Home > Research > Browse

Results for security

Publications & Outputs

  1. Surveillance and Security: Protecting Electricity Utilities and other Critical Infrastructures

    Gouglidis, A., Green, B., Hutchison, D., Alshawish, A. & de Meer, H. 31/07/2018 In : Energy Informatics.

    Research output: Contribution to journalJournal article

  2. Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X. 07/2018 In : Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to journalJournal article

  3. Insurgency in the Indian Northeast: Student Voices from Kolkata

    Mukherjee, K. 06/2018 In : International Journal on Minority and Group Rights. 25, 2, p. 261-282 22 p.

    Research output: Contribution to journalJournal article

  4. Developer Cyber Essentials: Trialling Interventions to Improve Development Security

    Weir, C. A. F., Blair, L., Noble, J., Becker, I. & Sasse, A. 24/05/2018 Lancaster: Lancaster University. 8 p.

    Research output: Book/Report/ProceedingsOther report

  5. Assessing security relations in the Asia Pacific: the cases of China, India and Pakistan

    Mukherjee, K. 03/2018 In : Canadian Foreign Policy Journal. 24, 1, p. 56-73 18 p.

    Research output: Contribution to journalJournal article

  6. Ali Smith's necessary-contingent, or navigating the global

    Evans, J. C. 2018 In : Textual Practice. 32, 4, p. 629-648 20 p.

    Research output: Contribution to journalJournal article

  7. Ernst Jünger, total mobilisation and the work of war

    Costea, B. & Amiridis, K. 07/2017 In : Organization. 24, 4, p. 475-490 16 p.

    Research output: Contribution to journalJournal article

  8. Emerging trust implications of data-rich systems

    Knowles, B. H. 25/10/2016 In : IEEE Pervasive Computing. 15, 4, p. 76-84 9 p.

    Research output: Contribution to journalJournal article

  9. MobiSys 2016

    Mikusz, M., Clinch, S. E. & Sen, S. 25/10/2016 In : IEEE Pervasive Computing. 15, 4, p. 85-88 4 p.

    Research output: Contribution to journalJournal article

  10. Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T. 10/2016 In : Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to journalJournal article

  11. D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M. 27/06/2016 Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), )

    Research output: Contribution in Book/Report/ProceedingsConference contribution

More results »

??????

  1. Future of International Law and Cyber Warfare (Funded by SECURITY FUTURES)

    Chatterjee, B. B., Summers, J., Lacy, M. & Prince, D.

    17/07/1319/07/13

    Project: Non-funded ProjectResearch