Publications

SCCS members are actively publishing in cyber security research venues including some top conferences and journals. The following is a list of selected publications of SCCS core members.

In the press

  1. M. Manulis, B. Poettering, D. Stebila: Plaintext Awareness in Identity-Based Key Encapsulation. International Journal of Information Security, published online in November 2013, Springer
  2. J. M. Gonzalez Nieto, M. Manulis, D. Sun: Forward-Secure Hierarchical Predicate Encryption. The Computer Journal, published online in April 2013, Oxford University Press

2014

  1. M. Moran, J. Heather, S. Schneider: Verifying anonymity in voting systems using CSP. Formal Aspects of Computing, 26(1):63-98, Springer, 2014
  2. J. Heather, S. Schneider, V. Teague: Cryptographic protocols with everyday objects. Formal Aspects of Computing, 26(1):37-62, Springer, 2014
  3. C. Culnane, J. Heather, R. Joaquim, P. Y.A. Ryan, S. Schneider, V. Teague: Faster Print on Demand for Prêt à Voter. USENIX Journal of Election Technology and Systems 2(1), and Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE2014

2013

  1. H. J. Asghar, S. Li, R. Steinfeld, J. Pieprzyk: Does Counting Still Count? Revisiting the Security of Counting based User Authentication Protocols against Statistical Attacks. Proceedings of 20th Annual Network & Distributed System Security Symposium (NDSS 2013), Internet Society, 2013
  2. J. M. Gonzalez Nieto, M. Manulis, B. Poettering, J. Rangasamy, D. Stebila: Publicly verifiable ciphertexts. Journal of Computer Security 21(5): 749-778, IOS Press, 2013
  3. H. J. Asghar, S. Li, J. Pieprzyk, H. Wang: Cryptanalysis of the Convex Hull Click Human Identification Protocol. International Journal of Information Security, 12(2):83-96, Springer, 2013
  4. E. De Cristofaro, M. Manulis, B. Poettering: Private Discovery of Common Social Contacts. International Journal of Information Security, 12(1):49-65, Springer, 2013
  5. M. Llewellyn, S. Schneider, Z. Xia, C. Culnane, J. Heather, P. Y.A. Ryan, S. Srinivasan: Testing Voters' Understanding of a Security Mechanisms used in Verifiable Voting. USENIX Journal of Election Technology and Systems 1(1), and Electronic Voting Technology Workshop/Workshop on Trustworthy Elections, EVT/WOTE2013
  6. M. Manulis, K. Suzuki, B. Ustaoglu: Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 96-A(1):101-110, IEICE, 2013
  7. Y. Cao, Z. Sun, N. Wang, F. Yao, H. Cruickshank: Converge-and-Diverge (CaD): A Geographic Routing for Delay/Disruption Tolerant Networks Using Delegation Replication Approach. IEEE Transactions on Vehicular Technology, 62(5), IEEE, 2013
  8. Y. Cao, Z. Sun: Routing in Delay/Disruption Tolerant Networks: A Survey, Taxonomy and Challenges. IEEE Communications Surveys and Tutorials, 15(2), IEEE, 2013
  9. J. J. Ahmad, S. Li, R. Thavot, M. Mattavelli: Secure Computing with the MPEG RVC Framework. Signal Processing: Image Communication, 28(10):1315-1334, Elsevier, 2013 (special issue on Recent Advances on MPEG Codec Configuration Framework)
  10. N. Fleischhacker, F. Günther, F. Kiefer, M. Manulis, B. Poettering: Pseudorandom Signatures. ACM ASIACCS 2013, pp. 107-118, ACM, 2013
  11. M. Manulis, V. Kuchta: Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions. 12th International Conference on Cryptology and Network Security (CANS 2013), LNCS 8257, pp. 251-270, Springer, 2013
  12. Y. Wang, M. Manulis, M. H. Au, W. Susilo: Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". 18th Australasian Conference on Information Security and Privacy (ACISP 2013), LNCS 7959, pp. 187-202, Springer, 2013
  13. E. Aktoudianakis, J. Crampton, S. Schneider, H. Treharne, A. Waller: Policy templates for relationship-based access control. 11th Annual Conference on Privacy, Security and Trust, PST 2013
  14. M. Moran, J. Heather, S. Schneider: Automated Anonymity Verification of the ThreeBallot Voting System. 10th International Conference on integrated Formal Methods, iFM 2013
  15. A. AlShehri, S. Schneider: Formal security analysis and improvement of a hash-based NFC M-coupon protocol. 12th Smart Card Research and Advanced Application Conference, CARDIS 2013
  16. A. AlShehri, S. Schneider: Formally defining NFC M-coupon requirements, with a case study. 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013
  17. A. AlShehri, J. Briffa, S. Schneider, S. Wesemeyer: Formal Security Analysis of NFC M-Coupon Protocols using Casper/FDR, NFC 2013
  18. J. Heather, C. Culnane, S. Schneider, S. Srinivasan, Z. Xia: Solving the discrete logarithm problem for packing candidate preferences. 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013
  19. R. Schmitz, S. Li, C. Grecos, X. Zhang: Towards More Robust Commutative Watermarking-Encryption of Images. Proceedings of 15th IEEE International Symposium on Multimedia (ISM 2013), pp. 283-286, IEEE, 2013
  20. S. Srinivasan, C. Culnane, J. Heather, S. Schneider, Z. Xia: On key sizes for electronic voting.7th Chinese Conference on Trusted Computing and Information Security, 2013

2012

  1. J. J. Ahmad, S. Li, A.-R. Sadeghi, T. Schneid: CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. Financial Cryptography and Data Security (FC 2012), LNCS 7397, pp. 299-313, Springer, 2012
  2. S. Li, A.-R. Sadeghi, S. Heisrath, R. Schmitz, J. J. Ahmad: hPIN/hTAN: A Lightweight and Low-Cost e-Banking Solution against Untrusted Computers. Financial Cryptography and Data Security (FC 2011), LNCS 7035, pp. 235-249, Springer, 2012
  3. S. Stelle, M. Manulis, M. Hollick: Topology-Driven Secure Initialization in Wireless Sensor Networks: A Tool-Assisted Approach. 7th International Conference on Availability, Reliability and Security (ARES 2012), pp. 28-37, IEEE, 2012
  4. J. M. Gonzalez Nieto, M. Manulis, B. Poettering, J. Rangasamy, D. Stebila: Publicly Verifiable Ciphertexts. 8th International Conference on Security and Cryptography for Networks (SCN 2012), LNCS 7485, pp. 393-410, Springer, 2012
  5. J.M. Gonzalez Nieto, M. Manulis, D. Sun: Fully Private Revocable Predicate Encryption. 17th Australasian Conference on Information Security and Privacy (ACISP 2012), LNCS 7372, pp. 350-363, Springer, 2012
  6. R. Schmitz, S. Li, C. Grecos, X. Zhang: A New Approach to Commutative Watermarking-Encryption. Communications and Multimedia Security: 13th IFIP TC 6/TC 11 International Conference, CMS 2012, Canterbury, UK, September 3-5, 2012. Proceedings, Lecture Notes in Computer Science, vol. 7394, pp. 117-130, 2012, Springer
  7. C. Burton, C. Culnane, J. Heather, T. Peacock, P.Y.A. Ryan, S. Schneider, S. Srinivasan, V. Teague, R. Wen, Z. Xia: Using Pret-A-Voter in Victorian State elections. 2012 Electronic Voting Technology/Workshop on Electronic Voting, Usenix, 2012
  8. C. Burton, C. Culnane, J. Heather, T. Peacock, P.Y.A. Ryan, S. Schneider, S. Srinivasan, V. Teague, R. Wen, Z. Xia: A Supervised Verifiable Voting Protocol for the Victorian Electoral Commission. E-VOTE 2012, LNI 205, pp. 81-94, Springer, 2012
  9. J. Heather, S. Schneider: A Formal Framework for Modelling Coercion Resistance and Receipt Freeness. 18th International Symposium on Formal Methods (FM 2012), LNCS 7436, pp. 217-231, Springer, 2012
  10. A. W. A. Wahab, A. TS Ho, S. Li: Inter-Camera Model Image Source Identification with Conditional Probability Features. Proceedings of the IIEEJ Image Electronics and Visual Computing Workshop 2012 (IEVC 2012), Paper ID 2P-2, 2012, IIEEJ (Best Paper Award: 3/95≈3.2%)
  11. S. Yahaya, A. TS Ho, A. A. Wahab: Advanced Video Camera Identification Using Conditional Probability Features. IET Image Processing Conference (IPR 2012), IET, 2012
  12. Q. Ghulam, S. Yahaya, A. TS Ho: Surrey University Library for Forensics Analysis (SULFA) of Video Content. IET Image Processing Conference (IPR 2012), IET, 2012
  13. G. Ansa, H. Cruickshank, Z. Sun: An Energy-Efficient Technique to Combat DOS Attacks in Delay Tolerant Networks. ICST Transactions on Ubiquitous Environments, 12(1-3), ICST, 2012
  14. S. Li: Perceptual Encryption of Digital Images and Videos. In Perceptual Digital Imaging: Methods and Applications, edited by Rastislav Lukac, Chapter 14, pp. 431-468, ISBN: 978-1-43-986856-0, CRC Press, 2012

2011

  1. M. C. Gorantla, C. Boyd, J.M. Gonzalez Nieto, M. Manulis: Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. ACM Trans. on Information and Systems Security (TISSEC), 14(4), Art. No. 28, ACM, 2011
  2. C. Caini, H. Cruickshank, S. Farrell, M. Marchese: Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications. Proceedings of the IEEE. Volume 99, Issue 11, IEEE, 2011
  3. D. Leroy, G. Detal, J. Cathalo, M. Manulis, F. Koeune, O. Bonaventure: SWISH: Secure WiFi Sharing. Computer Networks, 55(7):1614-1630, Elsevier, 2011
  4. M. Fischlin, B. Libert, M. Manulis: Non-Interactive and Re-Usable Universally Composable String Commitments with Adaptive Security. Advances in Cryptology - ASIACRYPT 2011, LNCS 7073, pp. 468-485, Springer, 2011
  5. E. De Cristofaro, M. Manulis, B. Poettering: Private Discovery of Common Social Contacts. 9th International Conference on Applied Cryptography and Network Security (ACNS 2011), LNCS 6715, pp. 147-165, Springer, 2011
  6. T. Perković, A. Mumtaz, Y. Javed, S. Li, S. A. Khayam, M. Čagalj: Breaking Undercover: Exploiting Design Flaws and Nonuniform Human Behavior. 7th Symposium On Usable Privacy and Security (SOUPS 2011), ACM, 2011
  7. M. Manulis, B. Poettering: Practical Affiliation-Hiding Authentication from Improved Polynomial Interpolation. ACM Symposium on Information, Computer and Communications Security (ASIACCS 2011), pp. 286-295, ACM, 2011
  8. M. Manulis, B. Poettering: Affiliation-Hiding Authentication with Minimal Bandwidth Consumption. IFIP WG 11.2 International Workshop on Information Security Theory and Practice (WISTP 2011), LNCS 6633, pp. 85-89, Springer, 2011 (Best Student Paper Award)
  9. S. Schneider: Security Analysis using Rank Functions in CSP. Chapter in Formal Models and Techniques for Analyzing Security Protocols, Veronique Cortier and Steve Kremer, eds, Volume 5 of Cryptology and Information Security Series, pp. 258-276, IOS Press, 2011
  10. S. Schneider, M. Llewellyn, C. Culnane, J. Heather, S. Srinivasan, Z. Xia: Focus group views on Pret-A-Voter 1.0, REVOTE 2011, pp. 56-65, IEEE, 2011
  11. D. Demirel, M. Henning, P.Y.A. Ryan, S. Schneider, M. Volkamer: Feasibility Analysis of Pret-A-Voter for German Federal Elections. VOTE-ID 2011, LNCS 7187, pp. 158-173, Springer, 2011
  12. C. Culnane, D. Bismark, J. Heather, S. Schneider, S. Srinivasan, Z. Xia: Authentication codes. In 2011 Conference on Electronic Voting Technology, Workshop on Trustworthy Elections. USENIX Association, 2011
  13. J. Heather, M. Llewellyn, V. Teague, R. Wen: On the side-effects of introducing E-Voting. In VoteID 2011, LNCS 7187, pp. 242-256, Springer, 2011
  14. S. Schneider, S. Srinivasan, C. Culnane, J. Heather, Z. Xia: Pret-A-Voter with Write-Ins. In Proceedings of VoteID 2011, LNCS 7187, pp. 174-189, Springer, 2011
  15. A. Homayounfar, A. TS Ho, N. Zhu, G. Head, P. Palmer: Multi-vehicle Convoy Analysis Based on ANPR Data. 4th International Conference on Imaging for Crime Detection and Prevention (ICDP 2011), IET, 2011
  16. H. Wang, A. TS Ho, X. Zhao: A Novel Fast Self-Restoration Semi-fragile Watermarking Algorithm for Image Content Authentication Resistant to JPEG Compression. 10th International Workshop on Digital Forensics and Watermarking (IWDW 2011), LNCS 7128, pp. 72-85, Springer, 2011
  17. P. Bateman, A. TS Ho, J. Briffa: Image Forensics of High Dynamic Range Imaging. 10th International Workshop on Digital Forensics and Watermarking (IWDW 2011), LNCS 7128, pp. 72-85, Springer, 2011
  18. Y. Cao, H. S. Cruickshank, Z. Sun: A routing framework for Delay Tolerant Networks based on encounter angle. 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011), pp. 2231-2236, IEEE, 2011
  19. G. Ansa, H. S. Cruickshank, Z. Sun, M. Al-Siyabi: A DOS-resilient design for delay tolerant networks. 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011), pp. 424-429, IEEE, 2011
  20. G. Ansa, H. S. Cruickshank, Z. Sun: A Proactive DOS Filter Mechanism for Delay Tolerant Networks. International ICST Conference on Personal Satellite Services (PSATS 2011), LNICST 71, pp. 213-226, Springer, 2011
  21. M. Al-Siyabi, H. Cruickshank, Z. Sun, G. Ansa: Fairness and satisfaction model for DTN applications using various transportation means. LNCS 6649, pp. 446-457, Springer, 2011
  22. Olivera, Z. Sun, P. Boutry, D. Gimenez, A. Pietrabissa, K.B. Juros: Internetworking of satellite and wireless ad hoc networks for emergency and disaster relieve services. International Journal of Satellite Communications Policy and Management 1(1):1-14, Inderscience, 2011

2010

  1. J. A. Heather, P. Y. A. Ryan, V. J. Teague: Pretty good democracy for more expressive voting schemes. 15th European Symposium on Research in Computer Security (ESORICS), LNCS 6345, pp. 405-423, Springer 2010
  2. S. Li, S. A. H. Shah, M. A. U. Khan, S. A. Khayam, A.-R. Sadeghi, R. Schmitz: Breaking e-Banking CAPTCHAs. 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 171-180, ACM, 2010
  3. M. Manulis, B. Poettering, G. Tsudik: Taming Big Brother Ambitions: More Privacy for Secret Handshakes. 10th Privacy Enhancing Technologies Symposium (PETS 2010), LNCS 6205, pp. 149-165, Springer, 2010
  4. A. Dent, M. Fischlin, M. Manulis, D. Schröder, M. Stam: Confidential Signatures and Deterministic Signcryption. 13th International Conference on Practice and Theory in Public Key Cryptography (PKC 2010), LNCS 6056, pp. 462-479, Springer, 2010
  5. M. Manulis, B. Pinkas, B. Poettering: Privacy-Preserving Group Discovery with Linear Complexity. 8th International Conference on Applied Cryptography and Network Security (ACNS 2010), LNCS 6123, pp. 420-437, Springer, 2010
  6. Z. Xia, C. Culnane, J. Heather, H. Jonker, P.Y.A. Ryan, S. Schneider, S. Srinivasan: Versatile Pret-A-Voter: Handling Multiple Election Methods with a Unified Interface. INDOCRYPT 2010, LNCS 6498, pp. 98-114, Springer, 2010
  7. E. Johnson, G. Ansa, H. S. Cruickshank, Z. Sun: Access Control Framework for Delay/Disruption Tolerant Networks. International ICST Conference on Personal Satellite Services (PSATS 2010), LNICST 43, pp. 249-264, Springer, 2010
  8. N. Ahmad, H. S. Cruickshank, Z. Sun: ID-Based Cryptography and Anonymity in Delay/Disruption Tolerant Networks. International ICST Conference on Personal Satellite Services (PSATS 2010), LNICST 43, pp. 265-275, Springer, 2010
  9. D. M. Williams, H. Treharne, A. TS Ho: On the Importance of One-Time Key Pairs in Buyer-Seller Watermarking Protocols. International Conference on Security and Cryptography, (Secrypt 2010), IEEE, 2010
  10. W. Jiang, A. TS Ho, H. Treharne, Y.Q. Shi: A Novel Multi-size Block Benford's Law Scheme for Printer Identification. LNCS 6297, pp. 643-652, Springer, 2010
  11. P. Bateman, A. TS Ho, A. Woodward: Accurate Detection of Out-Of-Control in Digital Camera Devices. IEEE International Symposium on Circuits and Systems (ISCAS 2010), pp. 3056-3059, IEEE, 2010
  12. J.A. Briffa, C. Culnane, H. Treharne: Imperceptible yellow dot watermarking for printed binary documents. In SPIE Photonics Europe, volume 7723, 2010

2009

  1. P.Y.A. Ryan, D. Bismark, J. Heather, S. Schneider, Z. Xia: Prêt à Voter: a voter-verifiable voting system. IEEE Transactions on Information Forensics and Security 4(4): 662-673, IEEE 2009
  2. M. Manulis, J. Schwenk: Security Model and Framework for Information Aggregation in Sensor Networks. ACM Trans. on Sensor Networks, 5(2), Art. 13, ACM, 2009
  3. S. A. Shaikh, V. J. Bush, S.A. Schneider: Specifying authentication using signal events in CSP. Computers & Security 28(5): 310-324, Elsevier, 2009
  4. C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, G. Chen: On the security defects of an image encryption scheme. Image and Vision Computing, 27(9):1371-1381, Elsevier, 2009
  5. N. B. Puhan, A. TS Ho, F. Sattar: Localization and Restoration Using Noise Pixels in Binary Document Image Watermarking. Journal of Electronic Imaging (JEI), 18(2):023012-023021, SPIE, 2009
  6. S. Gajek, M. Manulis, J. Schwenk: User-Aware Provably Secure Protocols for Browser-Based Mutual Authentication. International Journal of Applied Cryptography, 1(4):290-308, Inderscience, 2009
  7. M. Al-Fares, Z. Sun, H. Cruickshank: High Survivable Routing Protocol in Self Organizing Wireless Sensor Networks. IAENG International Journal of Computer Science, 36(2):147-156, IAENG, 2009
  8. S. Li, H. J. Asghar, J. Pieprzyk, A.-R. Sadeghi, R. Schmitz, H. Wang: On the Security of PAS (Predicate-based Authentication Service). 25th Annual Computer Security Applications Conference (ACSAC 2009), pp. 209-218, IEEE, 2009
  9. S. Li, R. Schmitz: A Novel Anti-Phishing Framework Based on Honeypots. 4th Annual APWG eCrime Researchers Summit (eCRS 2009 or eCrime 2009), 13 pages, IEEE, 2009
  10. D. Bismark, J. A. Heather, R. M. A. Peel, S. A. Schneider, Z. Xia, and P. Y. A. Ryan: Experiences Gained from the first Prêt-à-Voter Implementation. In Requirements Engineering for E-Voting Systems (RE-Vote 2009), pp. 19-28, IEEE, 2009
  11. J. A. Heather, D. Lundin: The Append-only Web Bulletin Board. In Pierpaolo Degano, Joshua Guttman, and Fabio Martinelli, editors, Formal Aspects in Security and Trust 2008 (FAST 2008), LNCS 5491, pp. 242-256, Springer, 2009
  12. H. S. Cruickshank, R. J. Mort, M. Berioli: Broadband Satellite Multimedia (BSM) Security Architecture and Interworking with Performance Enhancing Proxies. International ICST Conference on Personal Satellite Services (PSATS 2009), LNICST 15, pp. 132-142, Springer, 2009
  13. X. Zhao, A. TS Ho, Y.Q. Shi: Image Forensics using Generalized Benford's Law for Accurate Detection of Unknown JPEG Compression in Watermarked Images. 16th International Conference on Digital Signal Processing (DSP 2009), IEEE, 2009
  14. W. Jiang, A. TS Ho, H. Treharne: A Novel Least Distortion Linear Gain Model for Halftone Image Watermarking Incorporating Perceptual Quality Metrics. Transactions on Data Hiding and Multimedia Security IV, LNCS 5510, pp. 65-83, Springer, 2009
  15. D. M. Williams, H. Treharne, A. TS Ho, A. Waller: Formal Analysis of Two Buyer-Seller Watermarking Protocols. Digital Watermarking (IWDW08), LNCS 5450, pp. 278-292, Springer, 2009

2008

  1. A. TS Ho, X. Zhu, J. Shen, P. Marziliano: Fragile Watermarking Based on Encoding of the Zeros of the z-Transform. IEEE Transactions on Information Forensics and Security (TIFS),3(5):567-579, IEEE, 2008
  2. S. Li, C. Li, K.-T. Lo, G. Chen: Cryptanalysis of an Image Scrambling Scheme without Bandwidth Expansion. IEEE Trans. Circuits and Systems for Video Technology, 18(3):338-349, IEEE, 2008
  3. S. Li, C. Li, K.-T. Lo, G. Chen: Cryptanalyzing an Encryption Scheme Based on Blind Source Separation, IEEE Trans. Circuits and Systems, 55(4):1055-1063, IEEE, 2008
  4. S. Li, C. Li, G. Chen, N. G. Bourbakis, K.-T. Lo: A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Processing: Image Communication, 23(3):212-223, Elsevier, 2008
  5. E. Bresson, M. Manulis: Contributory Group Key Exchange in the Presence of Malicious Participants. IET Information Security, 2(3):85-93, IET, 2008
  6. E. Bresson, M. Manulis: Securing Group Key Exchange against Strong Corruptions and Key Registration Attacks. International Journal of Applied Cryptography, 1(2):91-107, Inderscience, 2008
  7. S. Gajek, M. Manulis, T. Jager, J. Schwenk: A Browser-Based Kerberos Authentication Scheme. 13th European Symposium on Research in Computer Security (ESORICS 2008), LNCS 5283, pp. 115-129, Springer, 2008
  8. L. Chen, H. Löhr, M. Manulis, A.-R. Sadeghi: Property-Based Attestation without a Trusted Third Party. 11th Information Security Conference (ISC 2008), LNCS 5222, pp. 31-46, Springer, 2008
  9. Z. Xia, S. Schneider, J. Heather, J. Traore: Analysis, Improvement, and Simplification of Pret-A-Voter with Paillier Encryption. Electronic Voting Workshop (EVT 2008), Usenix, 2008
  10. G. Duan, A. TS Ho, X. Zhao: A Novel Non-Redundant Contourlet Transform for Robust Image Watermarking Against Non-Geometrical and Geometrical Attacks. Proceeding of IET 5th International Conference on Visual Information Engineering (VIE08), pp. 124-129, IET, 2008
  11. D.M. Williams, H. Treharne, A. TS Ho, C. Culnane: Using a Formal Analysis Technique to Identify an Unbinding Attack on a Buyer-Seller Watermarking Protocol. Proceedings of10th Workshop on Multimedia and Security (MM&SEC 2008), 205-214, ACM, 2008
  12. Y. Sheng, H. S. Cruickshank: Security mechanisms for delivering ubiquitous services in next generation mobile networks. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), pp. 1-5, IEEE, 2008
  13. Y. Sheng, H. S. Cruickshank, A. D. Pragad, P. Pangalos, A. H. Aghvami: An integrated QoS, security and mobility framework for delivering ubiquitous services across all IP-based networks. IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2008), pp. 1-5, IEEE, 2008

2007

  1. W. HD Ng, M. P. Howarth, Z. Sun, H. S. Cruickshank: Dynamic Balanced Key Tree Management for Secure Multicast Communications. IEEE Transactions on Computers 56(5): 590-605, IEEE, 2007
  2. S. Li, G. Chen, A. Cheung, B. Bhargava, K.-T. Lo: On the Design of Perceptual MPEG-Video Encryption Algorithms. IEEE Transactions on Circuits and Systems for Video Technology, 17(2):214-223, IEEE, 2007
  3. J. Zhang, A. TS Ho, G. Qiu, P. Marziliano: Robust Video Watermarking of H.264/AVC. IEEE Transactions on Circuits and Systems, Part II, 54(2):205-209, IEEE, 2007
  4. R. Delicata, S. Schneider: An algebraic approach to the verification of a class of Diffie-Hellman protocols. Internation Journal of Information Security 6(2-3): 183-196, Springer, 2007
  5. X. Zhu, A. TS Ho, P. Marziliano: A New Semi-fragile Image Watermarking With Robust Tampering Restoration Using Irregular Sampling. Signal Processing: Image Communication, 22(5):515-528, Elsevier, 2007
  6. S. Foulle, S. Schneider, J. Traor, Z. Xia: Threat Analysis of a Practical Voting Scheme with Receipts. VOTE-ID 2007, LNCS 4896, pp. 156-165, Springer, 2007
  7. J. A. Heather: Implementing STV Securely in Pr  Voter. In Proceedings of the 20th IEEE Computer Security Foundations Symposium, pp. 157-169, IEEE, 2007
  8. C. Culnane, H. Treharne, A. TS Ho: Authenticating Binary Text Documents Using a Localising OMAC Watermark Robust to Printing and Scanning. International Workshop for Digital Watermarking (IWDW07), Springer, LNCS, pp. 173-187, 2007
  9. W. Jiang, A. TS Ho, H. Treharne: Least Distortion Halftone Image Data Hiding Watermarking by Optimizing an Iterative Linear Gain Control Model. International Workshop for Digital Watermarking (IWDW07), Springer, LNCS, pp. 423-439, 2007
  10. X. Zhao, X., A. TS Ho, H. Treharne, V. Pankajakshan, C. Culnane, W. Jiang: A Novel Semi-Fragile Image Watermarking, Authentication and Self-restoration Technique Using the Slant Transform. Proceedings 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP07), IEEE, pp. 283-286, 2007
  11. C. Culnane, H. Treharne, A. TS Ho: Improving Multi-set Formatted Binary Text Watermarking Using Continuous Line Embedding. IEEE International Conference on Innovative Computing, Information and Control (ICICIC-07), 2007

Before 2007

  1. W. HD Ng, H. S. Cruickshank, Z. Sun: Scalable balanced batch rekeying for secure group communication. Computers & Security 25(4): 265-273, Elsevier, 2006
  2. S. Li, C. Li, K.-T. Lo, G. Chen: Cryptanalysis of an image encryption scheme. Journal of Electronic Imaging, 15(4):043012, SPIE, 2006
  3. G. Alvarez, S. Li: Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems. International Journal of Bifurcation and Chaos, 16(8):2129-2151, World Scientific, 2006
  4. S. Li, G. Chen, G. Alvarez: Return-Map Cryptanalysis Revisited. International Journal of Bifurcation and Chaos, 16(5):1557-1568, World Scientific, 2006
  5. P.Y.A. Ryan, S. Schneider: Prêt à Voter with Re-encryption Mixes. ESORICS 2006, LNCS 4189, pp. 313-326, Springer, 2006
  6. C. Culnane, H. Treharne, A. TS Ho: A New Multi-Set Modulation Technique for Increasing Hiding Capacity of Binary Watermark for Print and Scan Processes. IWDW, LNCS, pp. 96-110, Springer, 2006
  7. J. Heather, S. Schneider: A decision procedure for the existence of a rank function. Journal of Computer Security, 13(2):317-344, IOS Press, 2005
  8. H. Cruickshank, M.P. Howarth, S. Iyengar, Z. Sun, L. Claverotte: Securing multicast in DVB-RCS satellite systems. IEEE Wireless Communications 12(5):38-45, IEEE, 2005
  9. N. Evans, S. Schneider: Verifying security protocols with PVS: widening the rank function approach. The Journal of Logic and Algebraic Programming, 64(2):253-284, Elsevier, 2005
  10. D. Chaum, P.Y.A. Ryan, S. Schneider: A Practical Voter-Verifiable Election Scheme. ESORICS 2005, LNCS 3679, pp. 118-139, Springer, 2005
  11. S. Li, G. Alvarez, G. Chen, X. Mou: Breaking a chaos-noise-based secure communication scheme Chaos, 15(1):013703, AIP, 2005
  12. S. Li, G. Chen, X. Mou: On the Security of the Yi-Tan-Siew Chaotic Cipher. IEEE Transactions on Circuits and Systems-II, 51(12):665-669, IEEE, 2004
  13. M. P. Howarth, S. I., Z. Sun, H. S. Cruickshank: Dynamics of key management in secure satellite multicast. IEEE Journal on Selected Areas in Communications, 22(2):308-319, IEEE, 2004
  14. J. Heather, G. Lowe, S. Schneider: How to Prevent Type Flaw Attacks on Security Protocols. Journal of Computer Security, 11(2):217-244, IOS Press, 2003
  15. P.Y.A. Ryan, S. Schneider: Process Algebra and Non-Interference. Journal of Computer Security, 9(1/2):75-103, IOS Press, 2001
  16. P. Y.A. Ryan, S. Schneider, M. Goldsmith, G. Lowe, A.W. Roscoe: Modelling and Analysis of Security Protocols. Book, Pearson, 2000
  17. S. Schneider: Verifying Authentication Protocols in CSP. IEEE Transactions on Software Engineering, 24(9):741-758, IEEE, 1998
  18. S. Schneider: Formal Analysis of a Non-Repudiation Protocol. CSFW 1998, pp. 54-65, IEEE, 1998
  19. S. Schneider: Security Properties and CSP. IEEE Symposium on Security and Privacy 1996, pp. 174-187, IEEE, 1996
  20. S. Schneider, A. Sidiropoulos: CSP and Anonymity. ESORICS 1996, LCNS 1146, pp.198-218, Springer, 1996

Contact us

Find us

Address
Surrey Centre for Cyber Security
University of Surrey
Guildford
Surrey
GU2 7XH