Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

61 - 70 out of 514Page size: 10
  1. 2017
  2. E-pub ahead of print

    Secure composition of PKIs with public key protocols

    Cheval, V., Cortier, V. & Warinschi, B., 28 Sep 2017, 2017 IEEE Computer Security Foundations Symposium. p. 144-158 15 p. (2017 IEEE 30th Computer Security Foundations Symposium (CSF) ).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Generic Forward-Secure Key Agreement Without Signatures

    Delpech de Saint Guilhem, C., Smart, N. & Warinschi, B., 20 Sep 2017, Information Security - ISC 2017: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24 2017. Proceedings. Springer, Cham, p. 114-133 20 p. (Lecture Notes in Computer Science; vol. 10599).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks

    Mavromatis, A., Papadopoulos, G., Fafoutis, X., Goulianos, A., Oikonomou, G., Chatzimisios, P. & Tryfonas, T., 4 Sep 2017, 2017 IEEE Symposium on Computers and Communications (ISCC). Institute of Electrical and Electronics Engineers (IEEE)

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Multi-rate threshold FlipThem

    Leslie, D., Sherfield, C. & Smart, N., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part II. Springer, Vol. 10493. p. 174-190 17 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

    Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Modes of Operation Suitable for Computing on Encrypted Data

    Rotaru, D., Smart, N. & Stam, M., 1 Aug 2017, In : Transactions on Symmetric Cryptology. 2017, 3, p. 294-324 31 p.

    Research output: Contribution to journalArticle

  8. Published

    Towards practical tools for side channel aware software engineering: 'grey box' modelling for instruction leakages

    McCann, D., Oswald, E. & Whitnall, C., 1 Aug 2017, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, p. 199-216 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Evaluating approaches for the next generation of difficulty and complexity assessment tools

    Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Hacking a bridge: An exploratory study of compliance-based information security management in banking organization

    Fagade, T. & Tryfonas, T., 8 Jul 2017, In : Journal of Systemics, Cybernetics and Informatics. 15, 5, p. 74-80 7 p.

    Research output: Contribution to journalArticle

  11. Published

    Machine-Checked Proofs of Privacy for Electronic Voting Protocols

    Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...3 4 5 6 7 8 9 10 ...52 Next