Home > Research > Publications & Outputs
  1. Published

    Sectarianism and Boundaries: Much More to Explore

    Menshawy, M., 7/11/2022

    Research output: Exhibits, objects and web-based outputsBlog

  2. Published

    Sectarianism and Covid19 in Iraq

    Mabon, S. & Wastnidge, E., 16/02/2024, SEPAD .

    Research output: Book/Report/ProceedingsOther report

  3. Published

    Sectarianism and Covid19 in Lebanon

    Mabon, S. & Wastnidge, E., 16/02/2024, SEPAD .

    Research output: Book/Report/ProceedingsOther report

  4. Published

    Sectarianism in Disguise: De-Sectarianisation in Syria and Kuwait

    Menshawy, M., 19/05/2022, SEPAD Reports .

    Research output: Contribution to specialist publicationArticle

  5. Published

    Sectarianism, De-Sectarianisation and Regional Politics in the Middle East: Protest and Proxies across States and Borders

    Nasirzadeh, S. (Editor), Ghazal, E. (Editor), Kumarasamy, A. M. (Editor), Alrefai, E. (Editor) & Mabon, S. (Editor), 25/01/2024, London: I. B. Tauris. 256 p.

    Research output: Book/Report/ProceedingsScholarly edition

  6. Published

    Sectarianization and Ontological Security in the Syrian Conflict

    Aldoughli, R. B., 19/06/2021

    Research output: Exhibits, objects and web-based outputsBlogpeer-review

  7. Published

    Sectarianizing Faith: Safeguarding Authoritarianism in Syria

    Aldoughli, R., 29/03/2021

    Research output: Exhibits, objects and web-based outputsBlogpeer-review

  8. Unpublished

    Section 17 Child in Need: Contemporary practice in an area of deprivation

    Cooper, J., expected on 29/02/2028, (Unpublished) Lancaster University. 325 p.

    Research output: ThesisDoctoral Thesis

  9. Published

    Section 212 of the Housing Act 2004: a private solution to a public problem

    Mayfield, B., 2014.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

  10. Published

    Section 41 Applications.

    Kibble, N., 2008, Research Report for the Judicial Studies Board, 45 p.

    Research output: Working paper

  11. Published

    Section 41 Youth Justice and Criminal Evidence Act 1999: fundamentally flawed or fair and balanced?

    Kibble, N., 8/09/2004, In: Archbold News. Issue, p. 6-9 4 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Section 5.2.1 Ethical, legal and social issues in preparedness and response planning

    Peters, K., Buscher, M., Fearnley, C., Helsloot, I., Kockerols, P. & Twigg, J., 2017, Science for Disaster Risk Management 2017: Knowing better and losing less. Poljanšek, K., Marin Ferrer, M., De Groeve, T. & Clark, I. (eds.). Brussels: Publications Office of the European Union, p. 465-469 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  13. Published

    Sectoral Fiscal Multipliers and Technology in Open Economy

    Cardi, O. & Restout, R., 28/05/2021, Lancaster: Lancaster University, Department of Economics, (Economics Working Papers Series; vol. 2021/005).

    Research output: Working paper

  14. Published

    Sectoral Fiscal Multipliers and Technology in Open Economy

    Cardi, O. & Restout, R., 30/09/2023, In: Journal of International Economics. 144, 103789.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  15. Published

    Sector-Based Entrepreneurial Capabilities and the Promise of Sector Studies in Entrepreneurship

    De Massis, A. V., Kotlar, J., Wright, M. & Kellermanns, F. W., 01/2018, In: Entrepreneurship Theory and Practice. 42, 1, p. 3-23 21 p.

    Research output: Contribution to Journal/MagazineEditorialpeer-review

  16. Published

    Sector-shaped fast organic liquid scintillation detectors based neutron coincidence counter

    Gamage, K., Joyce, M. & Cave, F., 2014, In: Applied Radiation and Isotopes. 92, p. 1-5

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    Secular determinants of random unitary matrices.

    Haake, F., Kus, M., Sommers, H.-J., Schomerus, H. & Zyczkowski, K., 1996, In: Journal of Physics A: Mathematical and General . 29, p. 3641

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  18. Published

    Secular privilege, religious disadvantage.

    Woodhead, L., 03/2008, In: British Journal of Sociology. 59, 1, p. 53-58 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    Secular values and the location of religion: A spatial analysis of an English medical centre

    Knott, K. & Franks, M., 2007, In: Health and Place. 13, 1, p. 224-237 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  20. Published

    Secularisation R.I.P? Nonsense! the ‘rush hour away from the gods’ and the decline of religion in contemporary Japan

    Reader, I., 2012, In: Journal of Religion in Japan. 1, 1, p. 7-36 30 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Secularism as a field of class struggle: State, religion, and class relations in Turkey

    Uysal, G., 2019, In: Journal of Historical Sociology.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  22. Published

    Secularism, history and violence in India

    Sutton, D., 2014, Confronting secularism in Europe and India . Black, B., Hyman, G. & Smith, G. (eds.). London: Bloomsbury

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)

  23. Published

    Secularly powered outflows from AGN: the dominance of non-merger driven supermassive black hole growth

    Smethurst, R. J., Simmons, B. D., Lintott, C. J. & Shanahan, J., 1/11/2019, In: Monthly Notices of the Royal Astronomical Society. 489, 3, p. 4016-4031 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  24. Published

    Secure accommodation in Scotland : its role and relationship with 'alternative' services.

    McIvor, G., Barclay, A., Hill, M., Hunter, L., Kendrick, A., Malloch, M. & Walker, M., 2006, Edinburgh: Scottish Executive Social Research, 121 p.

    Research output: Working paper

  25. Published

    Secure and privacy-aware cloud-assisted video reporting service in 5G enabled vehicular networks

    Hashem Eiza, M., Ni, Q. & Shi, Q., 10/2016, In: IEEE Transactions on Vehicular Technology. 65, 10, p. 7868-7881 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  26. Published

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Hashem-Eiza, M., Shi, Q., Marnerides, A. & Owens, T., 22/05/2016, 2016 IEEE International Conference on Communications (ICC). IEEE, 6 p. 7510934

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  27. Published

    Secure and Privacy-preserving Data Sharing in the Cloud based on Lossless Image Coding

    Khelifi, F., Brahimi, T., Han, J. & Li, X., 07/2018, In: Signal Processing. 148, p. 91-101 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  28. Published

    Secure and robust multi-constrained QoS aware routing algorithm for VANETs

    Hashem Eiza, M., Owens, T. & Ni, Q., 01/2016, In: IEEE Transactions on Dependable and Secure Computing. 13, 1, p. 32-45 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  29. Published

    Secure Cloud Computing Algorithms for Discrete Constrained Potential Games

    Lu, Y. & Zhu, M., 11/09/2015, IFAC Workshop on Distributed Estimation and Control in Networked Systems. 22 ed. Elsevier, Vol. 48. p. 180-185 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  30. Published

    Secure communication for the Internet of Things - a comparison of link-layer security and IPsec for 6LoWPAN

    Raza, S., Duquennoy, S., Höglund, J., Roedig, U. & Voigt, T., 12/2014, In: Security and Communication Networks. 7, 12, p. 2654-2668 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  31. Published

    Secure communication in cooperative network with wireless information and power transfer

    Hu, S. & Ding, Z., 12/2015, In: Signal Processing. 9, 9, p. 663-669 7 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  32. Published

    Secure Communication Protocol for Mobile Multimedia Applications

    Komninos, N., Honary, B. & Darnell, M., 11/2000, 3rd International Symposium on Wireless Personal Multimedia Communications (WPMC 2000) . Bangkok, p. 1011–1014 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  33. Published

    Secure crowd-sensing protocol for fog-based vehicular cloud

    Nkenyereye, L., Islam, S. M. R., Bilal, M., Abdullah-Al-Wadud, M., Alamri, A. & Nayyar, A., 07/2021, In: Future Generation Computer Systems. 120, p. 61-75 15 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  34. Published

    Secure Distribution of Protected Content in Information-Centric Networking

    Bilal, M. & Pack, S., 06/2020, In: IEEE Systems Journal. 14, 2, p. 1921-1932 12 p., 8798748.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  35. Published

    Secure facial recognition in the encrypted domain using a local ternary pattern approach

    Khan, F. A., Bouridane, A., Boussakta, S., Jiang, R. & Almaadeed, S., 30/06/2021, In: Journal of Information Security and Applications. 59

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  36. Published

    Secure File Transmission over Multi-User Networking Environments

    Samarakoon, M. I., Honary, B. & Sweeney, P., 1997, Proceedings of the Fourth International Symposium on Communications Theory and Applications. Lancaster: HW Communications Limited, p. 121-127 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  37. Published

    Secure local aquatic food systems in the face of declining coral reefs

    Hicks, C. C., Graham, N. A. J., Maire, E. & Robinson, J. P. W., 17/09/2021, In: One Earth. 4, 9, p. 1214-1216 3 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  38. Published

    Secure messaging and real time media streaming using enterprise PKI and ECC based certificates

    Ashraf, S., Shirazi, S. N., Nadeem, M. A. & Ikram, N., 2010, Computational Technologies in Electrical and Electronics Engineering (SIBIRCON), 2010 IEEE Region 8 International Conference on. IEEE, p. 159-161 3 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  39. Published

    Secure MISO-NOMA Transmission With Artificial Noise

    Lv, L., Ding, Z., Ni, Q. & Chen, J., 07/2018, In: IEEE Transactions on Vehicular Technology. 67, 7, p. 6700-6705 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  40. Published

    Secure multicast communications with private jammers

    Cumanan, K., Ding, Z., Xu, M. & Poor, H. V., 3/07/2016, 2016 IEEE 17th International Workshop on Processing Advances in Wireless Communications (SPAWC). IEEE, 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  41. Published

    Secure perception-driven control of mobile robots using chaotic encryption

    Zhang, X., Yuan, Z., Xu, S., Lu, Y. & Zhu, M., 30/04/2024, In: IEEE Transactions on Automatic Control. 69, 4, p. 2429-2436 8 p., 4.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  42. Published

    Secure Perception-Driven Control of Mobile Robots Using Chaotic Encryption

    Zhang, X., Yuan, Z., Xu, S., Lu, Y. & Zhu, M., 28/07/2021, 2021 American Control Conference (ACC). IEEE, p. 2575-2580 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  43. Published

    Secure Smart Grids or Say ‘Goodnight Vienna!'.

    Skopik, F., Smith, P. & Bleier, T., 16/01/2013, In: ERCIM News. 2013, 92, 92.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  44. Published

    Secure Source-Relay Link Based Threshold DF Relaying Scheme

    Yao, J., Ye, J., Wang, D., Lei, H. & Pan, G., 02/2018, In: AEÜ - International Journal of Electronics and Communications. 85, p. 144-149 6 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  45. Published

    Secure Transmission Design for Cooperative NOMA in the Presence of Internal Eavesdropping

    Su, B., Yu, W., Liu, H., Chorti, A. & Poor, H. V., 31/05/2022, In: IEEE Wireless Communications Letters. 11, 5, p. 878-882 5 p.

    Research output: Contribution to Journal/MagazineLetterpeer-review

  46. Published

    SecureComm: A Secure Data Transfer Framework for Neural Network Inference on CPU-FPGA Heterogeneous Edge Devices

    Chen, T., Tan, Y.-A., Li, C., Zhang, Z., Meng, W. & Li, Y., 31/12/2024, In: IEEE Journal on Emerging and Selected Topics in Circuits and Systems. 14, 4, p. 811-812 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  47. Published

    Securely Storing and Sharing Memory Cues in Memory Augmentation Systems: A Practical Approach

    Bexheti, A., Langheinrich, M., Elhart, I. & Davies, N. A. J., 11/03/2019, 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom). IEEE, 10 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  48. Published

    Securing a just space for small-scale fisheries in the blue economy

    Cohen, P. J., Allison, E. H., Andrew, N. L., Cinner, J., Evans, L. S., Fabinyi, M., Garces, L. R., Hall, S. J., Hicks, C. C., Hughes, T. P., Jentoft, S., Mills, D. J., Masu, R., Mbaru, E. K. & Ratner, B. D., 18/04/2019, In: Frontiers in Marine Science. 6, MAR, 171.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  49. Published

    Securing Aspect Composition

    Camilleri, A., Blair, L. & Coulson, G., 2008, Proceedings of the 2008 ACM Symposium on Applied Computing. New York: ACM, p. 278-279 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  50. Published

    Securing by design

    Weber, C. & Lacy, M., 07/2011, In: Review of International Studies. 37, 3, p. 1021-1043 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  51. Published

    Securing China's core interests: the state of the debate in China

    Zeng, J., Xiao, Y. & Breslin, S., 03/2015, In: International Affairs. 91, 2, p. 245-266 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  52. Published

    Securing Communication in 6LoWPAN with Compressed IPsec

    Raza, S., Duquennoy, S., Chung, A., Yazar, D., Voigt, T. & Roedig, U., 1/06/2011, 2011 International Conference on Distributed Computing in Sensor Systems and Workshops (DCOSS). IEEE, p. 1-8 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  53. Published

    Securing cyber-physical social interactions on wrist-worn devices

    Shen, Y., Du, B., Xu, W., Luo, C., Wei, B., Cui, L. & Wen, H., 31/05/2020, In: ACM Transactions on Sensor Networks (TOSN). 16, 2, p. 1-22 22 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  54. Published

    Securing GSM voice through scrambling

    Naeem, I. A., Rauf, U., Ahmad, S. F. & Shirazi, S. N., 2010, Proceedings - 2010 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering, SIBIRCON-2010. IEEE, p. 156-158 3 p. 5555330

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  55. Published

    Securing Human Rights in the Face of International Integration

    Butler, I. D. J., 01/2011, In: International and Comparative Law Quarterly. 60, 1, p. 125-165 41 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  56. Published

    Securing internet coordinate embedding systems

    Kaafar, M. A., Mathy, L., Barakat, C., Salamatian, K., Turletti, T. & Dabbous, W., 2007, In: Computer Communication Review. 37, 4, p. 61-72 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  57. Published

    Securing Internet Coordinate Systems

    Kaafar, D., Mathy, L., Salamatian, K., Barakat, C., Turletti, T. & Dabbous, W., 2007, Sustainable Internet Third Asian Internet Engineering Conference, AINTEC 2007, Phuket, Thailand, November 27-29, 2007. Proceedings. Fdida, S. & Sugiura, K. (eds.). Berlin: Springer Verlag, p. 167-168 2 p. (Lecture Notes in Computer Science; vol. 4866).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  58. Published

    Securing Machine Learning (ML) in the Cloud: A Systematic Review of Cloud ML Security

    Qayyum, A., Aneeqa, I., Usama, M., Iqbal, W., Qadir, J., Elkhatib, Y. & Al-Fuqaha, A., 12/11/2020, In: Frontiers in Big Data. 3, 43 p., 587139.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  59. Published

    Securing SDN-Controlled IoT Networks Through Edge Blockchain

    Hu, J., Reed, M. J., Thomos, N., Al-Naday, M. F. & Yang, K., 15/02/2021, In: IEEE Internet of Things Journal. 8, 4, p. 2102-2115 14 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  60. Published

    Securing the admissibility of witness statements: estimating the complexity and comprehension of Canadian 'KGB warnings'

    Luther, K., Snook, B., MacDonald, S. & Barron, T., 18/09/2015, In: Journal of Police and Criminal Psychology. 30, 3, p. 166-175 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  61. Published

    Securing the blue: political ecologies of the blue economy in Africa

    Childs, J. & Hicks, C., 1/08/2019, In: Journal of Political Ecology. 26, 1, p. 323-340 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  62. Published

    Securing the cloud-assisted smart grid

    Demir, K., Ismail, H., Vateva-Gurova, T. & Suri, N., 1/12/2018, In: International Journal of Critical Infrastructure Protection. 23, p. 100-111 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  63. Published

    Securing the sea: Ecosystem-based adaptation and the biopolitics of insuring nature's rents

    Christiansen, J., 31/07/2021, In: Journal of Political Ecology. 28, 1, p. 337-357 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  64. Published

    Securing the Sulu-Sulawesi seas from maritime terrorism: a troublesome cooperation?

    Febrica, S., 1/07/2014, In: Perspectives on Terrorism. 8, 3, p. 64-83

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  65. Published

    Securitisation in the Non-West

    Mabon, S. P. & Kapur, S., 09/2018, London: Routledge. 160 p.

    Research output: Book/Report/ProceedingsAnthology

  66. Published

    Securitisation through ‘Sectarianization’ to ‘Violisation’: Bahrain Post-1971

    Nasirzadeh, S., 25/03/2022, Lancaster University. 253 p.

    Research output: ThesisDoctoral Thesis

  67. Published

    Securitising Palestinian Solidarity: The Fight for Democracy and Freedom of Expression

    Abbas, M.-S., 17/05/2024, Community Policy Forum. 16 p.

    Research output: Book/Report/ProceedingsCommissioned report

  68. Published

    Securitising the unconscious : the Bush doctrine of pre-emption and 'minority report'.

    Weber, C., 2005, In: Geopolitics. 10, 3, p. 482-499 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  69. Published

    Securitization and the global politics of cybersecurity

    Lacy, M. J. & Prince, D. D. C., 1/03/2018, In: Global Discourse. 8, 1, p. 100-115 16 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  70. Published

    Securitization as a tool of regime survival: The deployment of religious rhetoric in Bashar al-Asad's speeches

    Aldoughli, R., 1/03/2021, In: The Middle East Journal . 75, 1, p. 9-32 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  71. Published

    Securitization as a Tool of Survival: The Deployment of Religious Rhetoric in Bashar al-Asad’s Speeches

    Aldoughli, R. B., 6/05/2021, In: The Middle East Journal . 75, 1, p. 9-32 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  72. Published

    Securitization in Chinese climate and energy politics

    Nyman, J. & Zeng, J., 1/03/2016, In: Wiley Interdisciplinary Reviews: Climate Change. 7, 2, p. 301-313 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  73. Published

    Securitization of Aid and Counter-Terrorism in Indonesia: Implications and Responses of Civil Society

    Febrica, S., 7/09/2021, Counter-Terrorism and Civil Society: International Challenges Since 9/11. Romaniuk, S. & Njoku, E. (eds.). Manchester : Manchester University Press, 13 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  74. Published

    Securitization of Artificial Intelligence in China

    Zeng, J., 31/10/2021, In: Chinese Journal of International Politics. 14, 3, p. 417–445 29 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  75. Published

    Securitizing terrorism in Southeast Asia: accounting for the varying responses of Singapore and Indonesia

    Febrica, S., 1/05/2010, In: Asian Survey. 50, 3

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  76. Published

    Securitizing the unconscious: the Bush doctrine of preemption and minority report.

    Weber, C., 2007, The logics of biopower and the War on Terror : living, dying, surviving. Dauphinee, E. & Masters, C. (eds.). London: Palgrave-Macmillan, 252 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  77. Published

    Security analyses of click-based graphical passwords via image point memorability

    Zhu, B. B., Yan, J., Yang, M. & Wei, D., 3/11/2014, CCS '14 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, p. 1217-1231 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  78. Published

    Security and Climitae Change: International Relations and the Limits of Realism.

    Lacy, M. J., 2005, Routledge. 176 p.

    Research output: Book/Report/ProceedingsBook

  79. Published

    Security and Corporate Rescue.

    Milman, D. & Mond, D. E. M., 1999, Manchester: Hodgsons.

    Research output: Working paper

  80. Published

    Security and Design

    Lacy, M., 15/06/2023, Security Studies: Critical Perspectives. Grayson, K. & Guillaume, X. (eds.). Oxford: Oxford University Press (OUP), p. 256-272 16 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  81. Published

    Security and Information Representation for Niedereiter and Public Key Cryptography

    Sweeney, P. & Honary, B., 1997, Fourth International Symposium on Communications Theory and Applications. Ambleside, UK, p. 173 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  82. Published

    Security and middleware

    Andersen, A., Blair, G., Myrvang, P. H. & Stabell-Kulo, T., 2003, Object-Oriented Real-Time Dependable Systems, 2003.(WORDS 2003). Proceedings of the Eighth International Workshop on. IEEE, p. 186-190 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  83. Published

    Security and Privacy for mHealth and uHealth Systems: A Systematic Mapping Study

    Iwaya, L. H., Ahmad, A. & Ali Babar, M., 31/12/2020, In: IEEE Access. 8, p. 150081-150112 32 p., 9165743.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  84. Published

    Security and privacy implications of pervasive memory augmentation

    Davies, N., Friday, A., Clinch, S., Sas, C., Langheinrich, M., Ward, G. & Schmidt, A., 4/02/2015, In: IEEE Pervasive Computing. 14, 1, p. 44-53 10 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  85. Published
  86. Published

    Security and the Subsurface: Natural Gas and the Visualisation of Possibility Spaces

    Forman, P. J., 1/01/2020, In: Geopolitics. 25, 1, p. 143-166 24 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  87. Unpublished

    Security and usability of cross-device captchas

    Algwil, A., 2018, (Unpublished) Lancaster University. 306 p.

    Research output: ThesisDoctoral Thesis

  88. Published

    Security as a service using an SLA-based approach via SPECS

    Rak, M., Suri, N., Luna, J., Petcu, D., Casola, V. & Villano, U., 2/12/2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science. IEEE, p. 1-6 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  89. Published

    Security assurance assessment methodology for hybrid clouds

    Hudic, A., Smith, P. & Weippl, E. R., 30/09/2017, In: Computers and Security. 70, p. 723-743 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  90. Published

    Security awareness of end-users of mobile health applications: An empirical study

    Aljedaani, B., Ahmad, A., Zahedi, M. & Ali Babar, M., 7/12/2020, Proceedings of the 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2020. The Association for Computing Machinery, p. 125-136 12 p. (ACM International Conference Proceeding Series).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  91. Published

    Security but not for security’s sake: The impact of social considerations on app developers’ choices

    Rauf, I., van der Linden, D., Levine, M., Towse, J., Nuseibeh, B. & Rashid, A., 24/06/2020, ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops. New York: Association for Computing Machinery (ACM), p. 141–144 4 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  92. Published

    Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous Interaction

    Mayrhofer, R., Gellersen, H. & Hazas, M., 09/2007, Proc. Ubicomp 2007: 9th International Conference on Ubiquitous Computing. Springer-Verlag, p. 199-216 18 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  93. Published

    Security challenges faced by the Modi administration in the Indo-Pacific region

    Mukherjee, K., 05/2016, In: Journal of Comparative Asian Development. 15, 1, p. 156-178 23 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  94. Published

    Security design in human computation games

    Yu, S. Y. & Yan, J., 2014, Security Protocols XVIII : 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 142-153 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  95. Published

    Security design in human computation games (transcript of discussion)

    Yan, J., 2014, Security Protocols XVIII: 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Christianson, B. & Malcolm, J. (eds.). Berlin: Springer Verlag, p. 154-160 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7061).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  96. Published

    Security engineering with patterns

    Schumacher, M. & Roedig, U., 1/09/2001, Proceedings of the 8th Conference on Pattern Languages of Programs (PLoP 2001).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  97. Published

    Security enhancements for A5/1 without loosing hardware efficiency in future mobile systems

    Komninos, N., Honary, B. & Darnell, M., 05/2002, 3G Mobile Communication Technologies, 2002. Third International Conference on (Conf. Publ. No. 489). London, UK: IEEE, p. 324-328 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  98. Published

    Security Evaluation in Software-Defined Networks

    Ivkic, I., Thiede, D., Race, N., Broadbent, M. & Gouglidis, A., 15/08/2024, Cloud Computing and Services Science: 12th International Conference, CLOSER 2022, Virtual Event, April 27–29, 2022, and 13th International Conference, CLOSER 2023, Prague, Czech Republic, April 26–28, 2023, Revised Selected Papers. van Steen, M., Ferguson, D. & Pahl, C. (eds.). Cham: Springer, p. 66-91 26 p. (Communications in Computer and Information Science; vol. 1845, no. 1).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  99. Published

    Security for costs : limited liability in litigation.

    Milman, D., 11/1995, In: Palmer's In Company. 10/95, p. 1-2 2 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  100. Published

    Security for costs : principles and pragmatism in corporate litigation.

    Milman, D., 1998, The realm of company law. Rider, B. & Sealy, L. S. (eds.). London: Kluwer, p. 167-181 15 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Back to top