Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

81 - 90 out of 515Page size: 10
  1. 2017
  2. Published

    Practical limits of the secret key-capacity for IoT physical layer security

    Margelis, G., Fafoutis, X., Piechocki, R. J., Oikonomou, G., Tryfonas, T. & Thomas, P., Mar 2017, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016): Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 311-316 6 p. 7845415

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things

    Kumar, V., Oikonomou, G. & Tryfonas, T., Mar 2017, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016): Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7845515

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems

    Fafoutis, X., Marchegiani, L., Papadopoulos, G. Z., Piechocki, R., Tryfonas, T. & Oikonomou, G., Feb 2017, In : IEEE Signal Processing Letters. 24, 2, p. 136-140 5 p.

    Research output: Contribution to journalLetter

  5. Published

    Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection

    Orrù, M., Orsini, E. & Scholl, P., 1 Jan 2017, Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017. Springer-Verlag Berlin, p. 381-396 16 p. (Lecture Notes in Computer Science; vol. 10159).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    “Come Together!”: Interactions of Language Networks and Multilingual Communities on Twitter

    Albishry, N., Crick, T. & Tryfonas, T., 2017, Computational Collective Intelligence - 9th International Conference, ICCCI 2017, Proceedings. Springer-Verlag Berlin, Vol. 10449 LNAI. p. 469-478 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10449 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    System dynamics approach to malicious insider cyber-threat modelling and analysis

    Fagade, T., Spyridopoulos, T., Albishry, N. & Tryfonas, T., 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Springer-Verlag Berlin, Vol. 10292 LNCS. p. 309-321 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. 2016
  9. Published

    A Methodology for the Characterisation of Leakages in Combinatorial Logic

    Bertoni, G. & Martinoli, M., 18 Nov 2016, Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. Springer Verlag, p. 363-382 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10076).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations

    Martin, D., Mather, L., Oswald, E. & Stam, M., 16 Nov 2016, Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Cheon, J. H. & Takagi, T. (eds.). Springer, p. 548-572 25 p. (Lecture Notes in Computer Science; vol. 10031).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    Universally Composable Cryptographic Role-Based Access Control

    Liu, B. & Warinschi, B., 16 Nov 2016, Provable Security - ProvSec 2016: 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings. Chen, L. & Han, J. (eds.). Springer, p. 61-80 20 p. (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  12. Published

    Adaptive proofs of knowledge in the random oracle model

    Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

    Research output: Contribution to journalArticle

Previous 1...5 6 7 8 9 10 11 12 ...52 Next