Home > Publications

Publications

37601 - 37625 out of 42,597Page size: 25
  1. Conference contribution › Research
  2. Published

    Authentication with Weaker Trust Assumptions for Voting Systems

    Quaglia, E. & Smyth, B., 2018, Progress in Cryptology – AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Springer, p. 322-343 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Authorization and Certificates: Are We Pushing When We Should Be Pulling?

    Crampton, J. & Khambhammettu, H., 2003, Proceedings of IASTED Conference on Network and Information Security. p. 62-66 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Authorization recycling in RBAC systems

    Wei, Q., Crampton, J., Beznosov, K. & Ripeanu, M., 2008, Proceedings of 13th ACM Symposium on Access Control Models and Technologies. Ray, I. & Li, N. (eds.). ACM Press, p. 63-72 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Automated Analysis and Verification of TLS 1.3: 0-RTT, Resumption and Delayed Authentication

    Cremers, C., Horvat, M., Scott, S. & Van Der Merwe, T., 18 Aug 2016, IEEE Symposium on Security and Privacy 2016. p. 470-485 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Automated Debugging for Arbitrarily Long Executions

    Zamfir, C., Kasikci, B., Kinder, J., Bugnion, E. & Candea, G., May 2013, Proc. 14th Workshop on Hot Topics in Operating Systems (HotOS 2013). USENIX

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. E-pub ahead of print

    Automated peripheral neuropathy assessment of diabetic patients using optical imaging and binary processing techniques

    Siddiqui, H. U. R., Alty, S. R., Spruce, M. & Dudley, S. E., 14 Feb 2013, (E-pub ahead of print) IEEE EMBS Special Topic Conference on Point-of-Care (POC) Healthcare Technologies: Synergy Towards Better Global Healthcare, PHT 2013. p. 200-203 4 p. 6461319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Automated Planning for Urban Traffic Management

    McCluskey, T. L., Vallati, M. & Franco, S., 2017, Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, IJCAI 2017, Melbourne, Australia, August 19-25, 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 5238-5240 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Automated Semmes Weinstein monofilament examination replication using optical imaging and mechanical probe assembly

    Siddiqui, H. U. R., Spruce, M., Alty, S. R. & Dudley, S., 21 Jul 2015, 2015 IEEE 12th International Symposium on Biomedical Imaging, ISBI 2015. IEEE Computer Society, Vol. 2015-July. p. 552-555 4 p. 7163933

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Automated taxonomy extraction from semantic business process models

    De Cesare, S., Juric, D. & Lycett, M., 7 Mar 2016, Proceedings of the 49th Annual Hawaii International Conference on System Sciences, HICSS 2016. IEEE Computer Society, Vol. 2016-March. p. 4394-4403 10 p. 7427732

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Automated Transformation of PDDL Representations

    Riddle, P. J., Barley, M. W., Franco, S. & Douglas, J., 14 May 2015, Proceedings of the Eighth Annual Symposium on Combinatorial Search, SOCS 2015: 11-13 June 2015, Ein Gedi, the Dead Sea, Israel. Lelis, L. & Stern, R. (eds.). AAAI Press, p. 214-215 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Automated Workflows using Dialectical Argumentation

    McGinnis, J., Bromuri, S., Urovi, V. & Stathis, K., 1 May 2007, German e-Science Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Automatic cyclic termination proofs for recursive procedures in separation logic

    Rowe, R. & Brotherston, J., 16 Jan 2017, CPP 2017 Proceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs. ACM, p. 53-65 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Automatic path generation for multirotor descents through varying air masses above Ascension Island

    Greatwood, C., Richardson, T., Freer, J., Thomas, R., Brownlow, R., Lowry, D., Fisher, R. E. & Nisbet, E. G., 2016, AIAA Atmospheric Flight Mechanics Conference. American Institute of Aeronautics and Astronautics Inc, AIAA

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Automating Malware Scanning Using Workflows

    Stirling, D., Welch, I., Komisarczuk, P. & Seifert, C., 2009, 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, CCGrid 2009, Shanghai, China, 18-21 May 2009. p. 562-567 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Automating the evaluation of trustworthiness

    Sel, M. & Mitchell, C. J., 1 Sep 2021, Trust, Privacy and Security in Digital Business - 18th International Conference, TrustBus 2021, September 2021, Proceedings. Fischer-Huebner, S., Lambrinoudakis, C., Kotsis, G., Min Tjoa, A. & Khalil, I. (eds.). Springer-Verlag, p. 18-31 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Autonomous Building of Structures in Unstructured Environments via AI Planning

    Roberts, J., Franco Aixela, S., Stokes, A. & Bernardini, S., 17 May 2021, The 31st International Conference on Automated Planning and Scheduling (ICAPS 2021).. 1 ed. Vol. 31. p. 491-499 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    AutoPass: An automatic password generator

    Al Maqbali, F. & Mitchell, C. J., 7 Dec 2017, 2017 International Carnahan Conference on Security Technology (ICCST): Proceedings. IEEE Press, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Avoiding key redistribution in key assignment schemes

    Rowe, H. & Crampton, J., 2007, Proceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security. p. 127-140 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    BabelView: Evaluating the Impact of Code Injection Attacks in Mobile Webviews

    Rizzo, C., Cavallaro, L. & Kinder, J., 2018, 21st International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018). Springer, p. 25-46 22 p. (Lecture Notes in Computer Science (LNCS); vol. 11050).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Back to basics: Sharing goals and developing trust in global virtual teams

    Tucker, R. & Panteli, N., 2003, IFIP Advances in Information and Communication Technology. Springer New York LLC, Vol. 126. p. 85-98 14 p. (IFIP Advances in Information and Communication Technology; vol. 126).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Backoff protocols for distributed mutual exclusion and ordering

    Chockler, G., Malkhi, D. & Reiter, M. K., 1 Jan 2001, Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS '01). p. 11-20 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Ballistic impact of composite laminates: Experiments and simulations

    Guild, F. J., El-Habti, M. & Hogg, P. J., 1 Dec 2007, ICCM International Conferences on Composite Materials.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Bank Mergers’ Risks: the Macro and Micro Prudential approaches and their determinants

    Hassan, M. & Giouvris, E., 18 Jun 2019, The 12th International Risk Management Conference. Altman, E., Brenner, M., Dalocchio, M. & Gabbi, G. (eds.). Italy: The Risk, Banking and Finace Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Bark beetle fossils from two early post-glacial age sites at high altitude in the Colorado Rocky Mountains

    Elias, S., 1982, Journal of Paleontology: 1982 North American Paleontological Convention Proceedings Volume . Vol. 1. p. 53-57

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Barriers for Digital Transformation: The role of industry

    Linderoth, H. C. J., Jacobsson, M. & Elbanna, A., 2018, Australisian Conference on Information Systems, Sydney.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution