Home > Publications

Publications

36751 - 36800 out of 40,232Page size: 50
  1. Conference contribution › Research
  2. Published

    On the Life Cycle of the Certification Authority key pairs in EMV'96

    Markantonakis, K. & Rantos, K., Apr 1999, On the Life Cycle of the Certification Authority key pairs in EMV'96. Society for Computer Simulation, p. 125-130

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    On the Limits of Information Flow Techniques for Malware Analysis and Containment

    Cavallaro, L., Saxena, P. & Sekar, R., 10 Jul 2008, Detection of Intrusions and Malware, and Vulnerability Assessment: 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008: Proceedings. Zamboni, D. (ed.). Springer, p. 143-163 (Lecture Notes in Computer Science; vol. 5137).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    On the Modeling and Verification of Security-Aware and Process-Aware Information Systems

    Crampton, J. & Huth, M., 2011, Proceedings of the 2011 BPM Workshop on Workflow Security Audit and Certification.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    On the parameterized complexity of the workflow satisfiability problem

    Crampton, J., Gutin, G. & Yeo, A., 2012, CCS '12 Proceedings of the 2012 ACM conference on Computer and communications security. New York: ACM, p. 857-868

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    On the Performance of Certificate Revocation Protocols Based on a Java Card Certificate Client Implementation

    Papapanagiotou, K., Markantonakis, K., Zhang, Q., Sirett, W. & Mayes, K., 2005, Security and Privacy in the Age of Ubiquitous Computing. Sasaki, R., Qing, S., Okamoto, E. & Yoshiura, H. (eds.). Springer Boston, Vol. 181. p. 551-563 13 p. (IFIP Advances in Information and Communication Technology).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Unpublished

    On the pricing of commonality across various liquidity proxies in the London Stock Exchange

    Lim, S. & Giouvris, E., 2015, (Unpublished) On the pricing of commonality across various liquidity proxies in the London Stock Exchange.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks

    Kendall, M. & Martin, K. M., 2012, Research in Cryptology – 4th Western European Workshop WEWoRC 2011. Springer, Vol. 7242. p. 62-82 (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On the Satisfiability of Workflows with Release Points

    Crampton, J., Gutin, G. & Watrigant, R., Jun 2017, SACMAT '17 Abstracts: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies. ACM, p. 207-217 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    On the security of a structural proven signer ordering multisignature scheme

    Mitchell, C. J. & Hur, N., 2002, Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, CMS 2002, Portoroz, Slovenia, September 2002. Jerman-Blazic, B. & Klobucar, T. (eds.). Boston: Kluwer Academic Publishers, Vol. 228. p. 1-8 8 p. (IFIP Conference Proceedings; no. 228).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    On the security of some password-based key agreement schemes

    Tang, Q. & Mitchell, C. J., 2005, Computational Intelligence and Security: International Conference, CIS 2005, Xi'an, China, December 15-19 2005, Proceedings, Part II. Hao, Y., Liu, J., Wang, Y., Cheung, Y., Yin, H., Jiao, L., Ma, J. & Jiao, Y. (eds.). Springer-Verlag, Vol. 3802. p. 149-154 6 p. (Lecture Notes in Computer Science; vol. 3802).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. E-pub ahead of print

    On the Security of the Algebraic Eraser Tag Authentication Protocol

    Blackburn, S. & Robshaw, M. J. B., 9 Jun 2016, Applied Cryptology and Network Security: 14th International Conference, ACNS 2016, London (Guildford), UK, June 19-22, 2016. Springer-Verlang, Vol. 9696. p. 3-17 15 p. (Lecture Notes in Computer Science; vol. 9696).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    On the Security of the TLS Protocol: A Systematic Analysis

    Krawczyk, H., Paterson, K. G. & Wee, H., Aug 2013, Advances in Cryptology – CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings. Garay, J. A. & Canetti, R. (eds.). Springer, Vol. 1. p. 429-448 (Lecture Notes in Computer Science; vol. 8042).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    On the undecidability of asynchronous session subtyping

    Lange, J. & Yoshida, N., 16 Mar 2017, Foundations of Software Science and Computation Structures - 20th International Conference, FOSSACS 2017 Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Proceedings. Esparza, J. & Murawski, A. S. (eds.). Springer Verlag, p. 441-457 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10203 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    On the use of variable user goals to measure perceived usefulness

    Matook, S. & van der Heijden, H., 2007, Proceedings of the European Conference on Information Systems (ECIS). St Gallen, Switzerland

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    On the Way to 'Euphonia': Berlioz's Promotion of Earlier Music

    Charlton, D., 2015, Von Gluck zu Berlioz.: Die französische Oper zwischen Antikenrezeption und Monumentalität.. Betzwieser, T. & Mauksch, S. (eds.). Würzburg: Konigshausen & Neumann, p. 139-58 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    On Weak Keys and Forgery Attacks against Polynomial-based MAC Schemes

    Procter, G. & Cid, C., 2013, Fast Software Encryption, 20th International Workshop, FSE 2013. Springer, Vol. 8424. p. 287-304 18 p. (Lecture Notes in Computer Science - LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    One Bad Apple: Backwards Compatibility Attacks on State-of-the-Art Cryptography

    Jager, T., Paterson, K. & Somorovsky, J., 24 Apr 2013, Network and Distributed System Security Symposium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Online community response to major disaster: A study of Tianya forum in the 2008 Sichuan earthquake

    Qu, Y., Wu, P. F. & Wang, X., 6 Apr 2009, Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS. 4755366

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    On-line confidence machines are well-calibrated

    Vovk, V., 2002, Proceedings of the Forty Third Annual Symposium on Foundations of Computer Science. Los Alamitos, CA: IEEE Computer Society, p. 187-196 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Online conformal prediction for classifying different types of herbal medicines with electronic nose

    Zhan, X., Guan, X., Wu, R., Wang, Z., Wang, Y., Luo, Z. & Li, G., 4 Nov 2018, IET Doctoral Forum on Biomedical Engineering, Healthcare, Robotics and Artificial Intelligence 2018: BRAIN 2018. IET Conference Publications, Vol. 2018. p. 1-8 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Online distance learning as a public policy tool for development

    Kromidha, E., 2013, Proceedings of the European Consortium for Political Research 2013 General Conference, 8-9 September 2013. Bordeaux, France

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Online Instructors: How does the presence on e-learning platforms matter?

    Wallace, A. & Panteli, N., 5 Sep 2017, Proceedings of the British Academy of Management Conference, BAM2017: Track: E-business. The University of Warwick, September 5-7, 2017

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    On-line network resource consumption prediction with confidence

    Luo, Z., 2007, Second International Conference on Communications and Networking in China, 2007. CHINACOM '07. . p. 104-108

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Online Prediction of Ovarian Cancer

    Zhdanov, F., Vovk, V., Burford, B., Devetyarov, D., Nouretdinov, I. & Gammerman, A., 2009, Proceedings of the 12th Conference on Artificial Intelligence in Medicine. p. 375-379 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    On-line Prediction with Kernels and the Complexity Approximation Principle

    Gammerman, A., Kalnishkan, Y. & Vovk, V., 2004, Uncertainty in Artificial Intelligence, Proceedings of the Twentieth Conference. Chickering, M. & Halpern, J. (eds.). AUAI Press, p. 170-176

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    On-Line Probability, Complexity and Randomness

    Chernov, A., Shen, A., Vereshchagin, N. & Vovk, V., 2008, Proceedings of the Nineteenth International Conference on Algorithmic Learning Theory. Freund, Y., Gyorfi, L., Turan, G. & Zeugmann, T. (eds.). Berlin: Springer, Vol. 5254. p. 138-153 16 p. (Lecture Notes in Artificial Intelligence; vol. 5254).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    On-line Regression Competitive with Changing Predictors

    Busuttil, S. & Kalnishkan, Y., 2007, Algorithmic Learning Theory, 18th International Conference, ALT 2007, Proceedings: 4754 of Lecture Notes in Computer Science. Springer, p. 181-195 (Lecture Notes in Computer Science,; vol. 4754).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    On-line regression competitive with reproducing kernel Hilbert spaces

    Vovk, V., 2006, Theory and Applications of Models of Computation. Proceedings of the Third Annual Conference on Computation and Logic. Cai, J-Y., Cooper, S. & Li, A. (eds.). Berlin: Springer, Vol. 3959. p. 452-463 12 p. (Lecture Notes in Computer Science; vol. 3959).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Online Total Ionisation Dosimeter (TID) monitoring using semiconductor based radiation sensors in the isis proton synchrotron

    Harryman, D., Sep 2016, International Beam Instrumentation Conference 2016. p. 379-382 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Open Game Tournaments in STARLITE

    Hopkins, J., Kafali, O. & Stathis, K., 4 May 2015, Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2015). IFAAMAS, p. 1927-1928 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Open Innovation and The Erosion of the Traditional Information Systems Project’s Boundaries

    Elbanna, A., 2008, IFIP WG 8.6.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Opening the black boxes of TAM: Towards a mixed methods approach

    Wu, P. F., 1 Dec 2009, ICIS 2009 Proceedings - Thirtieth International Conference on Information Systems.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Opéra Comique: Identity and Manipulation

    Charlton, D., 2001, Reading Critics Reading: Opera and Ballet Criticism in France from the Revolution to 1848. Parker, R. & Smart, M. A. (eds.). Oxford: Oxford University Press, p. 13-45 32 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Opéra-comique and the computer

    Charlton, D., 1992, Grétry et l'Europe de l'Opéra-Comique. Vendrix, P. (ed.). Liège: Mardaga, p. 367-78 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Optical Information

    Soklakov, A. N. & Schack, R., 2003, Proceedings of the 6th International Conference on Quantum Communication, Measurement and Computing (QCMC'02). Shapiro, J. H. & Hirota, O. (eds.). Princeton, New Jersey: Rinton Press, p. 205-208

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Optimal Contracts for Outsourced Computation

    Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Optimal Left-to-Right Pattern-Matching Automata

    Nedjah, N., Walter, C. D. & Eldridge, S. E., 1997, ALP '97 - HOA '97. Hanus, M., Heering, J. & Meinke, K. (eds.). Springer, Vol. 1298. p. 273-286 14 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Optimal non-perfect uniform secret sharing schemes

    Farràs, O., Hansen, T., Kaced, T. & Padró, C., 2014, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Springer-Verlag, Vol. 8617 LNCS. p. 217-234 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8617 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Optimal Recovery of Secret Keys from Weak Side Channel Traces

    Schindler, W. & Walter, C. D., 2009, 12th IMA Int. Conf. on Cryptography and Coding. Parker, M. G. (ed.). Springer, Vol. 5921. p. 446-468 23 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Optimal regional consecutive leader election in mobile ad-hoc networks

    Chung, H. C., Robinson, P. & Welch, J. L., 2011, FOMC'11, The Seventh ACM SIGACT/SIGMOBILE International Workshop on Foundations of Mobile Computing (part of FCRC 2011), San Jose, CA, USA, June 9, 2011, Proceedings. p. 52-61 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Optimal Strategies in Pushdown Reachability Games

    Hague, M. & Carayol, A., 20 Aug 2018, International Symposium on Mathematical Foundations of Computer Science. p. 1-14 14 p. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Optimisation and validation of a minimum data set for the identification and quality control of EST expression libraries

    Milnthorpe, A. T. & Soloviev, M., 2013, BIOINFORMATICS 2013 - Proceedings of the International Conference on Bioinformatics Models, Methods and Algorithms. p. 278-281 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Optimistic Fair-Exchange with Anonymity for Bitcoin Users

    Jayasinghe, D., Markantonakis, K. & Mayes, K., 11 Dec 2014, The 11th IEEE International Conference on e-Business Engineering (IEEE ICEBE-14). Guangzhou, China: IEEE Computer Society, p. 44-51 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Or gate Bayesian networks for text classification: A discriminative alternative approach to multinomial naive Bayes

    de Campos, L. M., Fernández-Luna, J. M., Huete, J. F. & Romero, A. E., 2008, Actas del XIV Congreso Español sobre Tecnologías y Lógica Fuzzy. p. 385-390 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    ORC: an Ontology Reasoning Component for Diabetes

    Kafali, O., Sindlar, M., Weide, T. V. D. & Stathis, K., 2013, 2nd International Workshop on Artificial Intelligence and Netmedicine (NetMed'13).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Organic components in interplanetary dust particles and their implications for the synthesis of cometary organics

    Chan, Q. H. S., Franchi, I. A. & Wright, I. P., Jul 2017, 80th Annual Meeting of the Meteoritical Society 2017. 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Organisational cultural factors and strategic sensemaking in the opportunity exploration and exploitation processes

    Wang, C. L., 2007, British Academy of Management Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Published

    Organisational Success: Fact or Fiction

    Aboutalebi, R., 8 Oct 2009, In: Graduate Conference on Social Sciences and Management, the 3rd Graduate Conference on Social Sciences and Management, 8-9 October 2009, University of Bradford, England.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Organisational Success: Impacts of Ethic/Values, Organisation’s Social Responsibility, and Culture

    Aboutalebi, R., 5 Nov 2009, In: European Parliament, the 6th Conference on Ethics in Business, Corporate Culture & Spirituality. 5-6 November 2009, European Parliament, Brussels.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    Organizational diversity and shared vision: resolving the paradox of opportunity exploration and exploitation

    Wang, C. L., 2007, Strategic Management Society Special Conference on Entrepreneurship.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution