Home > Publications

Publications

39201 - 39300 out of 42,944Page size: 100
  1. Conference contribution › Research
  2. Published

    On permissions, inheritance and role hierarchies

    Crampton, J., 2003, Proceedings of the 10th ACM Conference on Computer and Communications Security. ACM Press, p. 85-92 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    On Problems as Hard as CNF-SAT

    Cygan, M., Dell, H., Lokshtanov, D., Marx, D., Nederlof, J., Okamoto, Y., Paturi, R., Saurabh, S. & Wahlström, M., 2012, IEEE Conference on Computational Complexity. p. 74-84 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    On quantum statistics in data analysis

    Pavlovic, D., 2008, Quantum Interaction 2008. Bruza, P. (ed.). AAAI Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    On quasipolynomial multicut-mimicking networks and kernelization of multiway cut problems

    Wahlström, M., 29 Jun 2020, ICALP 2020. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 168. p. 1-14 14 p. 101

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    On Redefinitions of 'Rescue opera'

    Charlton, D., 1992, Music and the French Revolution. Boyd, M. (ed.). 1992: Cambridge University Press, p. 169-88 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    On r-Simple k-Path and Related Problems Parameterized by k/r

    Gutin, G., Wahlstrom, M. & Zehavi, M., Jan 2019, Proceedings of the 2019 Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, p. 1750-1769 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On security vulnerabilities and mitigation in the cognition cycle of Distributed Cognitive Radio Networks

    Yau, K-L. A., Komisarczuk, P., Poh, G-S. & Martin, K., 2011, Proceedings of the 6th International Conference on Broadband Communications & Biomedical Applications. IEEE, p. 132-137

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On Singleton Arc Consistency for CSPs Defined by Monotone Patterns

    Carbonnel, C., Cohen, D. A., Cooper, M. C. & Živný, S., 20 Feb 2018, 35th Symposium on Theoretical Aspects of Computer Science, STACS 2018. Niedermeier, R. & Vallée, B. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, Vol. 96. p. 19:1-19:15 15 p. 19

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    On solutions to the key escrow problem

    Hoyle, M. P. & Mitchell, C. J., 1998, State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography, Leuven, Belgium, June 1997. Preneel, B. & Rijmen, V. (eds.). Springer-Verlag, p. 277-306 30 p. (Lecture Notes in Computer Science; no. 1528).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    On spatio-temporal constraints and inheritance in role-based access control

    Chen, L. & Crampton, J., 2008, Proceedings of ACM Symposium on Information, Computer and Communications Security. ACM Press, p. 205-216 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    On Subtyping in Type Theories with Canonical Objects

    Lungu, G. & Luo, Z., Nov 2018, Types for Proofs and Programs: Post-proceedings of the 22nd Int. Conf. on Types for Proofs and Programs (TYPES 2016). Leibniz International Proceedings in Informatics, Vol. 97. p. 13:1-13:31 31 p. 13

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    On Symmetric Encryption with Distinguishable Decryption Failures

    Boldyreva, A., Degabriele, J. P., Paterson, K. & Stam, M., 2014, FSE 2013. Moriai, S. (ed.). Springer, Vol. 8424. p. 1–24 24 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    On the (in)security of IPsec in MAC-then-encrypt configurations

    Degabriele, J. P. & Paterson, K. G., 2010, CCS '10 Proceedings of the 17th ACM conference on Computer and communications security. New York: ACM, p. 493-504

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    On the Absence of Predictive Complexity for Some Games

    Kalnishkan, Y. & Vyugin, M. V., 2002, Algorithmic Learning Theory 13th International Conference, ALT 2002, Proceedings: volume 2533 of Lecture Notes in Artificial Intelligence. Springer, (Lecture Notes in Artificial Intelligence; vol. 2533).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On the complexity of universal leader election

    Kutten, S., Pandurangan, G., Peleg, D., Robinson, P. & Trehan, A., 2013, ACM Symposium on Principles of Distributed Computing, PODC '13, Montreal, QC, Canada, July 22-24, 2013. p. 100-109 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    On the Effectiveness of Ambient Sensing for Detecting NFC Relay Attacks

    Gurulian, I., Shepherd, C., Markantonakis, K., Frank, E., Akram, R. & Mayes, K., 2017, Trustcom/BigDataSE/ICESS, 2017 IEEE. p. 41-49 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    On the Emergence of Properties in Component-Based Systems

    Fiadeiro, J. L., 1996, AMAST. Springer, Vol. 1101. p. 421-443 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    On the Feasibility and Impact of Standardising Sparse-secret LWE Parameter Sets for Homomorphic Encryption

    Curtis, B. & Player, R., 11 Nov 2019, 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. Springer, p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    On the Feasibility of Carrying Out Live Real-Time Forensics for Modern Intelligent Vehicles

    Al-Kuwari, S. & Wolthusen, S. D., 2011, Forensics in Telecommunications, Information, and Multimedia: Proceedings of the Third International ICST Conference (e-Forensics 2010). Springer-Verlag, p. 207-223

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    On the filtering of photoplethysmography signals

    Awodeyi, A. E., Alty, S. R. & Ghavami, M., 5 Feb 2014, Proceedings - IEEE 14th International Conference on Bioinformatics and Bioengineering, BIBE 2014. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 7033577

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    On the hardness of LWE with binary error: Revisiting the hybrid lattice-reduction and meet-in-the-middle attack

    Buchmann, J., Göpfert, F., Player, R. & Wunderer, T., 7 Apr 2016, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer-Verlag, Vol. 9646. p. 24-43 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9646).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    On the interplay between strategic performance measurement and managerial accounting change for sustainable development

    Subramaniam, N., 2015, European Network for Research in Organisational & Accounting Change (ENROAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    On the Joint Security of Encryption and Signature in EMV

    Degabriele, J. P., Lehmann, A., Paterson, K. G., Smart, N. P. & Strefler, M., 2012, CT-RSA. Dunkelmann, O. (ed.). Springer, Vol. 7178. p. 116-135 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    On the Joint Security of Encryption and Signature, Revisited

    Paterson, K., Thomson, S., Schuldt, J. & Stam, M., 2011, ASIACRYPT. Lee, D. H. & Wang, X. (eds.). Springer, Vol. 7073. p. 161-178 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Unpublished

    On the pricing of commonality across various liquidity proxies in the London Stock Exchange

    Lim, S. & Giouvris, E., 2015, (Unpublished) On the pricing of commonality across various liquidity proxies in the London Stock Exchange.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, (E-pub ahead of print) Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    On the Smallest Ratio Problem of Lattice Bases

    Li, J., Jul 2021, ISSAC 2021. ACM, p. 289-296 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    On the undecidability of asynchronous session subtyping

    Lange, J. & Yoshida, N., 16 Mar 2017, Foundations of Software Science and Computation Structures - 20th International Conference, FOSSACS 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Esparza, J. & Murawski, A. S. (eds.). Springer Verlag, p. 441-457 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10203 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    On the use of variable user goals to measure perceived usefulness

    Matook, S. & van der Heijden, H., 2007, Proceedings of the European Conference on Information Systems (ECIS). St Gallen, Switzerland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    On the Way to 'Euphonia': Berlioz's Promotion of Earlier Music

    Charlton, D., 2015, Von Gluck zu Berlioz.: Die französische Oper zwischen Antikenrezeption und Monumentalität.. Betzwieser, T. & Mauksch, S. (eds.). Würzburg: Konigshausen & Neumann, p. 139-58 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake

    Qu, Y., Wu, P. F. & Wang, X., 6 Apr 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    On-line confidence machines are well-calibrated

    Vovk, V., 2002, Proceedings of the Forty Third Annual Symposium on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, p. 187-196 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Online conformal prediction for classifying different types of herbal medicines with electronic nose

    Zhan, X., Guan, X., Wu, R., Wang, Z., Wang, Y., Luo, Z. & Li, G., 4 Nov 2018, IET Doctoral Forum on Biomedical Engineering, Healthcare, Robotics and Artificial Intelligence 2018: BRAIN 2018. IET Conference Publications, Vol. 2018. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Online distance learning as a public policy tool for development

    Kromidha, E., 2013, Proceedings of the European Consortium for Political Research 2013 General Conference, 8-9 September 2013. Bordeaux, France

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Online Instructors: How does the presence on e-learning platforms matter?

    Wallace, A. & Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: E-business. The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    On-line network resource consumption prediction with confidence

    Luo, Z., 2007, Second International Conference on Communications and Networking in China, 2007. CHINACOM '07. . p. 104-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Online Prediction of Ovarian Cancer

    Zhdanov, F., Vovk, V., Burford, B., Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, Proceedings of the 12th Conference on Artificial Intelligence in Medicine. p. 375-379 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    On-line Prediction with Kernels and the Complexity Approximation Principle

    Gammerman, A., Kalnishkan, Y. & Vovk, V., 2004, Uncertainty in Artificial Intelligence, Proceedings of the Twentieth Conference. Chickering, M. & Halpern, J. (eds.). AUAI Press, p. 170-176

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  52. Published

    On-Line Probability, Complexity and Randomness

    Chernov, A., Shen, A., Vereshchagin, N. & Vovk, V., 2008, Proceedings of the Nineteenth International Conference on Algorithmic Learning Theory. Freund, Y., Gyorfi, L., Turan, G. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 5254. p. 138-153 16 p. (Lecture Notes in Artificial Intelligence; vol. 5254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  53. Published

    On-line Regression Competitive with Changing Predictors

    Busuttil, S. & Kalnishkan, Y., 2007, Algorithmic Learning Theory, 18th International Conference, ALT 2007, Proceedings: 4754 of Lecture Notes in Computer Science. Springer, p. 181-195 (Lecture Notes in Computer Science,; vol. 4754).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  54. Published

    On-line regression competitive with reproducing kernel Hilbert spaces

    Vovk, V., 2006, Theory and Applications of Models of Computation. Proceedings of the Third Annual Conference on Computation and Logic. Cai, J-Y., Cooper, S. & Li, A. (eds.). Berlin: Springer, Vol. 3959. p. 452-463 12 p. (Lecture Notes in Computer Science; vol. 3959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  55. Published

    Online Total Ionisation Dosimeter (TID) monitoring using semiconductor based radiation sensors in the isis proton synchrotron

    Harryman, D., Sep 2016, International Beam Instrumentation Conference 2016. p. 379-382 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  56. Published

    Open Game Tournaments in STARLITE

    Hopkins, J., Kafali, O. & Stathis, K., 4 May 2015, Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). IFAAMAS, p. 1927-1928 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  57. Published

    Open Innovation and The Erosion of the Traditional Information Systems Project’s Boundaries

    Elbanna, A., 2008, IFIP WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  58. Published

    Opening the black boxes of TAM: Towards a mixed methods approach

    Wu, P. F., 1 Dec 2009, ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  59. Published

    Opéra Comique: Identity and Manipulation

    Charlton, D., 2001, Reading Critics Reading: Opera and Ballet Criticism in France from the Revolution to 1848. Parker, R. & Smart, M. A. (eds.). Oxford: Oxford University Press, p. 13-45 32 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  60. Published

    Opéra-comique and the computer

    Charlton, D., 1992, Grétry et l'Europe de l'Opéra-Comique. Vendrix, P. (ed.). Liège: Mardaga, p. 367-78 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  61. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  62. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  63. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  64. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  65. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  66. Published

    Optimal regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2011, FOMC'11, The Seventh ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing (part of FCRC 2011), San Jose, CA, USA, June 9, 2011, Proceedings. p. 52-61 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  67. Published

    Optimal Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 20 Aug 2018, International Symposium on Mathematical Foundations of Computer Science. p. 1-14 14 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  68. Published

    Optimisation and validation of a minimum data set for the identification and quality control of EST expression libraries

    Milnthorpe, A. T. & Soloviev, M., 2013, BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms. p. 278-281 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  69. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  70. Published

    Or gate Bayesian networks for text classification: A discriminative alternative approach to multinomial naive Bayes

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2008, Actas del XIV Congreso Español sobre Tecnologías y Lógica Fuzzy. p. 385-390 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  71. Published

    ORC: an Ontology Reasoning Component for Diabetes

    Kafali, O., Sindlar, M., Weide, T. V. D. & Stathis, K., 2013, 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed'13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  72. Published

    Organic components in interplanetary dust particles and their implications for the synthesis of cometary organics

    Chan, Q. H. S., Franchi, I. A. & Wright, I. P., Jul 2017, 80th Annual Meeting of the Meteoritical Society 2017. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  73. Published

    Organisational cultural factors and strategic sensemaking in the opportunity exploration and exploitation processes

    Wang, C. L., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  74. Published

    Organisational Success: Fact or Fiction

    Aboutalebi, R., 8 Oct 2009, In: Graduate Conference on Social Sciences and Management, the 3rd Graduate Conference on Social Sciences and Management, 8-9 October 2009, University of Bradford, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  75. Published

    Organisational Success: Impacts of Ethic/Values, Organisation’s Social Responsibility, and Culture

    Aboutalebi, R., 5 Nov 2009, In: European Parliament, the 6th Conference on Ethics in Business, Corporate Culture & Spirituality. 5-6 November 2009, European Parliament, Brussels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  76. Published

    Organizational diversity and shared vision: resolving the paradox of opportunity exploration and exploitation

    Wang, C. L., 2007, Strategic Management Society Special Conference on Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  77. Published

    Organizational misfits and positive identity construction: Practitioner-academics as agents of change

    Lam, A., Jul 2018, 34th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  78. Published

    Organizing Is Projects for Innovation: A Collective Mindfulness Perspective

    Elbanna, A. & Murray, D., 2009, The 15th Americas Conference on Information Systems . San Francisco

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  79. Published

    Organizing Large Scale Hacking Competitions

    Childers, N., Boe, B., Cavallaro, L., Cavedon, L., Cova, M., Egele, M. & Vigna, G., 1 Jul 2010, GI SIG SIDAR Conference on Detection of Intrusions and Malware Vulnerability Assessment (DIMVA).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  80. Published

    Organo-Carbonate Association in Carbonaceous Chondrites

    Chan, QHS., Zolensky, ME. & Fries, M., 2015, 78th Annual Meeting of the Meteoritical Society. Vol. 1856. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  81. Published

    OSI and X.400 security

    Mitchell, C. J., 1990, Proceedings of Network Management '90, London, March 1990. London: Blenheim Online Ltd, p. 157-167 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  82. Published

    OSI and X.400 security

    Mitchell, C. J. & Walker, M., 1989, Proceedings of COMPSEC 89, London, October 1989. Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 145-163 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  83. Published

    Overcoming channel bandwidth constraints in secure SIM applications

    Macdonald, J. A., Sirett, W. G. & Mitchell, C. J., 2005, Security and privacy in the age of ubiquitous computing: Proceedings of IFIP Working Groups 11.2/8.8 Small Systems Security/Smart Cards Working Conference at 20th IFIP International Information Security Conference (SEC 2005), Makuhari-Messe, Chiba, Japan, May 2005. Sasaki, R., Qing, S. & Okamoto, E. (eds.). Springer-Verlag, p. 539–-549

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  84. Published

    Overcoming the utility problem in heuristic generation: Why time matters

    Barley, M., Franco, S. & Riddle, P., 10 Dec 2014, Proceedings of the Twenty-Fourth International Conference on Automated Planning and Scheduling, ICAPS 2014: Portsmouth, New Hampshire, USA, June 21-26, 2014. Chien, S. A., Do, M. B., Fern, A. & Ruml, W. (eds.). AAAI Press, p. 38-46 9 p. (Proceedings International Conference on Automated Planning and Scheduling, ICAPS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  85. Published

    Overview of Fossil Beetles

    Elias, S., 2007, Encyclopedia of Quaternary Science. Elias, S. A. (ed.). Amsterdam: Elsevier Science Publishers B.V. (North-Holland), Vol. 1. p. 153-163

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  86. Published

    Overview of Laserwire Beam Profile and Emittance Measurements for High Power Proton Accelerators

    Gibson, S., Boorman, G., Bosco, A., Gabor, C., Letchford, A., Pozimski, J., Savage, P. & Hofmann, T., 19 Sep 2013, 2nd International Beam Instrumentation Conference: 16-19 September 2013, Oxford, UK. p. 531-534 4 p. TUPF15

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  87. Published

    Overview of Security Threats for Smart Cards in the Public Transport Industry

    Markantonakis, K., Mayes, K., Sauveron, D. & Askoxylakis, I. G., 2008, Proceedings of the 2008 IEEE International Conference on e-Business Engineering. Washington, DC, USA: IEEE Computer Society Press, p. 506-513 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  88. Published

    Oxygenation at the onset of the Neoproterozoic – evidence from North China

    Zhou, Y., Basu, A., Dickson, A., Zhu, M. & Shields, G. A., 2021, Goldschmidt 2021 .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  89. Published

    Packrat middens: archives of desert biotic history

    Elias, S., 1995, Encyclopedia of Environmental Biology. Nierenburg, W. A. (ed.). San Diego, California: Academic Press, Vol. 3. p. 19-35

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  90. Published

    PAIGE: Towards a hybrid-edge design for privacy-preserving intelligent personal assistants

    Liang, Y., O'Keeffe, D. & Sastry, N., 27 Apr 2020, EdgeSys 2020 - Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2020. Association for Computing Machinery, Inc, p. 55-60 6 p. (EdgeSys 2020 - Proceedings of the 3rd ACM International Workshop on Edge Systems, Analytics and Networking, Part of EuroSys 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  91. Published

    Pairings for elliptic curves over finite commutative rings

    McKee, J. & Galbraith, S. D., 2005, Cryptography and Coding, Cirencester. p. 392-409 (Lecture Notes in Computer Science; vol. 3796).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  92. Published

    PAL+: a lambda-free logical framework

    Luo, Z., 2000, Inter Workshop on Logical Frameworks and Meta-languages (LFM 2000).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  93. Published

    Palaeocurrent data representation in tectonically-driven basins: insight from Ager Basin (Miocene, Spain) and Catanzaro Strait (Pleistocene, Italy)

    Chiarella, D. & Gioia, D., 2013, Geophysical Research Abstracts. Vol. 15. p. 9937

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  94. Published

    Paleoclimatic studies: Insects and climate change

    Elias, S. A., 1996, SYMPOSIUM ON ENVIRONMENTAL APPLICATIONS. BOSTON: AMER METEOROLOGICAL SOC, p. 211-213 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  95. Published

    Paleoecology and Late Quaternary environments of the Colorado Rockies

    Elias, S., 2001, Structure and Function of an Alpine Ecosystem, Niwot Ridge, Colorado. Bowman, W. (ed.). London: Oxford University Press, p. 285-303

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  96. Published

    PANA/GSM authentication for Internet access

    Pagliusi, P. & Mitchell, C. J., 2003, Proceedings of SympoTIC '03, Joint IST Workshop on Mobile Future and Symposium on Trends in Communications, Bratislava, Slovakia, October 2003. IEEE, p. 146-152

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  97. Published

    PANA/IKEv2: An Internet authentication protocol for heterogeneous access

    Pagliusi, P. & Mitchell, C. J., 2003, Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers. Springer-Verlag, Vol. 2908. p. 135-149 15 p. (Lecture Notes in Computer Science; vol. 2908).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  98. Published

    Pancake: Frequency Smoothing for Encrypted Data Stores

    Grubbs, P., Khandelwal, A., Lacharite, M-S., Brown, L., Li, L., Agarwal, R. & Ristenpart, T., Aug 2020, 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, p. 2451-2468 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  99. Published
  100. Published

    Paradoxes of Visibility in Activism: The Inter-play of Online Power Dynamics Between Activists and the State in the Egyptian Revolution

    Azer, E., Zheng, Y. & Harindranath, G., 29 Sep 2018, The 12th Mediterranean Conference on Information Systems. Corfu, Greece

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  101. Published

    Parameter Learning in Bayesian Belief Networks

    Luo, Z. & Gammerman, A., 1992, Proceeding of IPMU'92. p. 25-28

    Research output: Chapter in Book/Report/Conference proceedingConference contribution