University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Items where Academic/Research unit is "Faculty of Engineering and Physical Sciences > Computer Science"

Up a level
Export as [feed] RSS 1.0 [feed] RSS 2.0
Group by: Authors | Item Type | No Grouping
Jump to: A | D | F | G | H | J | K | L | M | P | S | T | Z
Number of items: 37.


Abdelhalim, I, Schneider, SA and Treharne, H (2013) An integrated framework for checking the behaviour of fUML models using CSP International Journal on Software Tools for Technology Transfer, 15 (4). pp. 375-396.

Ahmad, JJ, Li, S and Mattavelli, M (2013) Performance Benchmarking of RVC Based Multimedia Specifications In: 20th IEEE International Conference on Image Processing (ICIP 2013), 2013-09-15 - 2013-09-18, Melbourne, Australia.

Ahmad, JJ, Li, S, Thavot, R and Mattavelli, M (2013) Secure computing with the MPEG RVC framework Signal Processing: Image Communication, 28 (10). pp. 1315-1334.

Ahmadi, Omran and Granger, Robert (2013) An efficient deterministic test for Kloosterman sum zeros Mathematics of Computation, 83 (285). pp. 347-363.

Alshehri, AA, Briffa, JA, Schneider, SA and Wesemeyer, S (2013) Formal Security Analysis of NFC M-coupon Protocols using Casper/FDR In: NFC 2013 : 5th International Workshop On Near Field Communication, 2013-02-05 - 2013-02-05, Zurich.

Asghar, HJ, Pieprzyk, J, Li, S and Wang, H (2013) Cryptanalysis of the convex hull click human identification protocol International Journal of Information Security, 12 (2). pp. 83-96.


Diakos, T, Brown, TWC and Briffa, JA (2013) Evaluating the eavesdropping range of varying magnetic field strengths in NFC standards In: European Conference of Antennas and Propagation, 2013-04-08 - ?.

Diakos, TP, Briffa, JA, Brown, TWC and Wesemeyer, S (2013) Eavesdropping Near Field Contactless Payments: A Quantitative Analysis IET Journal of Engineering.


Fleischhacker, N, Günther, F, Kiefer, F, Manulis, M and Poettering, B (2013) Pseudorandom Signatures


Gardner, B, Gruening, A, Mladenov, V, KoprinkovaHristova, P, Palm, G, Villa, AEP, Appollini, B and Kasabov, N (2013) Learning Temporally Precise Spiking Patterns through Reward Modulated Spike-Timing-Dependent Plasticity In: 23rd International Conference on Artificial Neural Networks (ICANN), 2013-09-10 - 2013-10-13, Techn Univ Sofia, Sofia, BULGARIA.

Gillam, L, Li, B, O'Loughlin, J and Singh Tomar, AP (2013) Fair Benchmarking for Cloud Computing systems Journal of Cloud Computing: Advances, Systems and Applications, 2 (6).

Granger, Robert and Moss, Andrew (2013) Generalised Mersenne numbers revisited Mathematics of Computation, 82 (284). pp. 2389-2420.

Göloğlu, Faruk, Granger, Robert, McGuire, Gary and Zumbrägel, Jens (2013) On the Function Field Sieve and the Impact of Higher Splitting Probabilities In: The 33rd Annual Cryptology Conference - Advances in Cryptology - CRYPTO 2013, 18-22 Aug 2013, Santa Barbara, CA, USA.


Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.

Heather, JA, Schneider, SA and Teague, VJ (2013) Proceedings of Vote-ID 2013 Technical Report. (Unpublished)


James, P, Moller, F, Nguyen, HN, Roggenbach, M, Schneider, SA and Treharne, H (2013) On Modelling and Verifying Railway Interlockings: Tracking Train Lengths Technical Report.

James, P, Trumble, M, Treharne, H, Roggenbach, M and Schneider, S (2013) OnTrack: An Open Tooling Environment for Railway Verification. NASA Formal Methods, 7871. pp. 435-440.


Kafas, K, Aljaffan, N and Li, S (2013) Poster: Visual Password Checker In: 9th Symposium On Usable Privacy and Security (SOUPS 2013), 2013-07-24 - 2013-07-26, Newcastle, UK.

Kirk, Paul, Thorne, Tom and Stumpf, Michael P.H (2013) Model selection in systems and synthetic biology Current Opinion in Biotechnology, 24 (4).


Le, MN, Ong, YS, Menzel, S, Jin, Y and Sendhoff, B (2013) Evolution by Adapting Surrogates EVOLUTIONARY COMPUTATION, 21 (2). pp. 313-340.

Liang, Kaitai, Fang, Liming, Susilo, Willy and Wong, Duncan S. (2013) A Ciphertext-Policy Attribute-Based Proxy Re-encryption with Chosen-Ciphertext Security In: 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS), 2013, 9-11 Sept. 2013, Xi'an, China.

Liang, Kaitai, Huang, Qiong, Schlegel, Roman, Wong, Duncan S. and Tang, Chunming (2013) A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release In: ISPEC 2013: 9th International Conference on Information Security Practice and Experience, 12-24 May 2013, Lanzhou, China.

Liyanage, H, Liaw, ST, Kuziemsky, C and de Lusignan, S (2013) Ontologies to improve chronic disease management research and quality improvement studies - a conceptual framework. Stud Health Technol Inform, 192. pp. 180-184.

Llewellyn, M, Schneider, SA, Xia, Z, Culnane, C, Heather, J, Ryan, PYA and Srinivasan, S (2013) Testing Voters’ Understanding of a Security Mechanism Used in Verifiable Voting The USENIX Journal of Election Technology and Systems, 1, 1. pp. 53-61.


Manulis, M, Suzuki, K and Ustaoglu, B (2013) Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange IEICE Transactions, 96-A, 1. pp. 101-110.

Meng, Y, Guo, H and Jin, Y (2013) A morphogenetic approach to flexible and robust shape formation for swarm robotic systems Robotics and Autonomous Systems, 61 (1). pp. 25-38.

Moller, F, Nguyen, HN, Roggenbach, M, Schneider, S and Treharne, H (2013) Defining and model checking abstractions of complex railway models using CSP||B Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 7857 L. pp. 193-208.

Moran, M, Heather, J and Schneider, S (2013) Automated Anonymity Verification of the ThreeBallot Voting System.

Moran, M, Heather, JA and Schneider, SA (2013) Automated Anonymity Verification of ThreeBallot Voting System In: 10th International Conference, IFM 2013, 2013-06-10 - 2013-06-14, Turku, Finland.

Moran, Murat and Heather, James (2013) Automated Analysis of Voting Systems with Dolev-Yao Intruder Model In: 13th International Workshop on Automated Verification of Critical Systems (AVoCS), 11-13 Sept 2013, University of Surrey.

Moran, Murat, Heather, James and Schneider, Steve (2013) Automated Anonymity Verification of the ThreeBallot Voting System Integrated Formal Methods (iFM) Proceedings, 7940. pp. 94-108.


Peacock, T, Ryan, PYA, Schneider, S and Xia, Z (2013) Verifiable Voting Systems Computer and Information Security Handbook. pp. 1103-1125.


Schmitz, R, Li, S, Grecos, C and Zhang, X (2013) Towards More Robust Commutative Watermarking-Encryption of Images In: 15th IEEE International Symposium on Multimedia (ISM 2013), 2013-12-09 - 2013-12-11, Anaheim, California, USA.

Sporea, Ioana and Gruning, Andre (2013) Supervised Learning in Multilayer Spiking Neural Networks. Neural Computation, 25 (2), 2. pp. 473-509.


Tang, HL, Goh, J, Hu, Y, Wang, S, Peto, T, Saleh, GM, Ling, BW-K and Al turk, LI (2013) The Reading of Components of Diabetic Retinopathy: An Evolutionary Approach for Filtering Normal Digital Fundus Imaging in Screening and Population Based Studies PLoS ONE, 8 (7).

Tang, HL, Goh, J, Peto, T, Ling, BW, Al Turk, LI, Hu, Y, Wang, S and Saleh, GM (2013) The reading of components of diabetic retinopathy: an evolutionary approach for filtering normal digital fundus imaging in screening and population based studies. PLoS One, 8 (7).


Zhuang, L, Tang, K and Jin, Y (2013) Metamodel assisted mixed-integer evolution strategies based on Kendall rank correlation coefficient Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8206 L. pp. 366-375.

This list was generated on Tue Mar 2 02:23:14 2021 UTC.

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800