Number of items at this level: 35.
McCusker, Kealan and O'Connor, Noel E. (2011) Low-energy symmetric key distribution in wireless sensor networks. IEEE Transactions on Dependable and Secure Computing, 8 (3). pp. 363-376. ISSN 1545-5971
Conway, Maura (2011) Against Cyberterrorism: Why cyber-based terrorist attacks are unlikely to occur. Communications of the ACM (CACM), 54 (2). pp. 26-28. ISSN 0001-0782
Conway, Maura (2018) Is cyberterrorism a Real threat? Yes: why we should start from this assumption. In: Jackson, Richard and Pisoiu, Daniela, (eds.) Contemporary Debates on Terrorism (2nd edition). Routledge (Taylor & Francis), Abingdon and New York , pp. 102-108. ISBN 978-1-138-93136-7
Conway, Maura (2014) Reality Check: assessing the (un)likelihood of cyberterrorism. In: Chen, Tom and Jarvis, Lee and Macdonald, Stuart, (eds.) Cyber Terrorism: Understanding, Assessment and Response. Springer, New York, pp. 103-122. ISBN 978-1-4939-0962-9
Conference or Workshop Item
Phan, Quoc Tin and Dang Nguyen, Duc Tien and Boato, Giulia and De Natale, Francesco (2017) Using LDP-TOP in video-based spoofing detection. In: International Conference on Image Analysis and Processing (ICIAP), 11-15 Sept 2017, Catania, Italy. ISBN 978-3-319-68548-9
Hinbarji, Zaher and Albatal, Rami and O'Connor, Noel E. and Gurrin, Cathal (2016) LoggerMan, a comprehensive logging and visualisation tool to capture computer usage. In: 22st International Conference on MultiMedia Modelling (MMM 2016), 4-6 Jan, 2016, Miami, FA.. ISBN 978-3-319-27673-1
Hinbarji, Zaher and Albatal, Rami and Gurrin, Cathal (2015) Dynamic user authentication based on mouse movements curves. In: 21st International Conference on MultiMedia Modelling (MMM 2015), 5-7 Jan 2015, Sydney, Australia.
Lynn, Theo and Healy, Philip and McClatchey, Richard and Morrison, John and Pahl, Claus and Lee, Brian (2013) The case for cloud service trustmarks and assurance-as-a-service. In: Intl. Conference on Cloud Computing and Services Science Closer'13, 8-10 May 2013, Aachen, Germany.
Butin, Denis Frédéric and Bella, Giampaolo (2012) Verifying privacy by little interaction and no process equivalence. In: SECRYPT 2012, 24-27 Jul 2012, Rome, Italy.
Bella, Giampaolo and Butin, Denis Frédéric and Gray, David (2011) Holistic analysis of mix protocols. In: 7th International Conference on Information Assurance and Security (IAS 2011), 5-8 Dec 2011, Malacca, Malaysia. ISBN 978-1-4577-2154-0
McCusker, Kealan and O'Connor, Noel E. and Diamond, Dermot (2006) Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks. In: ICCCAS 2006 - International Conference on Communications, Circuits And Systems, 25-28 June 2006, Guangxi, China.
Barreto, Paulo S.L.M. and Kim, Hae Y. and Lynn, Ben and Scott, Michael (2002) Efficient algorithms for pairing-based cryptosystems. In: Crypto 2002, 18-22 August 2002, Santa Barbara, California, USA. ISBN 978-3-540-44050-5
Cronin, Brendan (2014) Hardware acceleration of network intrusion detection and prevention. PhD thesis, Dublin City University.
Zhou, Yachao (2012) Hardware acceleration for power efficient deep packet inspection. PhD thesis, Dublin City University.
Wang, Xiaofei (2012) High performance stride-based network payload inspection. PhD thesis, Dublin City University.
Butin, Denis Frédéric (2012) Inductive analysis of security protocols in Isabelle/HOL with applications to electronic voting. PhD thesis, Dublin City University.
Kachisa, Ezekiel Justin (2011) Constructing suitable ordinary pairing-friendly curves: A case of elliptic curves and genus two hyperelliptic curves. PhD thesis, Dublin City University.
Dominguez Perez, Luis Julian (2011) Developing an Automatic Generation Tool for Cryptographic Pairing Functions. PhD thesis, Dublin City University.
Charlemagne, Manuel (2010) Pairings in Cryptology: efficiency, security and applications. PhD thesis, Dublin City University.
Graham, Michelle (2010) A System for the Verication of Location Claims. PhD thesis, Dublin City University.
Benger, Naomi (2010) Cryptographic Pairings: Efficiency and DLP security. PhD thesis, Dublin City University.
Costigan, Neil (2010) Elliptic Curve Cryptography on Modern Processor Architectures. PhD thesis, Dublin City University.
Luan, Hai Ying (2010) Intrusion detection and management over the world wide web. Master of Science thesis, Dublin City University.
Fitzpatrick, Darren (2010) Intrusion Detection and Security Assessment in a University Network. Master of Science thesis, Dublin City University.
Sheedy, Caroline (2010) Privacy Enhancing Protocols using Pairing Based Cryptography. PhD thesis, Dublin City University.
Dunne, Cameron R. (2009) An architecture and protocol, an access control model, and a sighting blurring algorithm for improving users' security in the context of location based services operating over the internet. PhD thesis, Dublin City University.
Whelan, Claire (2007) Investigating power and fault analysis with specific application to bilinear pairings. PhD thesis, Dublin City University.
Oehl, Frederic Enoha (2006) Defining an approximation to formally verify cryptographic protocols. Master of Science thesis, Dublin City University.
Ó hÉigeartaigh, Colm (2006) Pairing computation on hyperelliptic curves of genus 2. PhD thesis, Dublin City University.
Tunney, David (2005) A language based on the Pi-calculus. Master of Science thesis, Dublin City University.
Candebat, Thibault (2005) A secure architecture enabling end-user privacy in the context of commercial wide-area location-enhanced web services. PhD thesis, Dublin City University.
McCullagh, Noel Michael (2005) Crytographic applications of bilinear maps. PhD thesis, Dublin City University.
Costigan, Neil (2004) Implementation of an identity based encryption sub-system for secure e-mail and other applications. Master of Science thesis, Dublin City University.
Aziz, Benyamin Y. Y. (2003) A static analysis framework for security properties in mobile and cryptographic systems. PhD thesis, Dublin City University.
Brady, Paul (1988) Software and hardware implementation of the RSA public key cipher. Master of Engineering thesis, Dublin City University.