Home > Publications

Publications

38426 - 38450 out of 42,956Page size: 25
  1. Conference contribution › Research
  2. Published

    Efficiency Improvements for Encrypt-to-Self

    Pijnenburg, J. & Poettering, B., Nov 2020, CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race. Association for Computing Machinery, Inc, p. 13-23 11 p. (CYSARM 2020 - Proceedings of the 2nd Workshop on Cyber-Security Arms Race).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Efficiency of conformalized ridge regression

    Burnaev, E. & Vovk, V., 2014, Proceedings of the Twenty Seventh Annual Conference on Learning Theory: JMLR: Workshop and Conference Proceedings. Vol. 35. p. 605-622 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Efficiency updates for the restricted growth function GA for grouping problems

    Tucker, A., Swift, S. & Crampton, J., 2007, Proceedings of Genetic and Evolutionary Computation Conference, GECCO 2007. Lipson, H. (ed.). ACM Press, p. 1536 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. E-pub ahead of print

    Efficient and Provable White-Box Primitives

    Fouque, P-A., Karpman, P., Kirchner, P. & Minaud, B., 9 Nov 2016, (E-pub ahead of print) Advances in Cryptology – ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Springer Verlag, p. 159-188 30 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Efficient compilers for authenticated group key exchange

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 192-197 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Efficient Computation of Balanced Structures

    Harris, D. G., Morsy, E., Pandurangan, G., Robinson, P. & Srinivasan, A., 2013, Automata, Languages, and Programming - 40th International Colloquium, ICALP 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part II. p. 581-593 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Efficient dynamic resource specifications

    Bubendorfer, K., Komisarczuk, P. & Chard, K., 2005, 6th International Conference on Mobile Data Management (MDM 2005), Ayia Napa, Cyprus, May 9-13, 2005. p. 281-285 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Efficient implementation of the local capon spectral estimate

    Alty, S. R., Benesty, J. & Jakobsson, A., Sep 2007, 15th European Signal Processing Conference, EUSIPCO 2007 - Proceedings. p. 2125-2128 4 p. (European Signal Processing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Efficient implementation of the time-recursive Capon and APES spectral estimators

    Alty, S. R., Jakobsson, A. & Larsson, E. G., 3 Apr 2015, 2004 12th European Signal Processing Conference, EUSIPCO 2004. European Signal Processing Conference, EUSIPCO, Vol. 06-10-September-2004. p. 1269-1272 4 p. 7080094

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Efficient model checking of fault-tolerant distributed protocols

    Bokor, P., Kinder, J., Serafini, M. & Suri, N., 2011, Proc. 41st Int Conf. Dependable Systems and Networks (DSN-DCCS 2011). IEEE, p. 73-84

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Efficient Sampling with Small Populations: a Genetic Algorithm Satisfying Detailed Balance

    Watkins, C. & Buttkewitz, Y., 11 Jul 2015, Gecco Companion '15: Proceedings of the Companion Publication of the 2015 Genetic and Evolutionary Computation Conference. p. 1517-1518 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Efficient Security Policy Reconciliation in Tactical Service Oriented Architectures

    Wolthusen, S., 2016, Proceedings of the Second International Conference on Future Network Systems and Security. Springer-Verlag, p. 47-61 15 p. (Communications in Computer and Information Science; vol. 670).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Efficient state estimation and Byzantine behavior identification in Tactical MANETs

    Ebinger, P. & Wolthusen, S. D., 18 Oct 2009, Proc. 2009 IEEE Military Communications Conference (MILCOM 2009). IEEE Computer Society Press, 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Efficient state merging in symbolic execution

    Kuznetsov, V., Kinder, J., Bucur, S. & Candea, G., Jun 2012, Proc. 33rd Conf. Programming Language Design and Implementation (PLDI 2012). ACM, p. 193-204

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Efficient, correct, unsupervised learning of context-sensitive languages

    Clark, A., 2010, Proceedings of the Fourteenth Conference on Computational Natural Language Learning. p. 28-37

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Either / Or

    Samson, J., 2008, Rethinking Musical Modernism: Proceedings of the international conference held from October 11 to 13, 2007. Despić, D. & Milin, M. (eds.). Belgrade: Serbian Academy of Sciences and Arts, p. 15-26

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Electroantennogram obtained from honeybee antennae for odor detection

    Wang, Y., Zheng, Y., Luo, Z. & Li, G., 2010, Lecture Notes in Computer Science. Springer, Vol. 6063. p. 63-66

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Electronic Case Management System in the judiciary: Perspectives from the Judiciary of Malawi

    Chawinga, C., Chawinga, W., Majawa, F. & Kapondera, S., 2018, Standing Conference of Eastern Central and Southern African Libraries Associatio.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Electronic transaction security: An analysis of the effectiveness of SSL and TLS

    Khu-smith, V. & Mitchell, C. J., 2002, Proceedings of the International Conference on Security and Management (SAM '02), Las Vegas, Nevada, USA, June 2002. CSREA Press, p. 425-429 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Email-based Password Recovery - Risking or Rescuing Users?

    Al Maqbali, F. & Mitchell, C. J., 24 Dec 2018, Proceedings of ICCST 2018: 52nd Annual IEEE International Carnahan Conference on Security Technology. IEEE Press, p. 1-5 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Embedding knowledge management into business process: The use of threaded discussion forums and knowledge objects at AstraZeneca

    Jashapara, A. & Adelmann, H., 2003, Proceedings of ECKM 2003: The 4th European Conference on Knowledge Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Emergence and mutability of social media work practices

    Hafezieh, N. & Amis, J., 2017, International Conference on Information Systems Proceedings. Association for Information Systems

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Forthcoming

    Emerging market MNEs' expatriate Management

    Rui, H. & Zhang, M., 16 Mar 2016, (Accepted/In press) Academy of International Business 2016 conference proceeding. AIB

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Emerging technologies of IoT usage in global logistics

    Shah, S., Rutherford, R. & Menon, S., 2 Apr 2020, Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020. Institute of Electrical and Electronics Engineers Inc., p. 251-257 7 p. 9051530. (Proceedings of International Conference on Computation, Automation and Knowledge Management, ICCAKM 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. E-pub ahead of print

    EmLog: Tamper-Resistant System Logging for Constrained Devices with TEEs

    Shepherd, C., Akram, R. N. & Markantonakis, K., 21 Jun 2018, (E-pub ahead of print) 11th IFIP International Conference on Information Security Theory and Practice (WISTP'17). Springer, p. 75-92 18 p. (Lecture Notes in Computer Science; vol. 10741).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution