Home > Publications

Publications

36601 - 36650 out of 39,105Page size: 50
  1. Conference contribution › Research
  2. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    User acceptance of emergency alert technology: A case study

    Wu, P. F., 1 Jan 2009, ISCRAM 2009 - 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Information Systems for Crisis Response and Management, ISCRAM

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    User Access Privacy in OAuth 2.0 and OpenID Connect

    Li, W. & Mitchell, C. J., 9 Apr 2020, (Accepted/In press) Proceedings of SecWeb 2020, 11 September 2020. IEEE Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    User Centric Security Model for Tamper-Resistant Devices

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Oct 2011, 8th IEEE International Conference on e-Business Engineering (ICEBE 2011). Li, J. & Chung, J-Y. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    User Preference Analysis of Internet Social Media services

    Pant, V., Harindranath, G. & Wagner, W. P., 13 Jan 2016, 2015 International Conference on Information Resource Management (Conf-IRM), Ottawa, Canada, May.. Vol. 34.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    User satisfaction evaluation of Malaysian e-government education services

    Wong, M. S. & Jackson, S., 5 Feb 2018, 23rd IEEE International Technology Management Conference, Madeira Island, Portugal. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Using 3G network components to enable NFC mobile transactions and authentication

    Chen, W., Hancke, G., Mayes, K., Lien, Y. & Chiu, J-H., 1 Dec 2010, Progress in Informatics and Computing (PIC), 2010 IEEE International Conference on. IEEE COMPUTER SOC, Vol. 1. p. 441 -448

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Using Argument-based Features to Predict and Analyse Review Helpfulness

    Liu, H., Gao, Y., Lv, P., Li, M., Geng, S., Li, M. & Wang, H., Sep 2017, Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing. Copenhagen, Denmark: Association for Computational Linguistics, p. 1358–1363 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Using CardSpace as a Password Manager

    Al-Sinani, H. & Mitchell, C. J., 2010, Policies and Research in Identity Management, 2nd IFIP WG 11.6 Working Conference, IDMAN 2010, Oslo, Norway, November 18-19 , 2010, Proceedings. de Leeuw, E., Fischer-Huebner, S. & Fritsch, L. (eds.). Springer-Verlag, p. 18-30 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Using constraints to protect personal location information

    Gajparia, A. & Mitchell, C. J., 2003, Proceedings of VTC 2003 Fall, IEEE Semiannual Vehicular Technology Conference, Orlando, Florida, October 2003. IEEE, Vol. 3. p. 2112-2116 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Using document-oriented GUIs in dynamic software product lines

    Kramer, D., Oussena, S., Komisarczuk, P. & Clark, T., 2013, Generative Programming: Concepts and Experiences, GPCE'13, Indianapolis, IN, USA - October 27 - 28, 2013. p. 85-94 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Using EMV cards for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2004, Public Key Infrastructure: First European PKI Workshop, Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings. Katsikas, S. K., Gritzalis, S. & Lopez, J. (eds.). Springer-Verlag, Vol. 3093. p. 205-217 13 p. (Lecture Notes in Computer Science; vol. 3093).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Using EMV cards to protect e-commerce transactions

    Khu-smith, V. & Mitchell, C. J., 2002, 3rd International Conference on Electronic Commerce and Web Technologies, Aix-en-Provence, France, September 2002. Bauknecht, K., Min Tjoa, A. & Quirchmayr, G. (eds.). Springer-Verlag, Vol. 2455. p. 388-399 12 p. (Lecture Notes in Computer Science; vol. 2455).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Using explicit state to describe architectures

    Lopes, A. & Fiadeiro, J. L., 1999, FUNDAMENTAL APPROACHES TO SOFTWARE ENGINEERING. Finance, JP. (ed.). BERLIN: SPRINGER-VERLAG BERLIN, p. 144-160 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Using GSM to enhance e-commerce security

    Khu-smith, V. & Mitchell, C. J., 2002, WMC '02, Proceedings of the Second ACM International Workshop on Mobile Commerce, Atlanta, Georgia, USA, September 2002. ACM, p. 75-81 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Using GSM/UMTS for single sign-on

    Pashalidis, A. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 138-145 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Using Human Interactive Proofs to secure human-machine interactions via untrusted intermediaries

    Mitchell, C. J., 2009, Security Protocols: 14th International Workshop, Cambridge, UK, March 27-29 2006: Revised Selected Papers. Christianson, B., Crispo, B., Malcolm, J. A. & Roe, M. (eds.). Springer-Verlag, p. 164-170 7 p. (Lecture Notes in Computer Science; vol. 5087).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Using multiple chains for Gibbs sampling in mixed graphical association models

    Brewer, M., Luo, Z. & Gammerman, A., 1994, Computational Statistics. p. 185-189

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Using NFC-enabled Phones for Remote Data Acquisition and Digital Control

    Opperman, C. & Hancke, G., 2011, IEEE Africon 2011. IEEE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Using NLG and sensors to support personal narrative for children with complex communication needs

    Black, R., Reddington, J., Reiter, E., Tintarev, N. & Waller, A., 2010, Proceedings of the NAACL HLT 2010 Workshop on Speech and Language Processing for Assistive Technologies. p. 1-9 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Using non-adaptive group testing to construct spy agent routes

    Kalogridis, G. & Mitchell, C., 2008, Proceedings of the Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona, Spain. IEEE Computer Society Press, p. 1013-1019 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Using Observations of Invariant Behavior to Detect Malicious Agency in Distributed Control Systems

    Mcevoy, R. & Wolthusen, S. D., 30 Sep 2009, Proc. 4th International Workshop on Critical Information Infrastructures Security (CRITIS 2009). Springer-Verlag, p. 62-72

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Using Physical Models for Anomaly Detection in Control Systems

    Svendsen, N. & Wolthusen, S. D., 23 Mar 2009, Critical Infrastructure Protection III: Proc. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Springer-Verlag, p. 139-149

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    USING SATELLITES FOR PROVIDING BROADBAND ISLAND INTERCONNECTION-THE RACE IIlR2074 (CATALYST) PROJECT

    Hadjitheodosiou, MH., Komisarczuk, P., Coakley, F., Evans, BG. & Smythe, C., 1994, AIAA International Communications Satellite Systems Conference, 15 th, San Diego, CA. p. 407-412 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Using the Choice Framework to Situate Cases of Collective Action in Capabilities Thinking: The Example of Public Procurement

    Kleine, D., Jun 2013, Maitreyee - e-Journal of the Human Development and Capability Association. Human Development and Capability Association (HDCA), p. 15-18 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Using the GSM/UMTS SIM to Secure Web Services

    Macdonald, J. A. & Mitchell, C. J., 2005, Proceedings of the 2nd IEEE International Workshop on Mobile Commerce and Services (WMCS 2005), Munich, July 2005. IEEE, p. 70-78 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Using Verification Technology to Specify and Detect Malware

    Holzer, A., Kinder, J. & Veith, H., Feb 2007, 11th Int. Conf. Computer Aided Systems Theory (Eurocast 2007), Revised Selected Papers. Springer, p. 497-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Utilisation de la méthode de la matrice R dans les calculs de l'ionisation d'atomes par impact d'électrons rapides

    Mota-Furtado, F., O'Mahony, P. & Hennecart, D. (ed.), 1989, Proceedings of Invited Lectures presented at 12ème Colloque sur la Physique des Collisions Atomiques et Electroniques (Caen, 21-24 June 1988), Conférences Invitées. Vol. 2. p. 101-117

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Utilising Geological Field Measurements and Historic Eruption Volumes to Estimate the Volume of Santorini's Magma Chamber

    Browning, J., Drymoni, K. & Gudmundsson, A., 2015, American Geophysical Union, Fall Meeting 2015.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Valid Probabilistic Prediction of Life Status after Percutaneous Coronary Intervention procedure

    Volkhonskiy, D., Nouretdinov, I., Gammerman, A. & Lim, P., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Validating an Insider Threat Detection System: A Real Scenario Perspective

    Agrafiotis, I., Erola, A., Happa, J., Goldsmith, M. & Creese, S., 4 Aug 2016, IEEE Security and Privacy Workshop on Research for Insider Threat. IEEE, p. 286-295 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Validation of a Seven Serum Biomarker Panel in Ovarian Cancer

    Timms, J. F., Arslan-Low, E., Cubizolles, M., Lomas, L., Yip, C., Meng, X-Y., Hogdall, E., Gentry-Maharaj, A., Ford, J., Burford, B., Nouretdinov, I., Vovk, V., Luo, Z., Menon, U., Gammerman, A., Fung, E. T. & Jacobs, I., 2007, Proceedings of the 15th International Meeting of the European Society of Gynaecological Oncology.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Variability and rigour in Service Computing engineering

    Ter Beek, M. H., Gnesi, S., Fantechi, A. & Fiadeiro, J. L., 1 Jan 2012, Proceedings - 2011 34th IEEE Software Engineering Workshop, SEW 2011. p. 122-127 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Varying Representation Schemata vs Fact Updating in KB Management

    Carapuça, R. & Fiadeiro, J. L., 1986, DS-2. p. 71-87 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Venn-Abers predictors

    Vovk, V. & Petej, I., 2014, Proceedings of the Thirtieth Conference on Uncertainty in Artificial Intelligence. p. 829-838 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Veraci fizioni. Sullo statuto della letteratura nella cultura delle Corti

    Jossa, S., 2010, A. Quondam (ed.), Classicismo e culture di Antico regime (Roma: Bulzoni, 2010). Quondam, A. (ed.). Bulzoni, p. 197-212 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Verifying Asynchronous Interactions via Communicating Session Automata

    Lange, J. & Yoshida, N., 2019, Computer Aided Verification - 31st International Conference, CAV 2019, Proceedings. Dillig, I. & Tasiran, S. (eds.). Springer Verlag, p. 97-117 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11561 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Verifying Software Integrity in Embedded Systems: A Side Channel Approach

    Msgna, M., Markantonakis, K., Naccache, D. & Mayes, K., 13 Apr 2014, Constructive Side Channel Analysis and Secure Design: 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers. Paris, France, p. 261-280 19 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Vers une architecture modulaire d'agent argumentatif pour la composition de services

    Morge, M., McGinnis, J., Bromuri, S., Toni, F. C., Mancarella, P. & Stathis, K., 1 Nov 2006, Proc. of the of 15th Journees Francophones sur les Systemes M ulti-Agents (JFSMA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Virtual closed networks: A secure approach to autonomous mobile ad hoc networks

    Hurley-Smith, D., Wetherall, J. & Adekunle, A., Dec 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, p. 391-398 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Virtual infrastructure for collision-prone wireless networks

    Chockler, G., Gilbert, S. & Lynch, N., Aug 2008, Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing. Toronto, ON, Canada: ACM, p. 233-242 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Virtual Interacting Network Community: Exploiting Multi-core Architectures to Increase Security

    Baiardi, F. & Sgandurra, D., 2008, Proceedings of the 5th Conference on Computing Frontiers. New York, NY, USA: ACM, p. 111-112 2 p. (CF '08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Virtual World Authentication Using the Smart Card Web Server

    Kyrillidis, L., Hili, G., Cobourne, S., Mayes, K. & Markantonakis, K., 2013, Security in Computing and Communications. Thampi, S., Atrey, P., Fan, C-I. & Martinez Perez, G. (eds.). Springer-Verlag, p. 30-41 (Communications in Computer and Information Science; vol. 377).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Visible-Spectrum Biometric Retina Recognition

    Borgen, H., Bours, P. & Wolthusen, S. D., 15 Aug 2008, Proc. 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIHMSP '08). IEEE Computer Society Press, p. 1056-1062

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Visualizing narratives: The case of the celebrity CEO (Panel discussion)

    Reppel, A. & Kravets, O., 7 Jul 2016, Proceedings of the 41st Annual Macromarketing Conference. p. 107-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Walking the Line: The Everyday Security Ties that Bind

    Coles-Kemp, L. & Rydhof Hansen, R., 2017, Human Aspects of Information Security, Privacy and Trust: 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings. Springer, Vol. 10292. p. 464-480 17 p. (Lecture Notes in Computer Science; vol. 10292).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Warlordism and the making of the Roman imperial army

    Rankov, B., 2018, Warlords and Interstate Relations in the Ancient Mediterranean. Naco del Hoyo, T. & Lopez Sanchez, F. (eds.). Leiden/Boston MA: E. J. Brill, p. 415-25 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Water Logging in Keshanbpur: A Focus to the Coping Strategies of the People

    Adri, N. & Islam, I., 2010, Proceedings of International Conference on Environmental aspects of Bangladesh (ICEAB 10). Japan, p. 33-36 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    We Crashed, Now What?

    Giuffrida, C., Cavallaro, L. & Tanenbaum, A. S., 3 Oct 2010, Proceedings of the 6th Workshop on Hot Topics in System Dependability (HotDep'10).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution