Research Output

2018

SPHERE deployment manager: A tool for deploying IoT sensor networks at large scale

Fafoutis, X., Elsts, A., Oikonomou, G. & Piechocki, R., 30 Aug 2018, Ad-hoc, Mobile, and Wireless Networks: 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings. Springer, Cham, p. 307-318 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11104 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
113 Downloads (Pure)

Temperature-resilient time synchronization for the internet of things

Elsts, A., Fafoutis, X., Duquennoy, S., Oikonomou, G., Piechocki, R. & Craddock, I., May 2018, In : IEEE Transactions on Industrial Informatics. 14, 5, p. 2241-2250 10 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
10 Citations (Scopus)
229 Downloads (Pure)

TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation

Duquennoy, S., Elsts, A., Al Nahas, B. & Oikonomou, G., Apr 2018, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS 2017): Proceedings of a meeting held 5-7 June 2017, Ottawa, Ontario, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 11-18 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
37 Citations (Scopus)
396 Downloads (Pure)

Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited

Martin, D. P., Mather, L. & Oswald, E., 7 Mar 2018, Two Sides of the Same Coin: Counting and Enumerating Keys Post Side-Channel Attacks Revisited. p. 394-412 Chapter 21. (Topics in Cryptology – CT-RSA 2018; vol. 10808).

Research output: Chapter in Book/Report/Conference proceedingChapter in a book

3 Citations (Scopus)

Untagging Tor: A Formal Treatment of Onion Encryption

Degabriele, J. P. & Stam, M., 2 Jun 2018, Advances in Cryptology - EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Buus Nielsen, J. & Rijmen, V. (eds.). Springer, p. 259-293 35 p. (Lecture Notes in Computer Science; vol. 10820).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Using MBSE Techniques to Perform Early Validation on the Data Handling Unit of a Spacecraft

Gregory, J., Berthoud, L. & Tryfonas, T., 20 Nov 2018.

Research output: Contribution to conferenceConference Poster

Open Access
File
71 Downloads (Pure)
2017

Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection

Orrù, M., Orsini, E. & Scholl, P., 1 Jan 2017, Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017. Springer-Verlag Berlin, p. 381-396 16 p. (Lecture Notes in Computer Science; vol. 10159).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
15 Citations (Scopus)

Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
211 Downloads (Pure)

An intelligent hot-desking model harnessing the power of occupancy sensing

Cooper, P. B., Maraslis, K., Tryfonas, T. & Oikonomou, G., 3 Oct 2017, In : Facilities. 35, 13/14, p. 766-786 21 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
4 Citations (Scopus)
202 Downloads (Pure)

An SME Decision Support System Utilising Defined Scoring Methods

Pashley, D., Tryfonas, T., Crossley, A. & Setchell, C., 31 Dec 2017, In : International Journal on Advances in Intelligent Systems. 10, 3/4, p. 327-344 18 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
76 Downloads (Pure)

Authenticated Encryption in the Face of Protocol and Side Channel Leakage

Barwell, G., Martin, D., Oswald, E. & Stam, M., 30 Nov 2017, Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Springer, p. 693-723 31 p. (Lecture Notes in Computer Science; vol. 10624).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
16 Citations (Scopus)

Categorising and Comparing Cluster-Based DPA Distinguishers

Zhou, X., Whitnall, C., Oswald, E., Sun, D. & Wang, Z., 23 Dec 2017, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Springer, Cham, p. 442-458 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
1 Citation (Scopus)

Cryptographic randomness on a CC2538: a case study

Yan, Y., Oswald, E. & Tryfonas, T., Mar 2017, 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016: Proceedings of a meeting held 4-7 December 2016, Abu Dhabi, United Arab Emirates.. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7823912. (International Workshops on Information Forensics and Security).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Evaluating approaches for the next generation of difficulty and complexity assessment tools

Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Faster Homomorphic Evaluation of Discrete Fourier Transforms

Costache, A., Smart, N. & Vivek, S., 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer, Cham, p. 517-529 13 p. (Lecture Notes in Computer Science; vol. 10322).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)

Faster secure multi-party computation of AES and DES using lookup tables

Keller, M., Orsini, E., Rotaru, D., Scholl, P., Soria-Vazquez, E. & Vivek, S., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, Cham, p. 229-249 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
12 Citations (Scopus)

Fixed-point arithmetic in SHE schemes

Costache, A., Smart, N., Vivek, S. & Waller, A., 20 Oct 2017, Selected Areas in Cryptography - SAC 2016: 23rd International Conference, St. John’s, NL, Canada, August 10-12, Revised Selected Papers. Springer, p. 401-422 22 p. (Lecture Notes in Computer Science; vol. 10532).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
10 Citations (Scopus)

Generic Forward-Secure Key Agreement Without Signatures

Delpech de Saint Guilhem, C., Smart, N. & Warinschi, B., 20 Sep 2017, Information Security - ISC 2017: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24 2017. Proceedings. Springer, Cham, p. 114-133 20 p. (Lecture Notes in Computer Science; vol. 10599).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Hacking a bridge: An exploratory study of compliance-based information security management in banking organization

Fagade, T. & Tryfonas, T., 8 Jul 2017, In : Journal of Systemics, Cybernetics and Informatics. 15, 5, p. 74-80 7 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
27 Downloads (Pure)

Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks

Mavromatis, A., Papadopoulos, G., Fafoutis, X., Goulianos, A., Oikonomou, G., Chatzimisios, P. & Tryfonas, T., 4 Sep 2017, 2017 IEEE Symposium on Computers and Communications (ISCC). Institute of Electrical and Electronics Engineers (IEEE)

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
3 Citations (Scopus)
332 Downloads (Pure)

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
7 Citations (Scopus)
410 Downloads (Pure)

Malicious Insider Threat Detection: A Conceptual Model

Fagade, T. & Tryfonas, T., 1 Jun 2017, Security and Protection of Information 2017 (SPI). Brno, Czech Republic: University of Defence, (Security and Protection of Information).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
103 Downloads (Pure)

Modes of Operation Suitable for Computing on Encrypted Data

Rotaru, D., Smart, N. & Stam, M., 1 Aug 2017, In : Transactions on Symmetric Cryptology. 2017, 3, p. 294-324 31 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy

Jager, T., Stam, M., Stanley-Oakes, R. & Warinschi, B., 5 Nov 2017, Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I. Springer, p. 409-441 33 p. (Lecture Notes in Computer Science; vol. 10677).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Multi-rate threshold FlipThem

Leslie, D., Sherfield, C. & Smart, N., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part II. Springer, Vol. 10493. p. 174-190 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

On the Shape of the General Error Locator Polynomial for Cyclic Codes

Caruso, F., Orsini, E., Sala, M. & Tinnirello, C., Jun 2017, In : IEEE Transactions on Information Theory. 63, 6, p. 3641-3557 17 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
6 Citations (Scopus)
248 Downloads (Pure)

Physical layer secret-key generation with discreet cosine transform for the Internet of Things

Margelis, G., Fafoutis, X., Oikonomou, G., Piechocki, R., Tryfonas, T. & Thomas, P., Nov 2017, 2017 IEEE International Conference on Communications (ICC 2017): Proceedings of a meeting held 21-25 May 2017, Paris, France. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7997419

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
16 Citations (Scopus)
248 Downloads (Pure)

Practical limits of the secret key-capacity for IoT physical layer security

Margelis, G., Fafoutis, X., Piechocki, R. J., Oikonomou, G., Tryfonas, T. & Thomas, P., Mar 2017, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016): Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 311-316 6 p. 7845415

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
4 Citations (Scopus)
369 Downloads (Pure)

Privacy Leakage of Physical Activity Levels in Wireless Embedded Wearable Systems

Fafoutis, X., Marchegiani, L., Papadopoulos, G. Z., Piechocki, R., Tryfonas, T. & Oikonomou, G., Feb 2017, In : IEEE Signal Processing Letters. 24, 2, p. 136-140 5 p.

Research output: Contribution to journalLetter (Academic Journal)

Open Access
File
12 Citations (Scopus)
286 Downloads (Pure)

Quantum Key Search with Side Channel Advice

Martin, D., Montanaro, A., Oswald, E. & Shepherd, D., 23 Dec 2017, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Springer, p. 407-422 16 p. (Lecture Notes in Computer Science; vol. 10719).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
7 Citations (Scopus)

Rapid Deployment of a WSN on the Clifton Suspension Bridge, UK

Gunner, S., Vardanega, P., Tryfonas, T., Macdonald, J. & Wilson, E., 22 Dec 2017, In : Proceedings of the ICE - Smart Infrastructure and Construction. 170, 3, p. 59-71 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
315 Downloads (Pure)

Secure composition of PKIs with public key protocols

Cheval, V., Cortier, V. & Warinschi, B., 28 Sep 2017, 2017 IEEE Computer Security Foundations Symposium. p. 144-158 15 p. (2017 IEEE 30th Computer Security Foundations Symposium (CSF) ).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
103 Downloads (Pure)

Secure Multiparty Computation from SGX

Portela, B., Barbosa, M. B. M., Brasser, F., Portela, B., Sadeghi, A-R., Scerri, G. & Warinschi, B., 5 Apr 2017, Financial Cryptography and Data Security 2017: Twenty-First International Conference, April 3–7, 2017, The Palace Hotel, Malta . International Financial Cryptography Association

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
197 Downloads (Pure)

Smart Attacks on the Integrity of the Internet of Things: Avoiding Detection by Employing Game Theory

Margelis, G., Piechocki, R., Tryfonas, T. & Thomas, P., May 2017, 2016 IEEE Global Communications Conference (GLOBECOM 2016): Proceedings of a meeting held 4-8 December 2016, Washington, DC, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7842270

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
271 Downloads (Pure)

System dynamics approach to malicious insider cyber-threat modelling and analysis

Fagade, T., Spyridopoulos, T., Albishry, N. & Tryfonas, T., 2017, Human Aspects of Information Security, Privacy and Trust - 5th International Conference, HAS 2017 Held as Part of HCI International 2017, Proceedings. Springer-Verlag Berlin, Vol. 10292 LNCS. p. 309-321 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10292 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

The Security of Tandem-DM in the Ideal Cipher Model

Lee, J., Stam, M. & Steinberger, J., 1 Apr 2017, In : Journal of Cryptology. 30, 2, p. 495-518 24 p.

Research output: Contribution to journalArticle (Academic Journal)

2 Citations (Scopus)

Tightly Secure Ring-LWE Based Key Encapsulation with Short Ciphertexts

Albrecht, M., Orsini, E., Patterson, K. G., Peer, G. & Smart, N. P., 1 Sep 2017, European Symposium on Research in Computer Security: ESORICS 2017: Part I. Springer, Vol. 10492. p. 29-46 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Towards effective cybersecurity resource allocation: the Monte Carlo predictive modelling approach

Fagade, T., Maraslis, K. & Tryfonas, T., Dec 2017, In : International Journal of Critical Infrastructures. 13, 2-3, p. 152-167 16 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
1 Citation (Scopus)
254 Downloads (Pure)

Towards practical tools for side channel aware software engineering: 'grey box' modelling for instruction leakages

McCann, D., Oswald, E. & Whitnall, C., 1 Aug 2017, 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, p. 199-216 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
74 Downloads (Pure)

Traffic Forensics for IPv6-Based Wireless Sensor Networks and the Internet of Things

Kumar, V., Oikonomou, G. & Tryfonas, T., Mar 2017, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT 2016): Proceedings of a meeting held 12-14 December 2016, Reston, Virginia, USA. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7845515

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
5 Citations (Scopus)
602 Downloads (Pure)

Turning Online Ciphers Off

Andreeva, E., Barwell, G., Bhaumik, R., Nandi, M., Page, D. & Stam, M., 19 Jun 2017, In : Transactions on Symmetric Cryptology. 2017, 2, p. 105-142

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
66 Downloads (Pure)

When It’s All Just Too Much: Outsourcing MPC-Preprocessing

Scholl, P., Smart, N. & Wood, T., 25 Nov 2017, Cryptography and Coding - IMACC 2017: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017. Proceedings. Springer, p. 77-99 23 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

“Come Together!”: Interactions of Language Networks and Multilingual Communities on Twitter

Albishry, N., Crick, T. & Tryfonas, T., 2017, Computational Collective Intelligence - 9th International Conference, ICCCI 2017, Proceedings. Springer-Verlag Berlin, Vol. 10449 LNAI. p. 469-478 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10449 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)
2016

Adaptive proofs of knowledge in the random oracle model

Bernhard, D., Fischlin, M. & Warinschi, B., Nov 2016, In : IET Information Security. 10, 6, p. 319-331 13 p.

Research output: Contribution to journalArticle (Academic Journal)

Open Access
File
2 Citations (Scopus)
267 Downloads (Pure)

A Methodology for the Characterisation of Leakages in Combinatorial Logic

Bertoni, G. & Martinoli, M., 18 Nov 2016, Security, Privacy, and Applied Cryptography Engineering: 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings. Springer Verlag, p. 363-382 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10076).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
5 Citations (Scopus)

A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

Shrimpton, T., Stam, M. & Warinschi, B., 21 Jul 2016, Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, p. 277-307 31 p. (Lecture Notes in Computer Science (LNCS); vol. 9814).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
3 Citations (Scopus)

Analysis of Key Wrapping APIs: Generic Policies, Computational Security

Scerri, G. & Stanley-Oakes, R. W., Aug 2016, 2016 IEEE 28th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 281-295 15 p. (Proceedings of the IEEE Computer Security Foundations Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
9 Citations (Scopus)
253 Downloads (Pure)

An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact

Maraslis, K., Cooper, P., Tryfonas, T. & Oikonomou, G., 4 Sep 2016, Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII: Special Issue on Big Data for Complex Urban Systems. Springer-Verlag Berlin, Vol. 9860 LNCS. p. 142-158 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9860 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
3 Citations (Scopus)
325 Downloads (Pure)

A Study on Usability and Security Features of the Android Pattern Lock Screen

Andriotis, P., Oikonomou, G., Mylonas, A. & Tryfonas, T., 1 Mar 2016, In : Information and Computer Security. 24, 1, p. 53-72

Research output: Contribution to journalArticle (Academic Journal)

5 Citations (Scopus)

A Unified Approach to MPC with Preprocessing Using OT

Frederiksen, T. K., Keller, M. K. S., Orsini, E. A. & Scholl, P., 8 Jan 2016, Advances in Cryptology -- Asiacrypt 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I. Iwata, T. & Cheon, J. H. (eds.). Auckland, New Zealand: Springer Berlin Heidelberg, p. 711-735 25 p. (Lecture Notes in Computer Science; vol. 9452).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
15 Citations (Scopus)