Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. Published

    A Generalized Methodology for Data Analysis

    Angelov, P. P., Gu, X. & Principe, J., 10/2018, In: IEEE Transactions on Cybernetics. 48, 10, p. 2981-2993 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  2. Unpublished

    A generic active service deployment protocol

    Sifalakis, M., Schmid, S., Hutchison, D. & Chart, T., 05/2003, (Unpublished)

    Research output: Other contribution

  3. Published

    A Generic Hand-Over Framework for 4G Networks

    Roedig, U. & Sreenan, C. J., 10/2006.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  4. Published

    A geospatial framework to support integrated biogeochemical modelling in the United Kingdom

    Greene, S., Johnes, P. J., Bloomfield, J. P., Reaney, S. M., Lawley, R. S., Elkhatib, Y., Freer, J., Odoni, N., Macleod, C. J. A. & Percy, B. J., 06/2015, In: Environmental Modelling and Software. 68, p. 219-232 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  5. Published

    A group-oriented secure multiagent platform

    Such, J. M., Alberola, J. M., Espinosa, A. & Garcia-Fornes, A., 10/2011, In: Software: Practice and Experience. 41, 11, p. 1289-1302 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  6. Published

    A Hierarchical P2PSIP Architecture to Support Skype-like Services

    Martinez-Yelmo, I., Guerrero, C., Cuevas, R. & Mauthe, A., 2009, PDP '09: Proceedings of the 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. Washington, DC, USA: IEEE Computer Society, p. 316-322 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    A hopping code for MMFSK in a power-line channel

    Adebisi, B., Ali, S. & Honary, B., 07/2009, In: Journal of Communications. 4, 6, p. 429-436 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In: IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  9. Published

    A Key Exchange Protocol for Wireless Ad-hoc Networks Using ECC

    Catterall, N., Katsaros, I. & Honary, B., 12/2004, First International Symposium on Broadband Communications. Harrogate, p. 30

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A Lease Based Hybrid Design Pattern for Proper-Temporal-Embedding of Wireless CPS Interlocking

    Tan, F., Wang, Y., Wang, Q., Bu, L. & Suri, N., 1/10/2015, In: IEEE Transactions on Parallel and Distributed Systems. 26, 10, p. 2630-2642 13 p., 6898840.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

Previous 1...5 6 7 8 9 10 11 12 ...255 Next

Back to top