12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

97%

97% of Lancaster students go into work or further study within six months of graduating

Home > Research > Browse

Results for security

Researchers

  1. Dr Mark Lacy

Publications & Outputs

  1. Fusion: coalesced confidential storage and communication framework for the IoT

    Bagci, I. E., Raza, S., Roedig, U. & Voigt, T. 2015 In : Security and Communication Networks.

    Research output: Contribution to journalJournal article

  2. Privacy, security, liberty: informing the design of emergency management information systems

    Buscher, M., Wood, L. & Perng, S-Y. 12/05/2013 10th International Conference on Information Systems for Crisis Response and Management. Comes, T., Fiedrich, F., Fortier, S., Geldermann, J. & Müller, T. (eds.). Karlsruhe: KIT

    Research output: Contribution in Book/Report/ProceedingsPaper

  3. Is Hindu nationalism a threat to religious minorities in Eastern India?

    Mukherjee, K. 2013 In : The Round Table : The Commonwealth Journal of International Affairs. 102, 5, p. 445-457 13 p.

    Research output: Contribution to journalJournal article

  4. A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A. 10/2011 In : Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to journalJournal article

  5. Securing by design

    Weber, C. & Lacy, M. 07/2011 In : Review of International Studies. 37, 3, p. 1021-1043 23 p.

    Research output: Contribution to journalJournal article

  6. High-Speed Narrowband PLC in Smart Grid Landscape – State-of-the-art

    Haidine, A., Adebisi, B., Treytl, A., Pille, H., Honary, B. & Portnoy, A. 04/2011 Power Line Communications and Its Applications (ISPLC), 2011 IEEE International Symposium on. IEEE, p. 468-473 6 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  7. Risky individuals and the politics of genetic research into aggressiveness and violence.

    Pieri, E. & Levitt, M. 11/2008 In : Bioethics. 22, 9, p. 509-518 10 p.

    Research output: Contribution to journalJournal article

  8. Designer Security: Control Society and MoMA's SAFE: Design Takes on Risk

    Lacy, M. 04/2008 In : Security Dialogue. 39, 2-3, p. 333-357 25 p.

    Research output: Contribution to journalJournal article

  9. Securing Aspect Composition

    Camilleri, A., Blair, L. & Coulson, G. 2008 Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM, p. 278-279 2 p.

    Research output: Contribution in Book/Report/ProceedingsConference contribution

  10. From war to war: 'Lord Of The Flies' as sociology of spite

    Diken, B. & Laustsen, C. B. 2006 In : Alternatives. 31, 4, p. 431-452 22 p.

    Research output: Contribution to journalJournal article

  11. Improvements for the IPv6 Access Network Protection Protocols in Wireless Environments

    Katsaros, I. & Honary, B. 11/2005 3G and Beyond, 2005 6th IEE International Conference on. London : IEEE, p. 97-100 4 p.

    Research output: Contribution in Book/Report/ProceedingsPaper

More results »

Projects