Home > Publications

Publications

36601 - 36650 out of 39,677Page size: 50
  1. Conference contribution › Research
  2. Published

    Revisiting the role of ICT in development

    Harindranath, G. & Sein, M. K., 2007, Proceedings of the IFIP TC 9/WG 9.4 International Conference on Social Implications of Computers in Developing Countries. Sao Paulo: IFIP WG9.4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Revocation in Publicly Verifiable Outsourced Computation

    Alderman, J., Janson, C., Cid, C. & Crampton, J., 2014, Proceedings of the 10th International Conference on Information Security and Cryptology - Inscrypt 2014. Springer, Vol. 8957. p. 51-71 (Lecture Notes in Computer Science - LNCS; vol. 8957)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Reward Learning for Efficient Reinforcement Learning in Extractive Document Summarisation

    Gao, Y., Meyer, C. M., Mesgar, M. & Gurevych, I., Aug 2019, Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence (IJCAI-19). International Joint Conferences on Artificial Intelligence, p. 2350-2356 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    RFID authentication protocol for low-cost tags

    Song, B. & Mitchell, C. J., 2008, Proceedings of the First ACM Conference on Wireless Network Security, WiSec 2008, Alexandria, VA, USA, March 31 - April 02, 2008. ACM Press, p. 140-147 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Rhythmic Routes: Developing a nomadic physical practice for the daily commute

    Overend, D. & Bissell, L., 2014, Scottish Journal of Performance.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Ridge Regression Confidence Machine

    Nouretdinov, I., Melluish, T. & Vovk, V., 2001, Proceedings of the Eighteenth International Conference on Machine Learning. p. 385-392

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Ridge Regression learning algorithm in dual variables

    Saunders, C., Gammerman, A. & Vovk, V., 1998, Proceedings of the Fifteenth International Conference on Machine Learning. San Francisco, CA: Morgan Kaufmann, p. 515-521 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Unpublished

    Risk Disclosure Policies: A cross-sectional study of the Greek Banking Industry

    Anagnostopoulos, I., 2011, (Unpublished) GSTF (Global Science Forum), 23-24 May 2011, Singapore .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Risk Tolerance And Risk Management In Everyday Life Of SMEs

    Kouraklis, I. J., 2005, Proceedings of Small And Medium Enterprises In European Economies, International Conference, Babes-Bolyai University, Cluj-Napoca, Romania.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Risk-Aware Role-Based Access Control

    Chen, L. & Crampton, J., 2011, Proceedings of the 7th International Workshop on Security and Trust Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures

    Bellare, M., Paterson, K. & Thomson, S., 2012, ASIACRYPT. Wang, X. & Sako, K. (eds.). Springer, Vol. 7658. p. 331-348 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Robit: an extensible auction-based market platform for challenged environments

    Haile, Y., Reda, A., Noble, B., Duong, Q. & Alperovich, T., 30 Dec 2010, ICTD '10: Proceedings of the 4th ACM/IEEE International Conference on Information and Communication Technologies and Development. Association for Computing Machinery (ACM), p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Robust and efficient communication overlays for trust authority computations

    Reidt, S., Balfe, S. & Wolthusen, S. D., 30 Mar 2009, Proceedings of the 2009 Sarnoff Symposium. IEEE Computer Society Press, 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Robust Coordination of Cloud-Internal Denial of Service Attacks

    Alarifi, S. & Wolthusen, S. D., 2013, Proceedings of the 2013 Third International Conference on Cloud and Green Computing (CGC). IEEE Computer Society Press, p. 135-142

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Robust Encryption, Revisited

    Farshim, P., Libert, B., Paterson, K. G. & Quaglia, E. A., 2013, PKC 2013. Kurosawa, K. & Hanaoka, G. (eds.). Springer, Vol. 7778. p. 352-368 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Robust Leader Election in a Fast-Changing World

    Augustine, J., Kulkarni, T., Nakhe, P. & Robinson, P., 2013, Proceedings Ninth International Workshop on Foundations of Mobile Computing, FOMC 2013, Jerusalem, Israel, October 17-18, 2013.. p. 38-49 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Robustness Against Unknown Noise for Raw Data Fusing Neural Networks

    Bijelic, M., Muench, C., Ritter, W., Kalnishkan, Y. & Dietmayer, K., Dec 2018, 21st IEEE International Conference on Intelligent Transportation Systems (IEEE ITSC 2018). IEEE Xplore, p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    'Roellig in charge': a reassessment of the cantata repertoire in Zerbst between 1749 and 1765

    Springthorpe, N., 2017, Fasch-Studien 14: 'Fasch und die Konfessionen': Bericht über die Internationale Wissenschaftliche Konferenz vom 21. bis 22. April 2017 im Rahmen der 14. Internationalen Fasch-Festtage in Zerbst. Beeskow: Ortus Musikverlag, p. 225-252 27 p. (Fasch-Studien; vol. XIV).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Role signatures for access control in open distributed systems

    Crampton, J. & Lim, H. W., 2008, Proceedings of IFIP TC-11 23rd International Information Security Conference. Springer, p. 205-220 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    ROTOR: A Tool for Renaming Values in OCaml's Module System

    Rowe, R., Férée, H., Thompson, S. & Owens, S., 28 May 2019, IWOR '19 Proceedings of the 3rd International Workshop on Refactoring. IEEE Press, p. 27-30 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Rule Value Reinforcement Learning for Cognitive Agents

    Child, C. & Stathis, K., 1 May 2006, Proc. of 5th International Conference on Autonomous Agents an d Multi-agent Systems (AAMAS06). p. 792-794 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Saadiyat and sovereign wealth in the United Arab Emirates: the making of a premier island destination

    Chong, D., 2016, The Art Marketing in Global Perspective (Amsterdam: University of Amsterdam).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Safe Specification of Operator Precedence Rules

    Afroozeh, A., van den Brand, M., Johnstone, A., Scott, E. & Vinju, J., 2013, Software Language Engineering Lecture Notes in Computer Science . Vol. 8225. p. 137-156 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation

    Galbraith, S., Massimo, J. & Paterson, K., 6 Apr 2019, 22nd IACR Conference on Practice and Theory in Public Key Cryptography 2019. Springer, p. 379-407 29 p. (Lecture Notes in Computer Science; vol. 11443).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Saladin and Gift-Giving

    Phillips, J., 3 Jan 2020, The History of Syria, 1099-1250: Conflict and Co-existence. Hillenbrand, C. (ed.). Edinburgh University Press, p. 307-320

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Salem numbers and Pisot numbers from stars

    McKee, J., Smyth, C. J. & Rowlinson, P., 1999, Number Theory in Progress: Number ThProceedings of the International Conference on Number Theory in Honor of Andrzej Schinzel, held in Zakopane, Poland, June 30 – July 9, 1997. Part I: Diophantine Problems and Polynomials. de Gruyter, p. 309-319

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Salience and Asset Prices

    Bordalo, P., Gennaioli, N. & Shleifer, A., May 2013, American Economic Review, Papers & Proceedings. Vol. 103(3). p. 623-628

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Sampling From Arbitrary Centered Discrete Gaussians For Lattice-Based Cryptography

    Aguilar-Melchor, C., Albrecht, M. & Ricosset, T., 2017, Applied Cryptography and Network Security: ACNS 2017. Springer, Vol. 10355. p. 3-19 17 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Sandnet: Network Traffic Analysis of Malicious Software

    Rossow, C., Dietrich, C. J., Bos, H., Cavallaro, L., Steen, M. V., Freiling, F. C. & Pohlmann, N., 1 Apr 2011, 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Satellite connections for multimedia communications

    Sun, Z., Hadjitheodosiou, MH., Komisarczuk, P. & Coakley, FP., 1994, Multimedia Communication Systems, IEE Colloquium on. 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Saturation algorithms for model-checking pushdown systems

    Hague, M. & Carayol, A., May 2014, Proceedings of the 14th International Conference on Automata and Formal Languages . 24 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Saturation of Concurrent Collapsible Pushdown Systems

    Hague, M., 12 Dec 2013, FSTTCS: Foundations of Software Technology and Theoretical Computer Science. 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Scalable communication middleware for permissioned distributed ledgers

    Barger, A., Manevich, Y., Mandler, B., Bortnikov, V., Laventman, G. & Chockler, G., 22 May 2017, SYSTOR '17: Proceedings of the 10th ACM International Systems and Storage Conference. New York: ACM, p. 1 1 p. 23

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Scalable Group Membership Services for Novel Applications

    Anker, T., Chockler, G., Dolev, D. & Keidar, I., 1998, Proceedings of the DIMACS Workshop on Networks in Distributed Computing. Merritt, M. & Shavit, N. (eds.). American Mathematical Society, p. 23-42 20 p. (DIMACS Series in Discrete Mathematics and Theoretical Computer Science; vol. 45).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Scalable RFID pseudonym protocol

    Song, B. & Mitchell, C. J., 2009, NSS 2009, Network & System Security, 19-21 October 2009, Gold Coast, Queensland, Australia. IEEE Computer Society Press, p. 216-224

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Science as a vocation? Hybrid academics in overlapping institutional and career spaces

    Lam, A., Jun 2019, National Science Foundation (NSF) Workshop: 'Science as a Vocation: A Centennial Perspective', Boston.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    SCONE: Secure Linux Containers with Intel SGX

    Arnautov, S., Trach, B., Gregor, F., Knauth, T., Martin, A., Priebe, C., Lind, J., Muthukumaran, D., O'Keeffe, D., Stillwell, M., Goltzsche, D., Eyers, D. M., Kapitza, R., Pietzuch, P. R. & Fetzer, C., Nov 2016, Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI ’16). USENIX, p. 689-703 15 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Scriptcloud.com: Content Clouds for Screenplays

    McKie, S., 2 Jan 2008, Semantic Media Adaptation and Personalization, Second International Workshop .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. E-pub ahead of print

    SDN-Actors: Modeling and Verification of SDN Programs

    Albert, E., Gómez-Zamalloa, M., Rubio, A., Sammartino, M. & Silva, A., 12 Jul 2018, Formal Methods - 22nd International Symposium, FM 2018, Held as Part of the Federated Logic Conference, FloC 2018, Proceedings. Havelund, K., Peleska, J., Roscoe, B. & de Vink, E. (eds.). Springer-Verlag, p. 550-567 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10951 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Searches for gravitational effects at the TeV scale with the ATLAS detector

    Berry, T., 18 Mar 2014, Proceedings of the European Physical Society Conference on High Energy Physics. Proceedings of Science, p. 1-6 6 p. PoS(EPS-HEP 2013)261

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Secret sharing with reusable polynomials

    Chen, LI., Gollmann, D., Mitchell, C. J. & Wild, P., 1997, Information Security and Privacy - Proceedings 2nd Australasian Conference, ACISP '97, Sydney, Australia, July 1997. Varadharajan, V., Pieprzyk, J. & Mu, Y. (eds.). Springer-Verlag, p. 183-193 11 p. (Lecture Notes in Computer Science; no. 1270).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. E-pub ahead of print

    Secure and Trusted Application Execution on Embedded Devices

    Markantonakis, K., Akram, R. & Msgna, M., 15 Jan 2016, 8th International Conference on Security for Information Technology and Communications – SECITC’15 . Naccache, D. & Simion, E. (eds.). Springer, Vol. 9522. p. 3-24 22 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Secure and Trusted Execution: Past, Present, and Future - A Critical Review in the Context of the Internet of Things and Cyber-Physical Systems

    Shepherd, C., Arfaoui, G., Gurulian, I., Lee, R., Markantonakis, K., Akram, R., Sauveron, D. & Conchon, E., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). . Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 168-177 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. E-pub ahead of print

    Secure Autonomous UAVs Fleets by Using New Specific Embedded Secure Elements

    Akram, R., Bonnefoi, P-F., Chaumette, S., Markantonakis, K. & Sauveron, D., 9 Feb 2017, 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Xiang, Y., Ren, K. & Feng, D. (eds.). IEEE Computer Society, p. 606-614 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Secure Deployment of Applications to Fielded Devices and Smart Cards

    Sirett, W. G., Macdonald, J. A., Mayes, K. & Markantonakis, K., 2006, Security in Information Systems. p. 195-206 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Secure implementations for typed session abstractions

    Corin, R., Denielou, P-M., Fournet, C., Bhargavan, K. & Leifer, J., 2007, 20th IEEE Computer Security Foundations Symposium (CSFS20), Proceedings. LOS ALAMITOS: IEEE COMPUTER SOC, p. 170-186 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Secure Improved Cloud-Based RFID Authentication Protocol

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 10 Sep 2014, The 9th DPM International Workshop on Data Privacy Management (DPM 2014). Springer

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Secure Log File Download Mechanisms for Smart Cards

    Markantonakis, K., 2000, Proceedings of the The International Conference on Smart Card Research and Applications. London, UK: Springer-Verlag, p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Secure Log File Download Mechanisms for Smart Cards.

    Markantonakis, K., 1998, CARDIS'98. p. 285-304 20 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Secure Mobile Payment on NFC-Enabled Mobile Phones Formally Analysed Using CasperFDR

    Abu Ghazalah, S., Markantonakis, K. & Mayes, K., 26 Sep 2014, The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). IEEE Computer Society

    Research output: Chapter in Book/Report/Conference proceedingConference contribution