Home > Publications

Publications

39801 - 39900 out of 43,192Page size: 100
  1. Conference contribution › Research
  2. Published

    Revisiting the Institutional Approach to Herbrand's Theorem

    Tutu, I. & Fiadeiro, J. L., 21 Oct 2015, Revisiting the Institutional Approach to Herbrand's Theorem. p. 304-319 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Revisiting the role of ICT in development

    Harindranath, G. & Sein, M. K., 2007, Proceedings of the IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries. Sao Paulo: IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Reward Learning for Efficient Reinforcement Learning in Extractive Document Summarisation

    Gao, Y., Meyer, C. M., Mesgar, M. & Gurevych, I., Aug 2019, Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI-19). International Joint Conferences on Artificial Intelligence, p. 2350-2356 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Rhythmic Routes: Developing a nomadic physical practice for the daily commute

    Overend, D. & Bissell, L., 2014, Scottish Journal of Performance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Ridge Regression Confidence Machine

    Nouretdinov, I., Melluish, T. & Vovk, V., 2001, Proceedings of the Eighteenth International Conference on Machine Learning. p. 385-392

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Ridge Regression learning algorithm in dual variables

    Saunders, C., Gammerman, A. & Vovk, V., 1998, Proceedings of the Fifteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 515-521 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Unpublished

    Risk Disclosure Policies: A cross-sectional study of the Greek Banking Industry

    Anagnostopoulos, I., 2011, (Unpublished) GSTF (Global Science Forum), 23-24 May 2011, Singapore .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Risk Tolerance And Risk Management In Everyday Life Of SMEs

    Kouraklis, I., 2005, Proceedings of Small And Medium Enterprises In European Economies, International Conference, Babes-Bolyai University, Cluj-Napoca, Romania.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Robit: an extensible auction-based market platform for challenged environments

    Haile, Y., Reda, A., Noble, B., Duong, Q. & Alperovich, T., 30 Dec 2010, ICTD '10: Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development. Association for Computing Machinery (ACM), p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Robust Leader Election in a Fast-Changing World

    Augustine, J., Kulkarni, T., Nakhe, P. & Robinson, P., 2013, Proceedings Ninth International Workshop on Foundations of Mobile Computing, FOMC 2013, Jerusalem, Israel, October 17-18, 2013.. p. 38-49 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Robustness Against Unknown Noise for Raw Data Fusing Neural Networks

    Bijelic, M., Muench, C., Ritter, W., Kalnishkan, Y. & Dietmayer, K., Dec 2018, 21st IEEE International Conference on Intelligent Transportation Systems (IEEE ITSC 2018). IEEE Xplore, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    'Roellig in charge': a reassessment of the cantata repertoire in Zerbst between 1749 and 1765

    Springthorpe, N., 2017, Fasch-Studien 14: 'Fasch und die Konfessionen': Bericht über die Internationale Wissenschaftliche Konferenz vom 21. bis 22. April 2017 im Rahmen der 14. Internationalen Fasch-Festtage in Zerbst. Beeskow: Ortus Musikverlag, p. 225-252 27 p. (Fasch-Studien; vol. XIV).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    ROTOR: A Tool for Renaming Values in OCaml's Module System

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 28 May 2019, IWOR '19 Proceedings of the 3rd International Workshop on Refactoring. IEEE Press, p. 27-30 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 May 2021, (E-pub ahead of print) PKC 2021. Springer, p. 261-289 29 p. (Lecture Notes in Computer Science; vol. 12711).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Rule Value Reinforcement Learning for Cognitive Agents

    Child, C. & Stathis, K., 1 May 2006, Proc. of 5th International Conference on Autonomous Agents an d Multi-agent Systems (AAMAS06). p. 792-794 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Saadiyat and sovereign wealth in the United Arab Emirates: the making of a premier island destination

    Chong, D., 2016, The Art Marketing in Global Perspective (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Safe Specification of Operator Precedence Rules

    Afroozeh, A., van den Brand, M., Johnstone, A., Scott, E. & Vinju, J., 2013, Software Language Engineering Lecture Notes in Computer Science . Vol. 8225. p. 137-156 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Saladin and Gift-Giving

    Phillips, J., 3 Jan 2020, The History of Syria, 1099-1250: Conflict and Co-existence. Hillenbrand, C. (ed.). Edinburgh University Press, p. 307-320

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Salem numbers and Pisot numbers from stars

    McKee, J., Smyth, C. J. & Rowlinson, P., 1999, Number Theory in Progress: Number ThProceedings of the International Conference on Number Theory in Honor of Andrzej Schinzel, held in Zakopane, Poland, June 30 – July 9, 1997. Part I: Diophantine Problems and Polynomials. de Gruyter, p. 309-319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Salience and Asset Prices

    Bordalo, P., Gennaioli, N. & Shleifer, A., May 2013, American Economic Review, Papers & Proceedings. Vol. 103(3). p. 623-628

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Saltando al barranco sin salir: Transformismo en un baile ritual del Norte de Potosí

    Stobart, H., 2019, Anales de la Reunión Anual de Etnología 33 (Museo Nacional de Etnografía y Folklore, La Paz, Bolivia): Expresiones: Cuerpos y objetos. La Paz, Bolivia: Museo Nacional de Etnografía y Folklore, La Paz, Bolivia, Vol. 33. p. 195-204 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Saturation algorithms for model-checking pushdown systems

    Hague, M. & Carayol, A., May 2014, Proceedings of the 14th International Conference on Automata and Formal Languages . 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Saturation of Concurrent Collapsible Pushdown Systems

    Hague, M., 12 Dec 2013, FSTTCS: Foundations of Software Technology and Theoretical Computer Science. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Scaffold of Asymmetric Organic Compounds-Magnetite Plaquettes

    Chan, QHS., Zolensky, ME. & Martinez, J., 2015, 46th Lunar and Planetary Science Conference, held March 16-20, 2015 in The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Scalable communication middleware for permissioned distributed ledgers

    Barger, A., Manevich, Y., Mandler, B., Bortnikov, V., Laventman, G. & Chockler, G., 22 May 2017, SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage Conference. New York: ACM, p. 1 1 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Scalable Group Membership Services for Novel Applications

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1998, Proceedings of the DIMACS Workshop on Networks in Distributed Computing. Merritt, M. & Shavit, N. (eds.). American Mathematical Society, p. 23-42 20 p. (DIMACS Series in Discrete Mathematics and Theoretical Computer Science; vol. 45).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Scalable RFID pseudonym protocol

    Song, B. & Mitchell, C. J., 2009, NSS 2009, Network & System Security, 19-21 October 2009, Gold Coast, Queensland, Australia. IEEE Computer Society Press, p. 216-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Science as a vocation? Hybrid academics in overlapping institutional and career spaces

    Lam, A., Jun 2019, National Science Foundation (NSF) Workshop: 'Science as a Vocation: A Centennial Perspective', Boston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Scriptcloud.com: Content Clouds for Screenplays

    McKie, S., 2 Jan 2008, Semantic Media Adaptation and Personalization, Second International Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    SDN-Actors: Modeling and Verification of SDN Programs

    Albert, E., Gómez-Zamalloa, M., Rubio, A., Sammartino, M. & Silva, A., 12 Jul 2018, Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Springer-Verlag, p. 550-567 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Searches for gravitational effects at the TeV scale with the ATLAS detector

    Berry, T., 18 Mar 2014, Proceedings of the European Physical Society Conference on High Energy Physics. Proceedings of Science, p. 1-6 6 p. PoS(EPS-HEP 2013)261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, (E-pub ahead of print) 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, (E-pub ahead of print) 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Secure implementations for typed session abstractions

    Corin, R., Denielou, P-M., Fournet, C., Bhargavan, K. & Leifer, J., 2007, 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings. LOS ALAMITOS: IEEE COMPUTER SOC, p. 170-186 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

    Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M. & Darwish, S., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 777-784 8 p. 6296048

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Securing a Community Cloud

    Baiardi, F. & Sgandurra, D., 1 Jun 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. p. 32-41 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Security and Integrity of a Distributed File Storage in a Virtual Environment

    Sala, G., Sgandurra, D. & Baiardi, F., 1 Sep 2007, Fourth International IEEE Security in Storage Workshop. p. 58-69 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. E-pub ahead of print

    Security and performance comparison of different secure channel protocols for Avionics Wireless Networks

    Akram, R., Markantonakis, K., Mayes, K., Bonnefoi, P-F., Sauveron, D. & Chaumette, S., 12 Dec 2016, (E-pub ahead of print) 2016 IEEE/AIAA 35th Digital Avionics Systems Conference (DASC). Roy, A. & Schuster, W. (eds.). IEEE Computer Society, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Security in future mobile networks

    Mitchell, C. J., 1995, Proceedings of the Second International Workshop on Mobile Multi-Media Communications (MoMuC-2), Bristol, April 1995.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Security Infrastructure for Service Oriented Architectures at the Tactical Edge

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 11th International Conference on Complex, Intelligent, and Software Intensive Systems (CISIS 2017). Springer-Verlag, p. 310-322 13 p. (Advances in Intelligent Systems and Computing; vol. 611).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Security Issues in OAuth 2.0 SSO Implementations

    Li, W. & Mitchell, C. J., 2014, Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Chow, S., Camenisch, J., Hui, L. & Yiu, S-M. (eds.). Springer-Verlag, p. 529-541 13 p. (Lecture Notes in Computer Science; vol. 8783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Security of Symmetric Encryption against Mass Surveillance

    Bellare, M., Paterson, K. G. & Rogaway, P., Aug 2014, Advances in Cryptology – CRYPTO 2014: 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, p. 1-19 19 p. (Lecture Notes in Computer Science; vol. 8616).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Security of Symmetric Encryption in the Presence of Ciphertext Fragmentation

    Boldyreva, A., Degabriele, J. P., Paterson, K. G. & Stam, M., 2012, EUROCRYPT. Pointcheval, D. & Johansson, T. (eds.). Springer, Vol. 7237. p. 682-699 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Security properties of two authenticated conference key agreement protocols

    Tang, Q. & Mitchell, C. J., 2005, Information and Communications Security: 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings. Qing, S., Mao, W., Lopez, J. & Wang, G. (eds.). Springer-Verlag, Vol. 3783. p. 304-314 11 p. (Lecture Notes in Computer Science; vol. 3783).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Security protocols for biometrics-based cardholder authentication in smartcards

    Rila, L. & Mitchell, C. J., 2003, Applied Cryptography and Network Security - First International Conference, ACNS 2003 - Kunming, China, October 16-19 2003 - Proceedings. Zhou, J., Yung, M. & Han, Y. (eds.). Springer-Verlag, p. 254-264 11 p. (Lecture Notes in Computer Science; vol. 2846).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Security Requirements for the Deployment of Services Across Tactical SOA

    Gkioulos, V. & Wolthusen, S., 2017, Proceedings of the 2017 International Conference on Mathematical Methods, Models,and Architectures for Computer Network Security (MMM-ACNS 2017). Springer-Verlag, Vol. 10446. p. 115-127 13 p. (Lecture Notes in Computer Science; vol. 10446).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Security Server-Based Architecture for Mobile Ad Hoc Networks

    Darwish, S., Taylor, S. J. E. & Ghinea, G., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 926-930 5 p. 6296071

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Security techniques

    Mitchell, C. J., 1995, Proceedings of the IEE Electronics Division Colloquium on Security in Networks, London, February 1995. IEE Press, p. 2/1-2/6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Security V&V Within Software SMEs: A Socio-Technical Interaction Network Analysis

    Kreeger, M. N. & Harindranath, G., 22 Jun 2017, Proceedings of the 2017 International Conference on Information Resources Management (Conf-IRM 2017). Janczewski, L., Cunha, M. A. & Sánchez, A. (eds.). Santiago, Chile: Conf-IRM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Security Verification and Validation by Software SMEs: Theory versus Practice

    Kreeger, M. N. & Harindranath, G., 2012, Proceedings of the 2012 International Conference on Information Resources Management (Conf-IRM 2012). Brandtweiner, R. & Janczewski, L. (eds.). Vienna, Austria: Conf-IRM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Security vulnerabilities in ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of ISCTA '03, 7th International Symposium on Communications Theory and Applications, Ambleside, UK, July 2003. p. 99-104 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Security vulnerabilities in DNS and DNSSEC

    Ariyapperuma, S. & Mitchell, C. J., 2007, Proceedings of ARES 2007, The International Conference on Availability, Reliability and Security, Vienna, April 2007. IEEE Computer Society Press, p. 335-342 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Sedimentation in structurally-confined narrow basins: toward the identification of uncommon depositional system

    Longhitano, S. G., Casciano, C., Chiarella, D., Sabato, L. & Tropeano, M., 2016, AAPG Annual Convention & Exhibition 2016.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Sedimentation in tectonically-confined narrow basins: do classical depositional models still work?

    Longhitano, S. G. & Chiarella, D., 2016, Advances in siliciclastic and carbonate sedimentology:concepts and case studies from the Norwegian Continental Shelf. p. 9-10

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Sedimentology of a mixed (bioclastic/siliciclastic) Pliocene succession near Acerenza (Southern Apennines, Basilicata, Italy

    Chiarella, D., Longhitano, S. G., Sabato, L. & Tropeano, M., 2008, 26th IAS 2009 – Books of Abstract. p. 78

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Sediments segregation rate as tool for discriminating depositional environments in ancient mixed (silici-/bioclastic) shallow-water marine system (Pliocene, Southern Apennines, Italy)

    Chiarella, D. & Longhitano, S. G., 2009, 27th IAS 2009 – Books of Abstract. p. 469

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Seeing the full picture: The case for extending security ceremony analysis

    Bella, G. & Coles-Kemp, L., 2011, Proceedings of 9th Australian Information Security Management Conference. p. 49-55 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Seeing through MIST Given a Small Fraction of an RSA Private Key

    Walter, C. D., 2003, CT-RSA 2003. Joye, M. (ed.). Springer, Vol. 2612. p. 391-402 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Select Response Grouping Proof for RFID Tags

    Leng, X., Lien, Y., Mayes, K., Markantonakis, K. & Chiu, J-H., 2009, Proceedings of the 2009 First Asian Conference on Intelligent Information and Database Systems. Washington, DC, USA: IEEE Computer Society Press, p. 73-77 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Selective mixture of Gaussians clustering for location fingerprinting

    Nguyen, K. & Luo, Z., 5 Dec 2014, 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (i-Locate, MOBIQUITOUS 2014). London, UK: ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Selective, multi-level modelling for accelerated simulation of large, heterogeneous corporate telecommunications networks

    Pitts, J., Luo, Z., Nyong, D. & Cosmas, J., 1998, 15th IEE UK Teletraffic Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Self-calibrating probability forecasting

    Vovk, V., Shafer, G. & Nouretdinov, I., 2004, Advances in Neural Information Processing Systems. Thrun, S., Saul, L. & Schoelkopf, B. (eds.). Cambridge, MA: MIT Press, Vol. 16. p. 1133-1140 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Self-Esteem as a Moderator of the Effects of Mortality Salience on Consumer Disposing Behavior

    Atalay, S., Türe, M. & Young, K., 2010, Proceedings of the 39th EMAC Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Self-organization and novelty: pre-configurations of emergence in early British Cybernetics

    Soler-Adillon, J. & Penny, S., 24 Jun 2014, Norbert Wiener in the 21st Century (21CW), 2014 IEEE Conference on. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Semantics of Architectural Connectors

    Fiadeiro, J. L. & Lopes, A., 1997, TAPSOFT. Springer, Vol. 1214. p. 505-519 15 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Semantics of Interworking Knowledge Based Systems

    Reichwein, G. & Fiadeiro, J. L., 1993, EPIA. Springer, Vol. 727. p. 93-104 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Semantics-Driven Introspection in a Virtual Environment

    Tamberi, F., Maggiari, D., Sgandurra, D. & Baiardi, F., 1 Sep 2008, 2008 The Fourth International Conference on Information Assurance and Security. p. 299-302 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Semi-Algebraic Proofs, IPS Lower Bounds and the τ-Conjecture: Can a Natural Number be Negative?

    Alekseev, Y., Grigoriev, D., Hirsch, E. & Tzameret, I., Jun 2020, STOC 2020: Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing. Association for Computing Machinery (ACM), p. 54-67 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination

    Wolthusen, S. D. & Al-Salloum, Z., 15 Sep 2009, Proceedings of the Fifth International Conference on IT Security Incident Management and IT Forensics 2009. IEEE Computer Society Press, p. 41-53

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Senescent ground tree rewrite systems

    Hague, M., 14 Jul 2014, CSL-LICS '14 Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). ACM, 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published

    Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Ameen, N. & Shah, M., 2019, Senior tourists’ preferences of smart tourism destinations in Europe: Challenges of Europe: Growth, Competitiveness, Innovation and Well-being”, University of Split.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Sensemaking, systemic competition, and the social compact

    Ashdown, N., 21 Dec 2021, Futures Student Essay Competition. UK Ministry of Defence, p. 38-46

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Sensor Network Grids: Agent Environment combined with QoS in Wireless Sensor Networks

    Stathis, K., Kafetzoglou, S. & Bromuri, S. P. A. N. S., 1 Jun 2007, Proceedings of the 3rd International Conference on Autonomic and Autonomous Systems (ICAS'07).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution