Home > Publications

Publications

37251 - 37300 out of 39,866Page size: 50
  1. Conference contribution › Research
  2. Published

    Tree-Based Cryptographic Access Control

    Alderman, J., Farley, N. & Crampton, J., 2017, Computer Security – ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Proceedings. Springer-Verlag, Vol. 10492 . p. 47-64 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10492 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Triassic and Jurassic Sandstones in the Banda Arc: Provenance and correlations with the Australian NW Shelf

    Zimmermann, S. & Hall, R., 25 May 2016, Proceedings, Indonesian Petroleum Association Fortieth Annual Convention 2016. Indonesian Petroleum Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots

    Seifert, C., Komisarczuk, P. & Welch, I., 2009, The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece. p. 63-69 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Forthcoming

    Trust and Legitimacy in Security Standardization – a new Management Issue?

    Kuhlmann, D., Chen, L. & Mitchell, C. J., 19 Feb 2016, (Accepted/In press) Proceedings of I-ESA 16: 8th International Conference: Interoperability for enterprise systems and applications, Guimaraes, Portugal, March 29-April 1 2016. ISTE Publications

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Trust Strategies for ART Testbed

    Kafali, O. & Yolum, P., 2006, Ninth International Workshop on Trust in Agent Societies, AAMAS. p. 43-49 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Forthcoming

    Trust under the Panopticon: Factors Influencing Trust within Contemporary Social Movements

    Azer, E., Zheng, Y. & Harindranath, G., 14 Feb 2019, (Accepted/In press) 35th EGOS Colloquium.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Trusted computing technologies and their use in the provision of high assurance SDR platforms

    Gallery, E. M. & Mitchell, C. J., 2006, Proceedings of the 2006 Software Defined Radio Technical Conference, Orlando, Florida, November 2006.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Trusted mobile platforms

    Gallery, E. & Mitchell, C. J., 2007, Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures. Aldini, A. & Gorrieri, R. (eds.). Springer-Verlag, Vol. 4677. p. 282-323 42 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Trusted Platform Module for Smart Cards

    Akram, R. N., Markantonakis, K. & Mayes, K., 1 Mar 2014, 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS). Alfandi, O. (ed.). Dubai, UAE: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Trusted Third Party based key management allowing warranted interception

    Jefferies, N., Mitchell, C. J. & Walker, M., 1995, Proceedings: Public Key Infrastructure Invitational Workshop, MITRE, McLean, Virginia, USA, September 1995. Gaithersburg, MD: National Institute of Standards and Technology (NIST)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Tunable balancing of RSA

    McKee, J., Galbraith, S. D. & Heneghan, C., 2005, ACISP 10. p. 280-292 (Lecture Notes in Computer Science; vol. 3574).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  13. Published

    Two Edge Modification Problems without Polynomial Kernels

    Kratsch, S. & Wahlström, M., 1 Sep 2009, Parameterized and Exact Computation : 4th International Workshop, IWPEC 2009. Chen, J. & Fomin, F. V. (eds.). Denmark, Copenhagen: Springer, Vol. 5917. p. 264-275 12 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  14. Published

    Two Proposals for Improving the Image-Based Authentication System: H-IBAS-H

    Vuksanovic, B. & Al-Sinani, H., 2009, INTERNET-09: First International Conference on Evolving Internet, Cannes/La Bocca, French Riviera, France, August 23-29 2009 . Washington: IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  15. Published

    Two-Stage Classification Model to Detect Malicious Web Pages

    Le, V. L., Welch, I., Gao, X. & Komisarczuk, P., 2011, 25th IEEE International Conference on Advanced Information Networking and Applications, AINA 2011, Biopolis, Singapore, March 22-25, 2011. p. 113-120 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  16. Published

    Typed Operational Semantics for Dependent Record Types

    Feng, Y. & Luo, Z., 2011, Proceedings of Types for Proofs and Programs (TYPES'09), EPTCS 53.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  17. Published

    Type-theoretic semantics for SemNet

    Shiu, S., Luo, Z. & Garigliano, R., 1996, Proc. of Inter. Conf. on Formal and Applied Practical Reasoning, LNAI 1085.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  18. Published

    Type-Theoretical Semantics with Coercive Subtyping

    Luo, Z., 2010, Semantics and Linguistic Theory. Vol. 20. p. 38-56 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  19. Published

    Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures

    Bilal, Z. & Martin, K. M., 2013, Availability, Reliability and Security (ARES), 2013 Eighth International Conference on. IEEE, p. 304-309

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  20. Published

    Unboundedness and downward closures of higher-order pushdown automata

    Hague, M., Kochems, J. & Ong, C-H. L., 11 Jan 2016, Principles of Programming Languages: POPL '16. New York, NY: ACM, p. 151-163 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  21. Published

    Understanding and developing role-based administrative models

    Crampton, J., 2005, Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM Press, p. 158-167 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  22. Published

    Understanding knowledge management software acquisition in organisations: A conceptual framework

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2007, PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS 2007, SECTIONS 1-6. KAOHSIUNG: NATL SUN YAT-SEN UNIV, p. U1096-U1108 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  23. Published

    Understanding knowledge management software-organisation misalignments from an institutional perspective: A case study of a global IT-management consultancy firm

    Le-Nguyen, K., Harindranath, G. & Dyerson, R., 2008, 12TH PACIFIC ASIA CONFERENCE ON INFORMATION SYSTEMS (PACIS 2008). KOWLOON: CITY UNIVERSITY HONG KONG, p. 85A-+ 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  24. Published

    Understanding Subcultures and Change Dynamics in E-Government: An Empirical Study of a Local Government in Malaysia

    Jackson, S. & Wong, K., 11 Jul 2015, 10th Annual Midwest Association for Information Systems Conference, Pittsburg, Kansas. Vol. 23. p. 1-3 3 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  25. Published

    Understanding the creation of ICT-value in the building and construction industry

    Linderoth, H. C. J. & Elbanna, A., 5 Sep 2016, Proceedings of the 32nd Annual ARCOM Conference, 5-7 September 2016, Manchester, UK. Vol. 1. p. 103-112 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  26. Published

    Understanding the dynamic process of emerging ICT adoption in UK service SMEs

    Eze, S., Duan, Y. & Jackson, S., 2011, UK Academy for Information Systems Conference Proceedings .

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  27. Published

    Understanding the experience-centeredness of security and privacy technologies

    Dunphy, P., Vines, J., Coles-Kemp, L., Clarke, R., Vlachokyriakos, V., Wright, P., McCarthy, J. & Olivier, P., 2014, Proceedings of the 2014 New Security Paradigms Workshop. . ACM, p. 83-94 11 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  28. Published

    Understanding the Impact of ICT Adoption and Use in South African Manufacturing and Logistics SMEs: A Firm, Market and Regulatory (FMR) Context Perspective

    Gono, S., Harindranath, G. & Özcan, G. B., Nov 2014, Proceedings of the 2014 ISBE Conference, Manchester, 5-6 Nov 2014. ISBE

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  29. Published

    Understanding the implementation of social standards in global supply chains: A multi-dimensional analysis

    Soundararajan, V., Sep 2013, 27th annual British Academy of Management (BAM) Conference . Liverpool

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  30. Published

    Understanding the Indian Film Industry: the good, the bad and the ugly

    Sen Gupta, S., 2016, Knowledge Organisation and Learning Conference. London

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  31. Published

    Understanding the organo-carbonate associations in carbonaceous chondrites with the use of micro-Raman analysis

    Chan, QHS. & Zolensky, ME., 2015, European Planetary Science Congress 2015, held 27 September - 2 October, 2015 in Nantes, France. 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  32. Published

    Undetachable threshold signatures

    Borselius, N., Mitchell, C. J. & Wilson, A. T., 2001, Cryptography and Coding - Proceedings of the 8th IMA International Conference, Cirencester, UK, December 2001. Honary, B. (ed.). Springer-Verlag, p. 239-244 6 p. (Lecture Notes in Computer Science; no. 2260).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  33. Published

    Unfolding in particle physics: a window on solving inverse problems

    Spano, F., Oct 2014, contribution to Top2013, 6th International Workshop on Top Quark Phyiscs, 14th-19th September 2013 , Durbach, Germany. Husemann, U., Mildner, H. & Roscher, F. (eds.). Verlag Deutsches Elektronen-Synchrotron, Vol. DESY-PROC-2014-02. p. 256-261 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  34. Published

    Unified Model for Data Security -- A Position Paper

    Akram, R. N. & Ko, R. K. L., 1 Sep 2014, The 1st International Workshop on the Emerging Future Internet and Network Security (IEEE EFINS 2014) in conjunction with The 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Aiash, M. & Loo, J. (eds.). IEEE Computer Society Press

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  35. Published

    Uniform Inductive Reasoning in Transitive Closure Logic via Infinite Descent

    Cohen, L. & Rowe, R., 4 Sep 2018, 27th EACSL Annual Conference on Computer Science Logic (CSL 2018). Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Vol. 119. p. 17:1-17:16 16 p. (Leibniz International Proceedings in Informatics (LIPIcs)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  36. Published

    Uniform, integral and efficient proofs for the determinant identities

    Tzameret, I. & Cook, S., 18 Aug 2017, 2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS). IEEE, Vol. 32. p. 1-12 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  37. Published

    Unifying Theories in Different Institutions

    Arrais, M. & Fiadeiro, J. L., 1996, COMPASS/ADT. Springer, Vol. 1130. p. 81-101 21 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  38. Published

    Unique View of C Asteriod Regolith from the Jbilet Winselwan CM Chondrite

    Zolensky, M., Mikouchi, T., Hagiya, K., Ohsumi, K., Komatsu, M., Chan, Q. HS., Le, L., Kring, D., Cato, M. & Fagan, A. L., 2016, 47th Lunar and Planetary Science Conference, held March 2016, at The Woodlands, Texas.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  39. Published

    Universal portfolio selection

    Vovk, V. & Watkins, C. J. H. C., 1998, Proceedings of the Eleventh Annual Conference on Computational Learning Theory. New York: ACM Press, p. 12-23 12 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  40. Published

    Universal Probability-Free Conformal Prediction

    Vovk, V. & Pavlovic, D., 2016, Proceedings of COPA 2016: Fifth Symposium on Conformal and Probabilistic Prediction with Applications. Springer, Vol. 9653. p. 40-47 8 p. (Lecture Notes in Computer Science; vol. 9653).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  41. Published

    Universal well-calibrated algorithm for on-line classification

    Vovk, V., 2003, Proceedings of the Sixteenth Annual Conference on Learning Theory and Seventh Kernel Workshop. Scholkopf, B. & Warmuth, M. K. (eds.). p. 358-372 15 p. (Lecture Notes in Artificial Intelligence; vol. 2777).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  42. Published

    Unknown quantum operations

    Schack, R., 2004, Quantum Theory: Reconsideration of Foundations 2. A., K. (ed.). Växjö: Växjö University Press, p. 507-518

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  43. Published

    Unknown Quantum States and Operations, a Bayesian View

    Fuchs, C. A. & Schack, R., 2004, Quantum State Estimation: Lecture Notes in Physics {\bf 649}. Řeháček, J. & Paris, M. G. A. (eds.). Berlin: Springer Verlag, p. 147-187

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  44. Published

    Unraveling the complexities of interdisciplinary software engineering

    Mehandjiev, N., Layzell, P. & Brereton, P., 2004, ELEVENTH ANNUAL INTERNATIONAL WORKSHOP ON SOFTWARE TECHNOLOGY AND ENGINEERING PRACTICE, PROCEEDINGS. LOS ALAMITOS: IEEE COMPUTER SOC, p. 214-221 8 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  45. Published

    Unrestricted Faithful Rounding is Good Enough for Some LNS Applications

    Arnold, M. G. & Walter, C. D., 2001, 15th IEEE Symposium on Computer Arithmetic. IEEE Computer Society Press, p. 237-246 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  46. Published

    Unsupervised Induction of Stochastic Context Free Grammars with Distributional Clustering

    Clark, A., 1 Jul 2001, Proc. of Conference on Computational Natural Language Learning. p. 105-112

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  47. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, Proceedings of the 55th Annual Meeting of the Academy of International Business: "Bridging the Divide: Linking IB to Complementary Disciplines and Practice". McDougall-Covin, P. & Kiyak, T. (eds.). 2013 Academy of International Business, p. 277-278 2 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  48. Published

    Upgrading Technological Capabilities by Developing Country Multinational Companies

    Rui, H. & Cuervo-Cazurra, A., 2013, The 73rd Annual Meeting of the Academy of Management: “Capitalism in Question”. Academy of Management

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  49. Submitted

    USAGE PATTERNS AND CHALLENGES OF MULTIPURPOSE COMMUNITY TELECENTRES IN MALAWI

    Kapondera, S. K. & Chigona, W., 2017, (Submitted) SIG Global Development.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  50. Published

    Use of Satisfaction-Satisfaction Matrix (SSM) to evaluate E-Government services from the perspective of Japanese citizens and government service providers

    Wong, K., Nishimoto, H., Nishigaki, Y. & Jackson, S., 2013, 24th Australasian Conference on Information Systems, Melbourne, AU, 04 - 06 Dec.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  51. Published

    User acceptance of electronic commerce: lessons learned from the Bled eConference

    van der Heijden, H., 2012, 25th Special Anniversary Proceedings of the Bled eConference,. Bled, Slovenia

    Research output: Chapter in Book/Report/Conference proceedingConference contribution