Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

71 - 80 out of 517Page size: 10
  1. 2017
  2. Published

    Evaluating approaches for the next generation of difficulty and complexity assessment tools

    Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Hacking a bridge: An exploratory study of compliance-based information security management in banking organization

    Fagade, T. & Tryfonas, T., 8 Jul 2017, In : Journal of Systemics, Cybernetics and Informatics. 15, 5, p. 74-80 7 p.

    Research output: Contribution to journalArticle

  4. Published

    Machine-Checked Proofs of Privacy for Electronic Voting Protocols

    Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

    Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    Faster secure multi-party computation of AES and DES using lookup tables

    Keller, M., Orsini, E., Rotaru, D., Scholl, P., Soria-Vazquez, E. & Vivek, S., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, Cham, p. 229-249 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Turning Online Ciphers Off

    Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

    Research output: Contribution to journalArticle

  8. E-pub ahead of print

    Malicious Insider Threat Detection: A Conceptual Model

    Fagade, T. & Tryfonas, T., 1 Jun 2017, Security and Protection of Information 2017 (SPI). Brno, Czech Republic: University of Defence, (Security and Protection of Information).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    On the Shape of the General Error Locator Polynomial for Cyclic Codes

    Caruso, F., Orsini, E., Sala, M. & Tinnirello, C., Jun 2017, In : IEEE Transactions on Information Theory. 63, 6, p. 3641-3557 17 p.

    Research output: Contribution to journalArticle

  10. Published

    Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory

    Margelis, G., Piechocki, R., Tryfonas, T. & Thomas, P., May 2017, 2016 IEEE Global Communications Conference (GLOBECOM 2016): Proceedings of a meeting held 4-8 December 2016, Washington, DC, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7842270

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Secure Multiparty Computation from SGX

    Portela, B., Barbosa, M. B. M., Brasser, F., Portela, B., Sadeghi, A-R., Scerri, G. & Warinschi, B., 5 Apr 2017, Financial Cryptography and Data Security 2017: Twenty-First International Conference, April 3–7, 2017, The Palace Hotel, Malta . International Financial Cryptography Association

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...4 5 6 7 8 9 10 11 ...52 Next