Home > Publications

Publications

37601 - 37700 out of 40,890Page size: 100
  1. Conference contribution › Research
  2. E-pub ahead of print

    Recurrent Auto-Encoder Model for Large-Scale Industrial Sensor Signal Analysis

    Wong, T. & Luo, Z., 27 Jul 2018, (E-pub ahead of print) International Conference on Engineering Applications of Neural Networks: EANN 2018. Pimenidis, E. & Jayne, C. (eds.). Springer, p. 203-216 14 p. (Communications in Computer and Information Science; vol. 893).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Reducing Normative Conflicts in Information Security

    Pieters, W. & Coles-Kemp, L., 2011, NSPW '11: Proceedings of the 2011 New security paradigms workshop, 12-15 Sep 2011, Marin County, CA. . ACM, p. 11-24 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Reducing the Space Requirements of Instant Replay

    Levrouw, L. J. & Audenaert, K., 1993, Proc. of the ACM/ONR Workshop on Parallel and Distributed Debugging. San Diego: ACM, p. 205-207

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Re-Evaluating SMEs IT Readiness in the Age of the Cloud

    Dyerson, R. & Spinelli, R., Sep 2017, 2017 Proceedings of the European Conference on Information Management and Evaluation, Genoa.. 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Refining Process Descriptions from Execution Data in Hybrid Planning Domain Models

    Linday, A., Franco Aixela, S., Reya, R. & McCluskey, L., 1 Jun 2020, Proceedings of the Thirtieth International Conference on Automated Planning and Scheduling, Nancy, France, October 26-30, 2020. AAAI Press, Vol. 30 (2020). p. 469-477 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2010, Proceedings of the DIALM-POMC Joint Workshop on Foundations of Mobile Computing, Cambridge, Massachusetts, USA, September 16, 2010. p. 81-90 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Regular Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 2014, 8th International Workshop on Reachability Problems 2014. 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Re-imagining the disruptive innovation theory in the digital platforms era

    Elbanna, A., Jun 2017, IFIP 8.6 Working Conference 2017: Re-Imagining Diffusion of Information Technology. Guimarães, Portugal

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Related Randomness Attacks for Public Key Encryption

    Paterson, K. G., Schuldt, J. C. N. & Sibborn, D. L., 2014, PKC 2014. Krawczyk, H. (ed.). Springer, Vol. 8383. p. 465-482 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Related-Key Impossible-Differential Attack on Reduced-Round Skinny

    Ankele, R., Banik, S., Chakraborti, A., List, E., Mendel, F., Sim, S. M. & Wang, G., 2017, Applied Cryptography and Network Security. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Kanazawa, Japan: Springer International Publishing, Vol. 10355. p. 208-228 21 p. (Lecture Notes in Computer Science; vol. 10355, no. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

    Abdalla, M., Benhamouda, F., Passelègue, A. & Paterson, K. G., 2014, Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I. Garay, J. & Gennaro, R. (eds.). Springer, Vol. 8616. p. 77-94 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Relations are more than Bytes: Re-thinking the Benefits of Smart Services with People and Things

    Heath, C. P., Crivellaro, C. & Coles-Kemp, L., 2 May 2019, CHI Conference on Human Factors in Computing Systems Proceedings: CHI 2019. ACM, p. 1-12 12 p. 308

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Unpublished

    Relationship between illiquidity and monetary conditions within the United Kingdom

    Said, H. & Giouvris, E., 2016, (Unpublished) Corporate Finance Decisions in a Changing Global Environment, International Finance and Banking Society (IFABS) Asia 2016 Brunei Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Relationship-based Access Control for an Open-source Medical Records System

    Rizvi, S. Z. R., Fong, P. W. L., Crampton, J. & Sellwood, J., 1 Jun 2015, Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT. ACM, Vol. 2015-June. p. 113-124 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Reliable Classification of Acute Leukaemia from Gene Expression Data using Confidence Machines

    Bellotti, T., Luo, Z. & Gammerman, A., 2006, IEEE International Conference on Granular Computing. IEEE, p. 148-153

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Reliable complex event detection for pervasive computing

    O'Keeffe, D. & Bacon, J., 2010, Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, DEBS 2010, Cambridge, United Kingdom, July 12-15, 2010. p. 73-84 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Reliable probabilistic classification and its application to Internet traffic

    Dashevskiy, M. & Luo, Z., 2008, Lecture Notes in Computer Science. Vol. 5226. p. 380-388

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Reliable Probability Estimates Based on Support Vector Machines for Large Multiclass Datasets

    Lambrou, A., Papadopoulos, H., Nouretdinov, I. & Gammerman, A., Sep 2012, Artificial Intelligence Applications and Innovations - AIAI 2012 International Workshops: AIAB, AIeIA, CISE, COPA, IIVC, ISQL, MHDW, and WADTMB, Proceedings.. Halkidiki, Greece, Vol. II. p. 182-191 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Relieved at last: cataloguing with LibraryThing

    Kanyundo, A. & Kapondera, S. K., 2016, Standing Conference of the Eastern, Central and Southern Africa Librarians and Institutions . p. 73-79 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Remote Attestation Mechanism based on Physical Unclonable Functions

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, The 2013 Workshop on RFID and IoT Security (RFIDsec'13 Asia). J. Zhou, C. M. & Weng, J. (eds.). Guangzhou, China: IOS Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Remote Attestation Mechanism for User Centric Smart Cards using Pseudorandom Number Generators

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Nov 2013, 5th International Conference on Information and Communications Security (ICICS 2013). Qing, S. & Zhou, J. (eds.). Beijing, China: Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. E-pub ahead of print

    Remote Credential Management with Mutual Attestation for Trusted Execution Environments

    Shepherd, C., Akram, R. N. & Markantonakis, K., 12 May 2019, (E-pub ahead of print) 12th IFIP International Conference on Information Security Theory and Practice (WISTP '18). Springer, p. 157-173 17 p. (Lecture Notes in Computer Science; vol. 11469).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Remote user authentication using public information

    Mitchell, C. J., 2003, Cryptography and Coding, 9th IMA International Conference on Cryptography and Coding, Cirencester, UK, December 2003, Proceedings. Paterson, K. (ed.). Springer-Verlag, p. 360-369 10 p. (Lecture Notes in Computer Science; vol. 2898).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Removing connected obstacles in the plane is FPT

    Eiben, E. & Lokshtanov, D., 8 Jun 2020, 36th International Symposium on Computational Geometry, SoCG 2020. Cabello, S. & Chen, D. Z. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, p. 1-14 14 p. LIPIcs-SoCG-2020-39. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 164).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Renewing cryptographic timestamps

    Al-Riyami, S. S. & Mitchell, C. J., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, p. 9-16 8 p. (IFIP Conference Proceedings; vol. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Forthcoming

    Rent generation mechanism of first-order and second-order capabilities: integrating resource based view and dynamic capabilities view framework

    Qaiyum, S. & Wang, C. L., 22 Oct 2015, (Accepted/In press) The 38th Annual Institute for Small Business and Entrepreneurship Conference, Glasgow, 11-12 November. .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Replay Attack in TCG Specification and Solution

    Bruschi, D., Cavallaro, L., Lanzi, A. A. & Monga, M., 2005, 21th Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, Arizona, USA. IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Replaying Programs Allowing Interrupts on a Multiprocessor

    Audenaert, K. & Levrouw, L. J., 1993, Int'l Workshop on Systems Engineering for Real Time Applications, SERTA '93. Cirencester: IEE Press, p. 107-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Representative sets and irrelevant vertices: New tools for kernelization

    Kratsch, S. & Wahlström, M., 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science (FOCS). IEEE, p. 450-459 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Reprint of Algorithmic information and simplicity in statistical physics (1997)

    Schack, R., 2002, Maxwell's Demon 2: Entropy, Classical and Quantum Information, Computing. Leff, H. S. & Rex, A. F. (eds.). London: Institute of Physics Publishing, p. 246

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Unpublished

    Reprogramming landscapes of play: navigation and narrative in Geocaching

    Lowe, J., 31 Aug 2018, (Unpublished) Landscapes of Digital Games session at RGS-IBG 2018.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Reputation methods for routing security for mobile ad hoc networks

    Yau, P-W. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 130-137 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Reputation Schemes for Pervasive Social Networks with Anonymity

    Garms, L., Martin, K. & Ng, S-L., 1 Oct 2017, Proceedings of the fifteenth International Conference on Privacy, Security and Trust (PST 2017). IEEE, p. 1-6 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Research Populations in International Context

    Aboutalebi, R. & Tan, H., 27 Nov 2013, In: EAMSA (Euro-Asia Management Studies Association), 30th Annual Conference of EAMSA: Innovation in Asia and Europe Approaches and Answers to new Challenges. Institute of East Asian Studies (IN-EAST); 27-30 November 2013, University of Duisburg-Essen, Duisburg, Germany.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Researching the practical ethics of discretion

    Evans, A., 27 Aug 2015, 2015 EGPA Annual Conference: Permanent Study Group XIII: Public Policy.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Residual Nominal Automata

    Moerman, J. & Sammartino, M., 26 Aug 2020, LIPCs. Germany: Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 2017. p. 44:1-44:21 21 p. 44

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Resilience Analysis of Software-Defined Networks Using Queueing Networks

    Nweke, L. O. & Wolthusen, S. D., 30 Mar 2020, 2020 International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium. IEEE, p. 1-7 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Resolution with Counting: Dag-Like Lower Bounds and Different Moduli

    Part, F. & Tzameret, I., 13 Jan 2020, 11th Innovations in Theoretical Computer Science Conference (ITCS) 2020, January, 2020, Seattle, WA, USA. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, p. 1-37 37 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Resolving performance conflicts in new wind turbine blade designs

    Peesapati, V., Cotton, I., Rashid, L. S., Brown, A., Jamshidi, P. & Hogg, P. J., 1 Dec 2009, European Wind Energy Conference and Exhibition 2009, EWEC 2009. Vol. 1. p. 260-287 28 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Resource-constrained signal propagation modeling for tactical mobile ad hoc networks

    Reidt, S., Ebinger, P., Wolthusen, S. D. & Kuijper, A., 22 Jun 2011, Proceedings of the 2011 IEEE First International Workshop on Network Science (NSW 2011). IEEE Computer Society Press, p. 67-74

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Response of Acropora to warm climates; lessons from the geological past

    White, C., Bosence, D. & Wallace, C. C., Jul 2008, Proceedings of the 11th International Coral Reef Symposium, Ft. Lauderdale, Florida, 7-11 July 2008 Session number 1 . Riegl, B. & Dodge, R. E. (eds.). Davie, Florida: Nova Southeastern University National Coral Reef Institute, p. 7-12 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Response of Chrysomelidae to Quaternary environmental changes.

    Elias, S. & Kuzmina, S., 2008, Research on Chrysomelidae. Jolivet, P., Santiago-Blay, J. & Schmitt, M. (eds.). Brill, Vol. 1. p. 167-186

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    RESPONSE OF THE HOMOGENEOUSLY PRECESSING DOMAIN TO LONGITUDINAL PUMPING

    BUNKOV, Y. M., DMITRIEV, V. V., FEHER, A., GAZO, E., KUPKA, M., NYEKI, J. & SKYBA, P., 1992, PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MACROSCOPIC QUANTUM PHENOMENA. Benacka, S. & Kedro, M. (eds.). BRATISLAVA: SLOVAK ACAD SCIENCES INST ELECTRICAL ENGINEERING, p. 49-53 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Responsibility in paradise? CSR tools of companies domiciled in tax havens

    Preuss, L., Sep 2009, 8th annual colloquium of the Academy of Business in Society (ABIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Results From the Laserwire Emittance Scanner and Profile Monitor at CERN's Linac4

    Hofmann, T., Boorman, G., Bosco, A., Gibson, S., Raich, U. & Roncarolo, F., May 2017, 28th Linear Accelerator Conference: 25-30 September 2016, East Lansing, MI, USA.. JACoW Publishing, p. 715-719 5 p. TH2A02

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Rethinking Musical Space

    Johnson, J., 2015, Lithuanian Musicology. Vol. 16. p. 8-15 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Re-thinking the Management of Technological Innovations, Product Complexity and Modularity: The Effects of Low-Probability, High-Impact Events on Automotive Supply Chains

    Coronado Mondragon, A. E. & Coronado Mondragon, C. E., 16 Jul 2012, Driving the Economy through Innovation and Entrepeneurship: Emerging Agenda for Technology Management. Balachandra, P. (ed.). 1 ed. Bangalore: Springer, Vol. 1. p. 567-577 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Rethinking the Smart Card Technology, Invited Paper

    Akram, R. N. & Markantonakis, K., 1 Jun 2014, 16th International Conference on Human-Computer Interaction. Tryfonas, T. & Askoxylakis, I. (eds.). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Retrofitting Mutual Authentication to GSM Using RAND Hijacking

    Khan, M. & Mitchell, C. J., 17 Sep 2016, Security and Trust Management: 12th International Workshop, STM 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Barthe, G., Markatos, E. & Samarati, P. (eds.). Springer-Verlag, p. 17-31 15 p. (Lecture Notes in Computer Science; vol. 9871).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Reverse Conformal Approach for On-line Experimental Design

    Nouretdinov, I., Jun 2017, 6th Symposium on Conformal and Probabilistic Prediction with Applications (COPA 2017). Vol. 60. p. 185-192 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    Reverse engineering concurrent programs using formal modelling and analysis

    Younger, E., Luo, Z., Bennett, K. & Bull, T., 1996, Proc of IEEE Inter. Conf. on Software Maintenance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    Review of work experience in a Bachelor of Information Technology

    Pauling, J. W. & Komisarczuk, P., 2007, Proceedings of the ninth Australasian conference on Computing education-Volume 66. p. 125-132 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    Revisiting and Extending the AONT-RS Scheme: A Robust Computationally Secure Secret Sharing Scheme

    Chen, LI., Laing, T. & Martin, K., 2017, Progress in Cryptology - AFRICACRYPT 2017: 9th International Conference on Cryptology in Africa, Dakar, Senegal, May 24-26, 2017, Proceedings. Springer, p. 40-57 18 p. (Lecture Notes in Computer Science; vol. 10239).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Revisiting the Changing nature of Professional Identity in the Digital Era; the case of curators

    Godfrey, K., Foley, S. & Panteli, N., 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: identity. University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Revisiting the Expected Cost of Solving uSVP and Applications to LWE

    Albrecht, M., Göpfert, F., Virdia, F. & Wunderer, T., 2017, Advances in Cryptology - ASIACRYPT 2017. p. 297-322 26 p. (Lecture Notes in Computer Science; vol. 10624).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Revisiting the Institutional Approach to Herbrand's Theorem

    Tutu, I. & Fiadeiro, J. L., 21 Oct 2015, Revisiting the Institutional Approach to Herbrand's Theorem. p. 304-319 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Revisiting the role of ICT in development

    Harindranath, G. & Sein, M. K., 2007, Proceedings of the IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries. Sao Paulo: IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Reward Learning for Efficient Reinforcement Learning in Extractive Document Summarisation

    Gao, Y., Meyer, C. M., Mesgar, M. & Gurevych, I., Aug 2019, Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI-19). International Joint Conferences on Artificial Intelligence, p. 2350-2356 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Rhythmic Routes: Developing a nomadic physical practice for the daily commute

    Overend, D. & Bissell, L., 2014, Scottish Journal of Performance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Ridge Regression Confidence Machine

    Nouretdinov, I., Melluish, T. & Vovk, V., 2001, Proceedings of the Eighteenth International Conference on Machine Learning. p. 385-392

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Ridge Regression learning algorithm in dual variables

    Saunders, C., Gammerman, A. & Vovk, V., 1998, Proceedings of the Fifteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 515-521 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Unpublished

    Risk Disclosure Policies: A cross-sectional study of the Greek Banking Industry

    Anagnostopoulos, I., 2011, (Unpublished) GSTF (Global Science Forum), 23-24 May 2011, Singapore .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Risk Tolerance And Risk Management In Everyday Life Of SMEs

    Kouraklis, I. J., 2005, Proceedings of Small And Medium Enterprises In European Economies, International Conference, Babes-Bolyai University, Cluj-Napoca, Romania.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Robit: an extensible auction-based market platform for challenged environments

    Haile, Y., Reda, A., Noble, B., Duong, Q. & Alperovich, T., 30 Dec 2010, ICTD '10: Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development. Association for Computing Machinery (ACM), p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Robust Leader Election in a Fast-Changing World

    Augustine, J., Kulkarni, T., Nakhe, P. & Robinson, P., 2013, Proceedings Ninth International Workshop on Foundations of Mobile Computing, FOMC 2013, Jerusalem, Israel, October 17-18, 2013.. p. 38-49 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Robustness Against Unknown Noise for Raw Data Fusing Neural Networks

    Bijelic, M., Muench, C., Ritter, W., Kalnishkan, Y. & Dietmayer, K., Dec 2018, 21st IEEE International Conference on Intelligent Transportation Systems (IEEE ITSC 2018). IEEE Xplore, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    'Roellig in charge': a reassessment of the cantata repertoire in Zerbst between 1749 and 1765

    Springthorpe, N., 2017, Fasch-Studien 14: 'Fasch und die Konfessionen': Bericht über die Internationale Wissenschaftliche Konferenz vom 21. bis 22. April 2017 im Rahmen der 14. Internationalen Fasch-Festtage in Zerbst. Beeskow: Ortus Musikverlag, p. 225-252 27 p. (Fasch-Studien; vol. XIV).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    ROTOR: A Tool for Renaming Values in OCaml's Module System

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 28 May 2019, IWOR '19 Proceedings of the 3rd International Workshop on Refactoring. IEEE Press, p. 27-30 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. E-pub ahead of print

    Round-optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices

    Albrecht, M., Davidson, A., Deo, A. & Smart, N. P., 1 May 2021, (E-pub ahead of print) PKC 2021. Springer, p. 261-289 29 p. (Lecture Notes in Computer Science; vol. 12711).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Rule Value Reinforcement Learning for Cognitive Agents

    Child, C. & Stathis, K., 1 May 2006, Proc. of 5th International Conference on Autonomous Agents an d Multi-agent Systems (AAMAS06). p. 792-794 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Saadiyat and sovereign wealth in the United Arab Emirates: the making of a premier island destination

    Chong, D., 2016, The Art Marketing in Global Perspective (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    Safe Specification of Operator Precedence Rules

    Afroozeh, A., van den Brand, M., Johnstone, A., Scott, E. & Vinju, J., 2013, Software Language Engineering Lecture Notes in Computer Science . Vol. 8225. p. 137-156 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Saladin and Gift-Giving

    Phillips, J., 3 Jan 2020, The History of Syria, 1099-1250: Conflict and Co-existence. Hillenbrand, C. (ed.). Edinburgh University Press, p. 307-320

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Salem numbers and Pisot numbers from stars

    McKee, J., Smyth, C. J. & Rowlinson, P., 1999, Number Theory in Progress: Number ThProceedings of the International Conference on Number Theory in Honor of Andrzej Schinzel, held in Zakopane, Poland, June 30 – July 9, 1997. Part I: Diophantine Problems and Polynomials. de Gruyter, p. 309-319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Salience and Asset Prices

    Bordalo, P., Gennaioli, N. & Shleifer, A., May 2013, American Economic Review, Papers & Proceedings. Vol. 103(3). p. 623-628

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Saltando al barranco sin salir: Transformismo en un baile ritual del Norte de Potosí

    Stobart, H., 2019, Anales de la Reunión Anual de Etnología 33 (Museo Nacional de Etnografía y Folklore, La Paz, Bolivia): Expresiones: Cuerpos y objetos. La Paz, Bolivia: Museo Nacional de Etnografía y Folklore, La Paz, Bolivia, Vol. 33. p. 195-204 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    Saturation algorithms for model-checking pushdown systems

    Hague, M. & Carayol, A., May 2014, Proceedings of the 14th International Conference on Automata and Formal Languages . 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Saturation of Concurrent Collapsible Pushdown Systems

    Hague, M., 12 Dec 2013, FSTTCS: Foundations of Software Technology and Theoretical Computer Science. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    Scaffold of Asymmetric Organic Compounds-Magnetite Plaquettes

    Chan, QHS., Zolensky, ME. & Martinez, J., 2015, 46th Lunar and Planetary Science Conference, held March 16-20, 2015 in The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Scalable communication middleware for permissioned distributed ledgers

    Barger, A., Manevich, Y., Mandler, B., Bortnikov, V., Laventman, G. & Chockler, G., 22 May 2017, SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage Conference. New York: ACM, p. 1 1 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Scalable Group Membership Services for Novel Applications

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1998, Proceedings of the DIMACS Workshop on Networks in Distributed Computing. Merritt, M. & Shavit, N. (eds.). American Mathematical Society, p. 23-42 20 p. (DIMACS Series in Discrete Mathematics and Theoretical Computer Science; vol. 45).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Scalable RFID pseudonym protocol

    Song, B. & Mitchell, C. J., 2009, NSS 2009, Network & System Security, 19-21 October 2009, Gold Coast, Queensland, Australia. IEEE Computer Society Press, p. 216-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    Science as a vocation? Hybrid academics in overlapping institutional and career spaces

    Lam, A., Jun 2019, National Science Foundation (NSF) Workshop: 'Science as a Vocation: A Centennial Perspective', Boston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Scriptcloud.com: Content Clouds for Screenplays

    McKie, S., 2 Jan 2008, Semantic Media Adaptation and Personalization, Second International Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. E-pub ahead of print

    SDN-Actors: Modeling and Verification of SDN Programs

    Albert, E., Gómez-Zamalloa, M., Rubio, A., Sammartino, M. & Silva, A., 12 Jul 2018, (E-pub ahead of print) Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Springer-Verlag, p. 550-567 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  100. Published

    Searches for gravitational effects at the TeV scale with the ATLAS detector

    Berry, T., 18 Mar 2014, Proceedings of the European Physical Society Conference on High Energy Physics. Proceedings of Science, p. 1-6 6 p. PoS(EPS-HEP 2013)261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution