Home > Research > Browse

Results for Cryptography

Publications & Outputs

  1. Understanding Security Requirements for Industrial Control System Supply Chains

    Hou, Y., Such, J. & Rashid, A., 5/09/2019, 2019 IEEE/ACM 5th International Workshop on Software Engineering for Smart Cyber-Physical Systems (SEsCPS). IEEE, p. 50-53 4 p. 8823698

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  2. Impersonation detection in line-of-sight underwater acoustic sensor networks

    Aman, W., Rahman, M. M. U., Qadir, J., Pervaiz, H. & Ni, Q., 6/08/2018, In : IEEE Access. 6, p. 44459-44472 14 p.

    Research output: Contribution to journalJournal article

  3. Quantitative Reasoning about Cloud Security Using Service Level Agreements

    Luna, J., Taha, A., Trapero, R. & Suri, N., 1/07/2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 457-471 15 p.

    Research output: Contribution to journalJournal article

  4. A Framework for Ranking Cloud Security Services

    Taha, A., Trapero, R., Luna, J., Suri, N., X., L. (ed.) & U., B. (ed.), 25/06/2017, 2017 IEEE International Conference on Services Computing (SCC). IEEE, p. 322-329 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  5. A privacy preserving approach to energy theft detection in smart grids

    Richardson, C., Race, N. & Smith, P., 1/09/2016, 2016 IEEE International Smart Cities Conference (ISC2). IEEE, p. 1-4 4 p. (Smart Cities Conference (ISC2), 2016 IEEE International).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  6. Quantitative assessment of Cloud Security Level Agreements: A case study

    Luna, J., Ghani, H., Vateva, T. & Suri, N., 2012, Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, 2012, Rome, Italy. SciTePress, p. 64-73 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  7. A security metrics framework for the Cloud

    Luna, J., Ghani, H., Germanus, D. & Suri, N., 18/07/2011, Proceedings of the International Conference on Security and Cryptography 2011. IEEE, p. 245-250 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  8. Efficient robust storage using secret tokens

    Dobre, D., Majuntke, M., Serafini, M. & Suri, N., 2009, Stabilization, Safety, and Security of Distributed Systems: 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings. Springer, Vol. 5873 LNCS. p. 269-283 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  9. The Lady Vanishes: Gender, Law and the (Virtual) Body

    Chatterjee, B. B., 12/2008, In : Australian Feminist Law Journal. 29, n/a, p. 13-30 18 p.

    Research output: Contribution to journalJournal article