Home > Research > Security Lancaster > Publications & Outputs
View graph of relations

Security Lancaster

  1. 2014
  2. Published

    Trustworthy by design

    Knowles, B., Harding, M., Blair, L., Davies, N., Hannon, J., Rouncefield, M. & Walden, J., 2014, CSCW '14 Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. New York: ACM, p. 1060-1071 12 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  3. Published

    User-centric security assessment of software configurations: A case study

    Ghani, H., Luna Garcia, J., Petkov, I. & Suri, N., 2014, Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings. Springer-Verlag, Vol. 8364 LNCS. p. 196-212 17 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    Visceral emotions, within-community communication, and (ill-judged) endorsement of financial propositions

    Kaivanto, K., 2014, Lancaster: Lancaster University, Department of Economics, (Economics Working Paper Series; vol. 2014, no. 25).

    Research output: Working paper

  5. Published

    Wakefield excitation via metasurface-loaded waveguide

    Sharples, E. & Letizia, R., 2014, Proceedings of IPAC2014, Dresden, Germany. Geneva: JACoW, p. 1437-1439 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. 2013
  7. Published

    Chinese politics and international relations: innovation and invention

    Horsburgh, N. (Editor), Nordin, A. (Editor) & Breslin, S. (Editor), 19/12/2013, London: Routledge. 218 p.

    Research output: Book/Report/ProceedingsAnthology

  8. Published

    Evaluating dual-view perceptual issues in handheld augmented reality: device vs. user perspective rendering

    Čopič Pucihar, K., Coulton, P. & Alexander, J., 9/12/2013, ICMI '13 Proceedings of the 15th ACM on International conference on multimodal interaction. New York: ACM, p. 381-388 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Neighborhood watch: on network coding throughput and key sharing

    Strohmeier, M., Martinovic, I., Roedig, U., Defrawy, K. E. & Schmitt, J., 9/12/2013, Global Communications Conference (GLOBECOM), 2013 IEEE . IEEE Xplore, p. 849-854 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    Eye Drop: an interaction concept for gaze-supported point-to-point content transfer

    Turner, J., Bulling, A., Alexander, J. & Gellersen, H., 2/12/2013, MUM '13 Proceedings of the 12th International Conference on Mobile and Ubiquitous Multimedia. New York: ACM, 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  11. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  12. Published

    A use-based approach for enhancing UCON

    Grompanopoulos, C., Gouglidis, A. & Mavridis, I., 1/12/2013, Security and Trust Management. Jøsang, A., Samarati, P. & Petrocchi, M. (eds.). Berlin: Springer Verlag, p. 81-96 16 p. (Lecture Notes in Computer Science ; vol. 7783 ).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top