University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Author is "Wesemeyer, S"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 15.


Han, Jinguang, Chen, Liqun, Schneider, Steve, Treharne, Helen, Wesemeyer, Stephan and Wilson, Nick (2020) Anonymous Single Sign-On With Proxy Re-Verification IEEE Transactions on Information Forensics and Security, 15 (1). pp. 223-236.

Han, Jinguang, Chen, Liqun, Schneider, Steve, Treharne, Helen and Wesemeyer, Steve (2019) Privacy-Preserving Electronic Ticket Scheme with Attribute-Based Credentials IEEE Transactions on Dependable and Secure Computing.

Whitefield, Jorden, Chen, Liqun, Kargl, F, Paverd, A, Schneider, Steven, Treharne, Helen and Wesemeyer, Stephan (2017) Formal Analysis of V2X Revocation Protocols. Proceedings of STM’17. Lecture Notes in Computer Science., 10547. pp. 147-163.

Alfraih, AS, Briffa, JA and Wesemeyer, S (2015) Cloning localization approach using k-means clustering and support vector machine JOURNAL OF ELECTRONIC IMAGING, 24 (4), ARTN 04301.

Diakos, TP, Briffa, JA, Brown, TWC and Wesemeyer, S (2013) Eavesdropping Near Field Contactless Payments: A Quantitative Analysis IET Journal of Engineering.

Sweeney, P and Wesemeyer, S (2000) Iterative soft-decision decoding of linear block codes IEE PROCEEDINGS-COMMUNICATIONS, 147 (3). pp. 133-136.

Wesemeyer, S and Sweeney, P (1998) Suboptimal soft-decision decoding for some RS-codes ELECTRONICS LETTERS, 34 (10). pp. 983-984.

Wesemeyer, S (1998) On the automorphism group of various Goppa codes IEEE TRANSACTIONS ON INFORMATION THEORY, 44 (2). pp. 630-643.

Conference or Workshop Item

Whitefield, Jorden, Chen, Liqun, Sasse, Ralf, Schneider, Steve, Treharne, Helen and Wesemeyer, Stephan (2019) A Symbolic Analysis of ECC-based Direct Anonymous Attestation In: 4th IEEE European Symposium on Security and Privacy, 17-19 Jun 2019, Stockholm, Sweden.

Han, Jinguang, Chen, Liqun, Schneider, Steve, Treharne, Helen and Wesemeyer, Stephan (2018) Anonymous Single-Sign-On for n designated services with traceability In: 23rd European Symposium on Research in Computer Security (ESORICS) 2018, 2018-09-03-2018-09-07, Barcelona, Spain.

Alfraih, AS, Briffa, JA and Wesemeyer, S (2015) Cloning Localization Based on Feature Extraction and K-means Clustering In: 13th International Workshop on Digital-Forensics and Watermarking (IWDW), 2014-10-01 - 2014-10-04, Natl Dong Hwa Univ, Taipei, TAIWAN.

Alshehri, AA, Briffa, JA, Schneider, SA and Wesemeyer, S (2013) Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR In: NFC 2013 : 5th International Workshop On Near Field Communication, 2013-02-05 - 2013-02-05, Zurich.

Briffa, JA, Schaathun, HG and Wesemeyer, S (2010) An Improved Decoding Algorithm for the Davey-MacKay Construction In: IEEE International Conference on Communications (ICC), 2010, 2010-05-23 - 2010-05-27, Cape Town.

Wesemeyer, S, Sweeney, P and Burgess, DRB (1999) Some soft-decision decoding algorithms for Reed-Solomon codes In: 7th IMA Conference on Cryptography and Coding, 1999-12-20 - 1999-12-22, ROYAL AGR COLL, CIRENCESTER, ENGLAND.

Alfraih, AA, Briffa, JA and Wesemeyer, S Forgery Localization Based on Image Chroma Feature Extraction In: Intern. Conf. on Imaging for Crime Detection and Prevention (ICDP), 2013-12-16 - 2013-12-17, London.

This list was generated on Mon Feb 24 12:38:54 2020 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800