Research Output

Filter
Conference Contribution (Conference Proceeding)
2020

Authentication in Key-Exchange: Definitions, Relations and Composition

Delpech De Saint Guilhem, C. P. R., Fischlin, M. & Warinschi, B., 22 Jun 2020, 2020 IEEE 33rd Computer Security Foundations Symposium. p. 288 303 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Dynamic Cloud Service Management for Scalable Internet of Things Applications

Mavromatis, A., Gunner, S., Tryfonas, T. & Simeonidou, D., 9 Apr 2020, 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation: SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI. Institute of Electrical and Electronics Engineers (IEEE), 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
76 Downloads (Pure)

Fifty Shades of Ballot Privacy: Privacy against a Malicious Board

Cortier, V., Lallemand, J. & Warinschi, B., 22 Jun 2020, 2020 IEEE 33rd Computer Security Foundations Symposium. IEEE Computer Society

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Model-based Cybersecurity Engineering for Connected and Automated Vehicles: The FLOURISH Project

Robles-Ramirez, D., Tryfonas, T., Escamilla-Ambrosio, P. J., Fagade, T., Anastasopoulou, K., Tassi, A. & Piechocki, R., 2 Apr 2020, Proceedings of the 11th Model-Based Enterprise Summit: (MBE 2020). NIST National Institute of Standards and Technology, p. 139-149 11 p. (Advanced Manufacturing Series; vol. 100, no. 29).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
38 Downloads (Pure)
2019

A Critical Analysis of ISO 17825 (‘Testing Methods for the Mitigation of Non-invasi

Whitnall, C. A. & Oswald, M. E., 8 Dec 2019, Advances in Cryptology - ASIACRYPT 2014. Springer, Vol. 11923. p. 256-284 28 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

An SDN Agent-Enabled Rate Adaptation Framework for WLAN

Li, L., Oikonomou, G., Beach, M., Nejabati, R. & Simeonidou, D., 1 May 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC). Institute of Electrical and Electronics Engineers (IEEE), 6 p. 8761424. (IEEE International Conference on Communications; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
141 Downloads (Pure)

Assessing the Potential Value of a SHM Deployment on a Proposed Footbridge

Nepomuceno, D., Bennetts, J., Webb, G. T., Langhorne, M., Johnson, M., Macdonald, J., Tryfonas, T. & Vardanega, P., 2019, Advances and Challenges in Structural Engineering: Proceedings of the 2nd GeoMEast International Congress and Exhibition on Sustainable Civil Infrastructures, Egypt 2018 – The Official International Congress of the Soil-Structure Interaction Group in Egypt (SSIGE). Rodrigues, H. & Elnashai, A. (eds.). Springer, Cham, p. 151-166 16 p. (Sustainable Civil Infrastructures).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
154 Downloads (Pure)

Constructing TI-Friendly Substitution Boxes Using Shift-Invariant Permutations

Gao, S., Roy, A. & Oswald, E., 3 Feb 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer Verlag, p. 433-452 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
92 Downloads (Pure)

Early Validation of the Data Handling Unit of a Spacecraft Using MBSE

Gregory, J., Berthoud, L., Tryfonas, T. & Prezzavento, A., 20 Jun 2019, 2019 IEEE Aerospace Conference, AERO 2019: 2-9 March 2019, Big Sky, MT, USA. IEEE Computer Society, Vol. 2019-March. 15 p. 8741767. (Aerospace Conference).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

1 Citation (Scopus)

Encrypted Databases: New Volume Attacks against Range Queries

Gui, Z., Johnson, O. T. & Warinschi, B., 6 Nov 2019, CCS'19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 361-378 47 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
151 Downloads (Pure)

EVM Prediction for Massive MIMO

Boukley Hasan, W. A. G., Doufexi, A., Oikonomou, G. & Beach, M. A., 11 Sep 2019, 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
93 Downloads (Pure)

Examining the practical side channel resilience of arx-boxes

Yan, Y. & Oswald, E., 30 Apr 2019, ACM International Conference on Computing Frontiers 2019, CF 2019 - Proceedings: April 30 - May 2, 2019, Alghero, Sardinia, Italy . Association for Computing Machinery (ACM), p. 373-379 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
146 Downloads (Pure)

Fault Attack Countermeasures for Error Samplers in Lattice-Based Cryptography

Howe, J., Khalid, A., Martinoli, M., Regazzoni, F. & Oswald, E., 22 Feb 2019, (Accepted/In press) IEEE International Symposium on Circuits and Systems (ISCAS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

MPC Joins The Dark Side

Cartlidge, J., Smart, N. & Talibi Alaoui, Y., 12 Jul 2019, AsiaCCS 2019 - Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery (ACM), p. 148-159 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
336 Downloads (Pure)

Non-profiled Mask Recovery: The Impact of Independent Component Analysis

Gao, S., Oswald, E., Chen, H. & Xi, W., 7 Mar 2019, Smart Card Research and Advanced Applications: 17th International Conference, CARDIS 2018, Montpelier, France, November 12–14, 2018, Revised Selected Papers. Springer, Cham, p. 51-64 14 p. (Lecture Notes in Computer Science; vol. 11389).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

Residential Damp Detection with Temperature and Humidity Urban Sensing

Nepomuceno, D., Tryfonas, T. & Vardanega, P., 5 Jul 2019, International Conference on Smart Infrastructure and Construction 2019 (ICSIC): Driving data-informed decision-making . DeJong, M., Schooling, J. & Viggiani, G. (eds.). Thomas Telford (ICE Publishing), p. 605-611 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
106 Downloads (Pure)
2018

Adaptive static scheduling in IEEE 802.15.4 TSCH networks

Fafoutis, X., Elsts, A., Oikonomou, G., Piechocki, R. & Craddock, I., Jun 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT). Institute of Electrical and Electronics Engineers (IEEE), p. 263-268 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
11 Citations (Scopus)
227 Downloads (Pure)

Analysing Interface Bonding in 5G WLANs

Dilmore, M., Doufexi, A. & Oikonomou, G., 1 Nov 2018, 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2018). Institute of Electrical and Electronics Engineers (IEEE), 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
188 Downloads (Pure)

An Evaluation of Performance and Competition in Customer Services on Twitter: A UK Telecoms Case Study

Albishry, N., Crick, T., Tryfonas, T. & Fagade, T., 23 Apr 2018, WWW’18 Companion, April 23–27, 2018, Lyon, France. Association for Computing Machinery (ACM), p. 1713-1720 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
269 Downloads (Pure)

A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher

Zhou, X., Whitnall, C., Oswald, E., Sun, D. & Wang, Z., 26 Jan 2018, Smart Card Research and Advanced Applications: 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13–15, 2017, Revised Selected Papers. Springer, Cham, p. 70-87 18 p. (Lecture Notes in Computer Science; vol. 10728).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

A Provably Secure PKCS#11 Configuration Without Authenticated Attributes

Stanley-Oakes, R., 1 Feb 2018, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Valletta, Malta, April 3-7, 2017, Revised Selected Papers. Springer Berlin Heidelberg, p. 145-162 18 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
196 Downloads (Pure)

A review of air quality sensing technologies and their potential interfaces with IoT for asthma management

Bamashmoos, F., Woznowski, P. & Tryfonas, T., 26 Jun 2018, Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference, PETRA 2018. Association for Computing Machinery (ACM), p. 470-475 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
2 Citations (Scopus)
282 Downloads (Pure)

A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES

Green, J. A. F., Oswald, E. & Roy, A., 12 Nov 2018, (Accepted/In press) A Systematic Study of the Impact of Graphical Models on Inference-based Attacks on AES . CARDIS 2018, (Smart Card Research and Advanced Applications).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access

CAPA: The Spirit of Beaver Against Physical Attacks

Reparaz, O., De Meyer, L., Bilgin, B., Arribas, V., Nikova, S., Nikov, V. & Smart, N., Sep 2018, Advanced in Cryptology - CRYPTO 2018: 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part II. Springer, Cham, p. 121-151 31 p. (Lecture Notes in Computer Science; vol. 10991).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
6 Citations (Scopus)

Energy-efficient, noninvasive water flow sensor

Vafeas, A., Elsts, A., Pope, J., Fafoutis, X., Oikonomou, G., Piechocki, R. & Craddock, I., 26 Jul 2018, Proceedings - 2018 IEEE International Conference on Smart Computing, SMARTCOMP 2018. Institute of Electrical and Electronics Engineers (IEEE), p. 139-146 8 p. 8421342

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

2 Citations (Scopus)

Evolving SDN for Low-Power IoT Networks

Baddeley, M., Nejabati, R., Oikonomou, G., Sooriyabandara, M. & Simeonidou, D., 13 Sep 2018, 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft 2018): Proceedings of a meeting held 25-29 June 2018, Montreal, Quebec, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 71-79 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
13 Citations (Scopus)
198 Downloads (Pure)

Exploring Potential 6LoWPAN Traffic Side Channels.

Yan, Y., Oswald, E. & Tryfonas, T., 14 Feb 2018, EWSN ’18 Proceedings of the 2018 International Conference on Embedded Wireless Systems and Networks: Madrid, Spain, 14-16 February 2018. Association for Computing Machinery (ACM), p. 270-275 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
21 Downloads (Pure)

Machine-checked proofs for electronic voting: Privacy and verifiability for belenios

Cortier, V., Dragan, C. C., Dupressoir, F. & Warinschi, B., Sep 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF 2018): Proceedings of a meeting held 9-12 July 2018, Oxford, United Kingdom. Institute of Electrical and Electronics Engineers (IEEE), p. 298-312 15 p. 8429313

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Popularity and Geospatial Spread of Trends on Twitter: A Middle Eastern Case Study

Albishry, N., Crick, T., Fagade, T. & Tryfonas, T., Sep 2018, Proceedings of the 10th International Conference on Computational Collective Intelligence (ICCCI 2018): 5-7 September 2018 - Bristol, UK. Springer, Vol. 11055. p. 167-177 11 p. 63. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
98 Downloads (Pure)

Public policy and skills for smart cities: The UK outlook

Tryfonas, T. & Crick, T., 26 Jun 2018, PETRA '18: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference. Association for Computing Machinery (ACM), p. 116-117 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
8 Citations (Scopus)
181 Downloads (Pure)

Reducing Communication Channels in MPC

Keller, M., Rotaru, D., Smart, N. & Wood, T., Sep 2018, Security and Cryptography for Networks - SCN 2018. Catalano, D. & de Prisco, R. (eds.). Springer Berlin Heidelberg, p. 181-199 19 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)

Safe cryptography for all: towards visual metaphor driven cryptography building blocks

van der Linden, D., Rashid, A., Williams, E. J. & Warinschi, B., 1 Oct 2018, 2018 IEEE/ACM 1st International Workshop on Security Awareness from Design to Deployment (SEAD 2018): Proceedings of a meeting held 27 May - 3 June 2018, Gothenburg, Sweden.. Association for Computing Machinery (ACM), p. 41-44 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
41 Downloads (Pure)

Sensor-based smart hot-desking for improvement of office well-being

Berelson, K., Simini, F., Tryfonas, T. & Cooper, P., 3 Oct 2018, DTUC’18: Digital Tools & Uses Congress, Paris 3-5 October 2018. Association for Computing Machinery (ACM), 9 p. 10. (ACM International Conference Proceedings Series).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
420 Downloads (Pure)

SPHERE deployment manager: A tool for deploying IoT sensor networks at large scale

Fafoutis, X., Elsts, A., Oikonomou, G. & Piechocki, R., 30 Aug 2018, Ad-hoc, Mobile, and Wireless Networks: 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings. Springer, Cham, p. 307-318 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11104 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
113 Downloads (Pure)

TSCH and 6TiSCH for Contiki: Challenges, Design and Evaluation

Duquennoy, S., Elsts, A., Al Nahas, B. & Oikonomou, G., Apr 2018, 2017 13th International Conference on Distributed Computing in Sensor Systems (DCOSS 2017): Proceedings of a meeting held 5-7 June 2017, Ottawa, Ontario, Canada. Institute of Electrical and Electronics Engineers (IEEE), p. 11-18 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
37 Citations (Scopus)
396 Downloads (Pure)

Untagging Tor: A Formal Treatment of Onion Encryption

Degabriele, J. P. & Stam, M., 2 Jun 2018, Advances in Cryptology - EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part I. Buus Nielsen, J. & Rijmen, V. (eds.). Springer, p. 259-293 35 p. (Lecture Notes in Computer Science; vol. 10820).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2017

Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection

Orrù, M., Orsini, E. & Scholl, P., 1 Jan 2017, Topics in Cryptology - CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017. Springer-Verlag Berlin, p. 381-396 16 p. (Lecture Notes in Computer Science; vol. 10159).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
15 Citations (Scopus)

Adaptive Proofs Have Straightline Extractors (in the Random Oracle Model)

Bernhard, D., Nguyen, N. K. & Warinschi, B., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, p. 336-353 18 p. (Lecture Notes in Computer Science; vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
1 Citation (Scopus)
211 Downloads (Pure)

Authenticated Encryption in the Face of Protocol and Side Channel Leakage

Barwell, G., Martin, D., Oswald, E. & Stam, M., 30 Nov 2017, Advances in Cryptology - ASIACRYPT 2017: 23rd International Conference on the Theory and Application of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Springer, p. 693-723 31 p. (Lecture Notes in Computer Science; vol. 10624).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
16 Citations (Scopus)

Categorising and Comparing Cluster-Based DPA Distinguishers

Zhou, X., Whitnall, C., Oswald, E., Sun, D. & Wang, Z., 23 Dec 2017, Selected Areas in Cryptography – SAC 2017: 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Springer, Cham, p. 442-458 17 p. (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
1 Citation (Scopus)

Cryptographic randomness on a CC2538: a case study

Yan, Y., Oswald, E. & Tryfonas, T., Mar 2017, 8th IEEE International Workshop on Information Forensics and Security, WIFS 2016: Proceedings of a meeting held 4-7 December 2016, Abu Dhabi, United Arab Emirates.. Institute of Electrical and Electronics Engineers (IEEE), 6 p. 7823912. (International Workshops on Information Forensics and Security).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Evaluating approaches for the next generation of difficulty and complexity assessment tools

Beale, D., Tryfonas, T. & Young, M., 31 Jul 2017, 2017 IEEE Technology and Engineering Management Society Conference, TEMSCON 2017. Institute of Electrical and Electronics Engineers (IEEE), p. 227-233 7 p. 7998381

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

3 Citations (Scopus)

Faster Homomorphic Evaluation of Discrete Fourier Transforms

Costache, A., Smart, N. & Vivek, S., 23 Dec 2017, Financial Cryptography and Data Security: 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers. Springer, Cham, p. 517-529 13 p. (Lecture Notes in Computer Science; vol. 10322).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
4 Citations (Scopus)

Faster secure multi-party computation of AES and DES using lookup tables

Keller, M., Orsini, E., Rotaru, D., Scholl, P., Soria-Vazquez, E. & Vivek, S., 26 Jun 2017, Applied Cryptography and Network Security: 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings. Springer, Cham, p. 229-249 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
12 Citations (Scopus)

Fixed-point arithmetic in SHE schemes

Costache, A., Smart, N., Vivek, S. & Waller, A., 20 Oct 2017, Selected Areas in Cryptography - SAC 2016: 23rd International Conference, St. John’s, NL, Canada, August 10-12, Revised Selected Papers. Springer, p. 401-422 22 p. (Lecture Notes in Computer Science; vol. 10532).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
10 Citations (Scopus)

Generic Forward-Secure Key Agreement Without Signatures

Delpech de Saint Guilhem, C., Smart, N. & Warinschi, B., 20 Sep 2017, Information Security - ISC 2017: 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24 2017. Proceedings. Springer, Cham, p. 114-133 20 p. (Lecture Notes in Computer Science; vol. 10599).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)

Link quality and path based clustering in IEEE 802.15.4-2015 TSCH networks

Mavromatis, A., Papadopoulos, G., Fafoutis, X., Goulianos, A., Oikonomou, G., Chatzimisios, P. & Tryfonas, T., 4 Sep 2017, 2017 IEEE Symposium on Computers and Communications (ISCC). Institute of Electrical and Electronics Engineers (IEEE)

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
3 Citations (Scopus)
332 Downloads (Pure)

Machine-Checked Proofs of Privacy for Electronic Voting Protocols

Cortier, V., Dragan, C. C., Dupressoir, F., Schmidt, B., Strub, P-Y. & Warinschi, B., Jul 2017, 2017 IEEE 38th IEEE Symposium on Security and Privacy (SP 2017): Proceedings of a meeting held 22-26 May 2017, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 993-1008 17 p.

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
7 Citations (Scopus)
410 Downloads (Pure)

Malicious Insider Threat Detection: A Conceptual Model

Fagade, T. & Tryfonas, T., 1 Jun 2017, Security and Protection of Information 2017 (SPI). Brno, Czech Republic: University of Defence, (Security and Protection of Information).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
File
103 Downloads (Pure)

Multi-key Authenticated Encryption with Corruptions: Reductions Are Lossy

Jager, T., Stam, M., Stanley-Oakes, R. & Warinschi, B., 5 Nov 2017, Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part I. Springer, p. 409-441 33 p. (Lecture Notes in Computer Science; vol. 10677).

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

Open Access
2 Citations (Scopus)