Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

101 - 110 out of 510Page size: 10
  1. 2016
  2. Published

    Mass surveillance in cyberspace and the lost art of keeping a secret: Policy Lessons for Government After the Snowden Leaks

    Tryfonas, T., Carter, M., Crick, T. & Andriotis, P., 21 Jun 2016, Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Tryfonas, T. (ed.). p. 174-185 12 p. (Lecture Notes in Computer Science; vol. 9750).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Security by Compliance? A Study of Insider Threat Implications for Nigerian Banks

    Fagade, T. H. & Tryfonas, T., 21 Jun 2016, Human Aspects of Information Security, Privacy, and Trust: 4th International Conference, HAS 2016, Held as Part of HCI International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings. Tryfonas, T. (ed.). p. 128-139 12 p. (Lecture Notes in Computer Science; vol. 9750).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Published

    Foundations of Hardware-Based Attested Computation and Application to SGX

    Barbosa, M., Portela, B., Scerri, G. & Warinschi, B., Jun 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P 2016): Proceedings of a meeting held 21-24 March 2016, Saarbrucken, Germany. Institute of Electrical and Electronics Engineers (IEEE), p. 245-260 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Indifferentiability of Confusion-Diffusion Networks

    Dodis, Y., Stam, M., Steinberger, J. & Liu, T., 28 Apr 2016, Advances in Cryptology - EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II. Fischlin, M. & Coron, J-S. (eds.). Springer, p. 679-704 26 p. (Lecture Notes in Computer Science; vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  6. Published

    The Internet of Things: A Security Point of View

    Li, S., Tryfonas, T. & Li, H., 2 Apr 2016, In : Internet Research. 26, 2, p. 337-359 23 p.

    Research output: Contribution to journalSpecial issue

  7. Published

    A Study on Usability and Security Features of the Android Pattern Lock Screen

    Andriotis, P., Oikonomou, G., Mylonas, A. & Tryfonas, T., 1 Mar 2016, In : Information and Computer Security. 24, 1, p. 53-72

    Research output: Contribution to journalArticle

  8. Published

    Characterising and Comparing the Energy Consumption of Side Channel Attack Countermeasures and Lightweight Cryptography on Embedded Devices

    McCann, D. A. J., Eder, K. I. & Oswald, M. E., Mar 2016, Proceedings of 2015 International Workshop on Secure Internet of Things (SIoT): Proceedings of a meeting held 21-25 September 2015 at Vienna, Austria. Institute of Electrical and Electronics Engineers (IEEE), p. 65-71 7 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Which Ring Based Somewhat Homomorphic Encryption Scheme is Best?

    Costache, A. & Smart, N. P., 29 Feb 2016, Topics in Cryptology - CT-RSA 2016: The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Springer, p. 325-340 16 p. (Lecture Notes in Computer Science; vol. 9610).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  10. Published

    On the Hardness of Proving CCA-Security of Signed ElGamal

    Bernhard, D., Fischlin, M. & Warinschi, B., 18 Feb 2016, Public-Key Cryptography – PKC 2016: 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I. Cheng, C-M., Chung, K-M., Persiano, G. & Yang, B-Y. (eds.). Springer, p. 47-69 23 p. (Lecture Notes in Computer Science; vol. 9614).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Unified Approach to MPC with Preprocessing Using OT

    Frederiksen, T. K., Keller, M. K. S., Orsini, E. A. & Scholl, P., 8 Jan 2016, Advances in Cryptology -- Asiacrypt 2015: 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 -- December 3, 2015, Proceedings, Part I. Iwata, T. & Cheon, J. H. (eds.). Auckland, New Zealand: Springer Berlin Heidelberg, p. 711-735 25 p. (Lecture Notes in Computer Science; vol. 9452).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...7 8 9 10 11 12 13 14 ...51 Next