Skip to content

Cryptography and Information Security

Organisational unit: Research Grouping

91 - 100 out of 510Page size: 10
  1. 2016
  2. Published

    An Intelligent Hot-Desking Model Based on Occupancy Sensor Data and Its Potential for Social Impact

    Maraslis, K., Cooper, P., Tryfonas, T. & Oikonomou, G., 4 Sep 2016, Transactions on Large-Scale Data- and Knowledge-Centered Systems XXVII: Special Issue on Big Data for Complex Urban Systems. Springer-Verlag Berlin, Vol. 9860 LNCS. p. 142-158 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9860 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Published

    Implementation of a leakage-resilient ElGamal key encapsulation mechanism

    Galindo, D., Großschädl, J., Liu, Z., Vadnala, P. K. & Vivek, S., Sep 2016, In : Journal of Cryptographic Engineering. 6, 3, p. 229-238 10 p.

    Research output: Contribution to journalArticle

  4. Published

    Provably-Secure Remote Memory Attestation for Heap Overflow Protection

    Boldyreva, A., Kim, T., Lipton, R. & Warinschi, B., 30 Aug 2016, Security and Cryptography for Networks: 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings. Zikas, V. & De Prisco, R. (eds.). Springer, (Lecture Notes in Computer Science).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  5. Published

    Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations

    Andriotis, P., Oikonomou, G., Tryfonas, T. & Li, S., 16 Aug 2016, In : IEEE Transactions on Cybernetics. 46, 9, p. 1974-1985

    Research output: Contribution to journalArticle

  6. Published

    Reducing the Number of Non-linear Multiplications in Masking Schemes

    Pulkus, J. & Vivek, S., 4 Aug 2016, Cryptographic Hardware and Embedded Systems – CHES 2016: 18th International Conference, Santa Barbara, CA, USA, August 17-19, 2016, Proceedings. Gierlichs, B. & Poschmann, A. Y. (eds.). Springer, p. 479-497 19 p. (Lecture Notes in Computer Science; vol. 9813).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  7. Published

    Analysis of Key Wrapping APIs: Generic Policies, Computational Security

    Scerri, G. & Stanley-Oakes, R. W., Aug 2016, 2016 IEEE 28th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 281-295 15 p. (Proceedings of the IEEE Computer Security Foundations Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  8. Published

    Key Confirmation in Key Exchange Protocols: Formal Definitions and Implications for TLS 1.3

    Fischlin, M., Günther, F., Schmidt, B. & Warinschi, B., Aug 2016, 2016 IEEE Symposium on Security and Privacy (S&P 2016): Proceedings of a meeting held 22-26 May 2016, San Jose, California, USA. Institute of Electrical and Electronics Engineers (IEEE), p. 452-469 18 p. (2016 IEEE Symposium on Security and Privacy (SP)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  9. Published

    Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network

    Li, S., Tryfonas, T., Russell, G. & Andriotis, P., Aug 2016, In : IEEE Transactions on Cybernetics. 46, 8, p. 1749-1759 11 p.

    Research output: Contribution to journalArticle

  10. Published

    Secure Software Licensing: Models, Constructions, and Proofs

    Costea, S. & Warinschi, B., Aug 2016, 2016 IEEE 29th Computer Security Foundations Symposium (CSF 2016): Proceedings of a meeting held 27 June - 1 July 2016, Lisbon, Portugal. Institute of Electrical and Electronics Engineers (IEEE), p. 31-44 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  11. Published

    A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case

    Shrimpton, T., Stam, M. & Warinschi, B., 21 Jul 2016, Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I. Springer, p. 277-307 31 p. (Lecture Notes in Computer Science (LNCS); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Previous 1...6 7 8 9 10 11 12 13 ...51 Next