Home > Publications

Publications

37451 - 37475 out of 40,623Page size: 25
  1. Conference contribution › Research
  2. Published

    Science as a vocation? Hybrid academics in overlapping institutional and career spaces

    Lam, A., Jun 2019, National Science Foundation (NSF) Workshop: 'Science as a Vocation: A Centennial Perspective', Boston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Scriptcloud.com: Content Clouds for Screenplays

    McKie, S., 2 Jan 2008, Semantic Media Adaptation and Personalization, Second International Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    SDN-Actors: Modeling and Verification of SDN Programs

    Albert, E., Gómez-Zamalloa, M., Rubio, A., Sammartino, M. & Silva, A., 12 Jul 2018, (E-pub ahead of print) Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Springer-Verlag, p. 550-567 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Searches for gravitational effects at the TeV scale with the ATLAS detector

    Berry, T., 18 Mar 2014, Proceedings of the European Physical Society Conference on High Energy Physics. Proceedings of Science, p. 1-6 6 p. PoS(EPS-HEP 2013)261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, (E-pub ahead of print) 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, (E-pub ahead of print) 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Secure implementations for typed session abstractions

    Corin, R., Denielou, P-M., Fournet, C., Bhargavan, K. & Leifer, J., 2007, 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings. LOS ALAMITOS: IEEE COMPUTER SOC, p. 170-186 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Secure Sector Based Bi-path Clustering and Routing Protocol for WSNs

    Zang, Y., Thomas, J. P., Ghinea, G., Thomas, M. & Darwish, S., 6 Sep 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 777-784 8 p. 6296048

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Securing a Community Cloud

    Baiardi, F. & Sgandurra, D., 1 Jun 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops. p. 32-41 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Securing access to mobile networks beyond 3G

    Gehrmann, C., Horn, G., Jefferies, N. & Mitchell, C. J., 2001, Proceedings of the IST Mobile Communications Summit 2001, Barcelona, Spain, September 2001. p. 844-849 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Securing FIPA agent communication

    Borselius, N. & Mitchell, C. J., 2003, Proceedings of the 2003 International Conference on Security and Management (SAM '03), Las Vegas, Nevada, USA, June 2003. Arabnia, H. R. & Mun, Y. (eds.). CSREA Press, Vol. 1. p. 135-141 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Securing Personal Area Networks

    Garefalakis, T. & Mitchell, C. J., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, Vol. 3. p. 1257-1259 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Securing Reconfigurable Terminals - mechanisms and protocols

    Gultchev, S., Mitchell, C. J., Moessner, K. & Tafazolli, R., 2002, Proceedings of PIMRC 2002, 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Lisboa, Portugal, September 2002. IEEE, p. 804-808 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Security Against Related Randomness Attacks via Reconstructive Extractors

    Paterson, K., Sibborn, D., Schuldt, J. & Wee, H., 8 Dec 2015, Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. Groth, J. (ed.). Springer Verlag, Vol. 9496. p. 23-40 18 p. (Lecture Notes in Computer Science; vol. 9496).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Security analysis of smartcard to card reader communications for biometric cardholder authentication

    Rila, L. & Mitchell, C. J., 2002, Proceedings of CARDIS '02, 5th Smart Card Research and Advanced Application Conference, San Jose, California, November 2002. USENIX, p. 19-28 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Security and Integrity of a Distributed File Storage in a Virtual Environment

    Sala, G., Sgandurra, D. & Baiardi, F., 1 Sep 2007, Fourth International IEEE Security in Storage Workshop. p. 58-69 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism

    Al-Salloum, Z. & Wolthusen, S. D., 15 Feb 2010, ARES '10 International Conference on Availability, Reliability, and Security. IEEE Computer Society Press, p. 549-554

    Research output: Chapter in Book/Report/Conference proceedingConference contribution