Owodunni, O., Shah, S., Mahdikhah, S., Messaadia, M. & Baudry, D., 24 Sep 2014, Advances in Production Management Systems: Innovative and Knowledge-Based Production Management in a Global-Local World - IFIP WG 5.7 International Conference, APMS 2014, Proceedings. PART 1 ed. Springer New York LLC, p. 19-26 8 p. (IFIP Advances in Information and Communication Technology; vol. 438, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    A Framework for the Cryptographic Enforcement of Information Flow Policies

    Alderman, J., Crampton, J. & Farley, N., 7 Jun 2017, Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 143-154 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. E-pub ahead of print

    A framework for understanding the empowerment effects of telecentres on rural communities in developing countries

    Kapondera, S. K., Bernadi, R. & Panteli, N., 26 Apr 2019, (E-pub ahead of print) Information and Communication Technologies for Development. Strengthening Southern-Driven Cooperation as a Catalyst for ICT4D: 15th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2019, Dar es Salaam, Tanzania, May 1–3, 2019, Proceedings, Part I. Nielsen, P. & Kimaro, H. C. (eds.). Springer, p. 104-115 12 p. (IFIP Advances in Information and Communication Technology; vol. 551).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    A Full Operational Semantics for Asynchronous Relational Networks

    Vissani, I., Lopez Pombo, C., Tutu, I. & Fiadeiro, J. L., 30 Dec 2015, Recent Advances in Algebraic Development Techniques. Springer, p. 131-150 20 p. (Lecture Notes in Computer Science; vol. 9463).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. E-pub ahead of print

    A Functional Perspective on Machine Learning via Programmable Induction and Abduction

    Cheung, S., Davariu, V., Ghica, D., Muroya, K. & Rowe, R., 24 Apr 2018, (E-pub ahead of print) FLOPS 2018: Functional and Logic Programming. Springer, Vol. 10818. p. 84-98 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    A game of “Cut and Mouse”: bypassing antivirus by simulating user inputs

    Alper Genç, Z., Lenzini, G. & Sgandurra, D., 9 Dec 2019, The Annual Computer Security Applications Conference (ACSAC). ACM, p. 456-465 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    A game of prediction with expert advice

    Vovk, V., 1995, Proceedings of the Eighth Annual Conference on Computational Learning Theory . Maass, W. (ed.). New York: ACM Press, p. 51-60

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Unpublished

    A Gender Agenda

    Broadbent, J., 2015, (Unpublished) Meditari Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment

    Opperman, C. & Hancke, G., 2011, IEEE International Workshop on Near Field Communication . IEEE, p. 44-49

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    A graph based architectural (re)configuration language

    Wermelinger, M., Lopes, A. & Fiadeiro, J. L., 1 Jan 2001, 8th European Software Engineering Conference held jointly with 9th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2001. p. 21-32 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    A Hierarchical Anti-Counterfeit Mechanism: Securing the Supply Chain using RFIDs

    Bilal, Z. & Martin, K. M., 2014, Foundations and Practice of Security. Springer, Vol. 8352. p. 291-305 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    A High Power Fibre Laser for Electron Beam Emittance Measurements

    Corner, L., Nevay, L. J. & Walczak, R., 1 Dec 2010, IPAC 2010 - 1st International Particle Accelerator Conference. p. 3227-3229 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    A Holistic Approach to Simulating Beam Losses in the Large Hadron Collider Using BDSIM

    Walker, S., Abramov, A., Boogert, S., Garcia Morales, H., Gibson, S., Nevay, L., Pikhartova, H. & Shields, W., 4 May 2019, 13th International Computational Accelerator Physics Conference: ICAP2018, Key West, FL, USA. JACoW Publishing, p. 221-226 6 p. TUPAF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    A Hybrid Model for International Strategy Implementation

    Aboutalebi, R. & Tan, H., 23 Jun 2014, In: AIB (Academy of International Business), 56th annual conference of AIB: International Business, Local Contexts in Global Business. 23-26 June 2014, Beedie School of Business, Simon Fraser University, Vancouver, Canada..

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    A knowledge management perspective on a corporate portal implementation: A case study of a global IT-management consultancy firm

    Le Nguyen, K., Harindranath, G. & Dyerson, R., 2008, Proceedings of the 2008 European Conference on Information Systems (ECIS), Galway, Ireland. ECIS

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    A Lambek Calculus with Dependent Types

    Luo, Z., 2015, Types for Proofs and Programs.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    A learnable representation for syntax using residuated lattices

    Clark, A., 2009, Proceedings of the Conference on Formal Grammar.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    A Lightweight Service Registry for Unstable Ad-hoc Networks

    Goncalves, P., Stathis, K. & Peach, N., 16 Nov 2011, Proceedings of the International Joint Conference on Ambient Intelligence (AmI 2011). p. 136-140 (Lecture Notes in Computer Science; vol. 7040/2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    A link-layer-based self-replicating vulnerability discovery agent

    Wolthusen, S. D. & Al-Salloum, Z., 22 Jun 2010, 2010 IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society Press, p. 704-707

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    A location based security framework for authenticating mobile phones

    Francis, L., Mayes, K., Hancke, G. & Markantonakis, K., 2010, M-PAC '10: Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing. New York, NY: ACM, p. 5:1-5:8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. E-pub ahead of print

    A Logic-Based Reasoner for Discovering Authentication Vulnerabilities between Interconnected Accounts

    Karafili, E., Sgandurra, D. & Lupu, E., 24 Nov 2018, (E-pub ahead of print) 1st International Workshop on Emerging Technologies for Authorization and Authentication. Springer-Verlag, p. 73-87 15 p. (Lecture Notes in Computer Science; vol. 11263).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution