Home > Research > Browse

Results for security

Publications & Outputs

  1. Emerging trust implications of data-rich systems

    Knowles, B. H. 25/10/2016 In : IEEE Pervasive Computing. 15, 4, p. 76-84 9 p.

    Research output: Contribution to journalJournal article

  2. MobiSys 2016

    Mikusz, M., Clinch, S. E. & Sen, S. 25/10/2016 In : IEEE Pervasive Computing. 15, 4, p. 85-88 4 p.

    Research output: Contribution to journalJournal article

  3. Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T. 10/2016 In : Security and Communication Networks. 9, 15, p. 2656-2673 18 p.

    Research output: Contribution to journalJournal article

  4. D-DEMOS: a distributed, end-to-end verifiable, internet voting system

    Chondros, N., Zhang, B., Zacharias, T., Diamantopoulos, P., Maneas, S., Patsonakis, C., Delis, A., Kiayias, A. & Roussopoulos, M. 27/06/2016 Proceedings of the 36th IEEE International Conference on Distributed Computing Systems (ICDCS 2016) . IEEE, p. 711-720 10 p. (2016 IEEE 36th International Conference on Distributed Computing Systems (ICDCS), )

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  5. Risks of citizenship and fault lines of survival

    Petryna, A. & Follis, K. 10/2015 In : Annual Review of Anthropology. 44, p. 401-417 17 p.

    Research output: Contribution to journalJournal article

  6. European identities and the revival of nationalism in the European Union: a discourse-historical approach

    Wodak, R. & Boukala, S. 2015 In : Journal of Language and Politics. 14, 1, p. 87-109 23 p.

    Research output: Contribution to journalJournal article

  7. The robustness of hollow CAPTCHAs

    Gao, H., Wang, W., Qi, J., Wang, X., Liu, X. & Yan, J. 11/2013 CCS '13 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. New York: ACM, p. 1075-1086 12 p.

    Research output: Contribution in Book/Report/ProceedingsPaper

  8. Privacy, security, liberty: informing the design of emergency management information systems

    Buscher, M., Wood, L. & Perng, S-Y. 12/05/2013 10th International Conference on Information Systems for Crisis Response and Management. Comes, T., Fiedrich, F., Fortier, S., Geldermann, J. & Müller, T. (eds.). Karlsruhe: KIT

    Research output: Contribution in Book/Report/ProceedingsPaper

  9. Is Hindu nationalism a threat to religious minorities in Eastern India?

    Mukherjee, K. 2013 In : The Round Table : The Commonwealth Journal of International Affairs. 102, 5, p. 445-457 13 p.

    Research output: Contribution to journalJournal article

  10. A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A. 10/2011 In : Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to journalJournal article

  11. Securing by design

    Weber, C. & Lacy, M. 07/2011 In : Review of International Studies. 37, 3, p. 1021-1043 23 p.

    Research output: Contribution to journalJournal article

More results »

Projects