Publications

2017

Why Banker Bob (still) can't get TLS right: A Security Analysis of TLS in Leading UK Banking Apps

Tom Chothia, Flavio D. Garcia, Chris Heppel and Chris McMahon Stone 2017 Financial Cryptography 18p

An Attack Against Message Authentication in the ERTMS Train to Trackside Communication Protocols

Tom Chothia, Mihai Ordean, Joeri de Ruiter and Richard J. Thomas 2017 ACM on Asia Conference on Computer and Communications Security 743-756

2016

Smart-Guard: Defending User Input from Malware

Michael Denzel, Alessandro Bruni and Mark D. Ryan 2016 IEEE Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress 502-509

On the (in)security of the Latest Generation Implantable Cardiac Defibrillators and How to Secure Them

Eduard Marin, Dave Singelee, Flavio D Garcia, Tom Chothia, Rik Willems and Bart Preneel 2016 32nd Annual Conference on Computer Security Applications 226-236

Asset-centric Security-Aware Service Solution

Giannis Tziakouris, Marios Zinonos, Tom Chothia and Rami Bahsoon 2016 IEEE International Congress on Big Data 327-332

LeiA: A Lightweight Authentication Protocol for CAN

Andreea-Ina Radu and Flavio D Garcia 2016 Springer Lecture Notes in Computer Science 9879 ESORICS, 283-300

BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme

Pyrros Chaidos, Veronique Cortier, Georg Fuchsbauer and David Galindo 2016 ACM SIGSAC Conference on Computer and Communications Security 1614-1625

Wireless Attacks on Automotive Remote Keyless Entry Systems

David Oswald 2016 ACM 6th International Workshop on Trustworthy Embedded Devices 43-44

Side-Channel Attacks on Fingerprint Matching Algorithms

Markus Durmuth, David Oswald and Niklas Pastewka 2016 ACM 6th International Workshop on Trustworthy Embedded Devices 3-13

Attacking embedded ECC implementations through cmov side channels

Erick Nascimento, Lukasz Chmielewski, David Oswald and Peter Schwabe 2016 IACR Cryptology ePrint Archive 923, 22p

Analysis of Privacy in Mobile Telephony Systems

Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter and Mark Dermot Ryan 2016 International Journal of Information Security 33p

DTKI: a new formalized PKI with verifiable trusted parties

Jiangshan Yu, Vincent Cheval and Mark Ryan 2016 The Computer Journal

A Formal Security Analysis of ERTMS Train to Trackside Protocols

Joeri de Ruiter, Richard J. Thomas and Tom Chothia 2016 Springer Lecture Notes in Computer Science 9707 Reliability, Safety and Security of Railway Systems: Modelling, Analysis, Verification and Certification, 53-68

Learning From Others’ Mistakes: Penetration Testing IoT Devices in the Classroom

Tom Chothia and Joeri de Ruiter 2016 USENIX Workshop on Advances in Security Education

Lock It and Still Lose It—On the (In)Security of Automotive Remote Keyless Entry Systems

Flavio D. Garcia, David Oswald, Timo Kasper and Pierre Pavlides 2016 USENIX 25th Security Symposium

The Fall of a Tiny Star

Flavio D. Garcia and Bart Jacobs 2016 The New Codebreakers 69-87. Peter Y.A. Ryan, David Naccache and Jean-Jacques Quisquater (eds.). Springer

Compositional schedulability analysis of real-time actor-based systems

Mohammad Mahdi Jaghoori, Frank Boer, Delphine Longuet, Tom Chothia and Marjan Sirjani 2016 Acta Informatica 36p

Side-Channel Attacks on SHA-1-Based Product Authentication ICs

David Oswald 2016 Springer Lecture Notes in Computer Science 9514 Smart Card Research and Advanced Applications, 3-14

Extended security arguments for signature schemes

Ozgur Dagdelen, David Galindo, Pascal Veron, Sidi Mohamed El Yousfi Alaoui and Pierre-Louis Cayrel 2016 Designs, Codes and Cryptography 78(2), 441-461

Implementation of a leakage-resilient ElGamal key encapsulation mechanism

David Galindo, Johann Großschädl, Zhe Liu, Praveen Kumar Vadnala and Srinivas Vivek 2016 Journal of Cryptographic Engineering 10p

Transitioning to a Javascript Voting Client for Remote Online Voting

Jordi Cucurull, Sandra Guasch and David Galindo 2016 13th International Joint Conference on e-Business and Telecommunications 121-132

SoK: Verifiability Notions for E-Voting Protocols

Veronique Cortier, David Galindo, Ralf Kusters, Johannes Muller and Tomasz Truderung 2016 IEEE Symposium on Security and Privacy 20p

Verifiability notions for e-voting protocols

Veronique Cortier, David Galindo, Ralf Kusters, Johannes Muller and Tomasz Truderung 2016 Technical Report, Cryptology ePrint Archive 287, 49p

On the Security of Supersingular Isogeny Cryptosystems

Steven Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti 2016 Springer Lecture Notes in Computer Science 10031, ASIACRYPT 2016 - Advances in Cryptology, 63-91

Efficient Zero-Knowledge Protocols for Arithmetic Circuits in the Discrete Log Setting

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Jens Groth, Christophe Petit 2016 Springer Lecture Notes in Computer Science 9666 EUROCRYPT 2016 - Advances in Cryptology, 327-357

Algebraic approaches for the elliptic curve discrete logarithm problem over prime fields

Christophe Petit, Michiel Kosters, Ange Messeng 2016 Springer Lecture Notes in Computer Science 9615 IACR 19th International Conference on Practice and Theory in Public-Key Cryptography, 3-18

Fibrational Modal Type Theory

Valeria de Paiva and Eike Ritter 2016 Electronic Notes in Theoretical Computer Science: 10th Workshop on Logical and Semantic Frameworks, with Applications 323, 143-161

A Systematic Review of Service Level Management in the Cloud

Funmilade Faniyi and Rami Bahsoon 2016 ACM Computing Surveys 48(3:43)

Sustainability debt: a portfolio-based approach for evaluating sustainability requirements in architectures

Bendra Ojameruaye, Rami Bahsoon, Leticia Duboc 2016 38th International Conference on Software Engineering 543-552

A taxonomy for architectural stability

Maria Salama, Rami Bahsoon 2016 31st ACM Symposium on Applied Computing 1354-1357

Dynamic Software Project Scheduling through a Proactive-Rescheduling Method

Xiaoning Shen, Leandro L. Minku, Rami Bahsoon, Xin Yao 2016 IEEE Transactions on Software Engineering 42(7), 658-686

Microservices and Their Design Trade-Offs: A Self-Adaptive Roadmap

Sara Hassan and Rami Bahsoon 2016 IEEE International Conference on Services Computing 813-818

Diversifying Software Architecture for Sustainability: A Value-Based Perspective

Dalia Sobhy, Rami Bahsoon, Leandro Minku and Rick Kazman 2016 Springer Lecture Notes in Computer Science 9839 Software Architecture, 55-63

Database Design Debts through Examining Schema Evolution

Mashel Al-Barak and Rami Bahsoon 2016 IEEE 8th International Workshop on Managing Technical Debt 17-23

Interaction-Awareness for Self-Adaptive Volunteer Computing

Abdessalam Elhabbash, Rami Bahsoon, Peter Tino 2016 IEEE 10th International Conference on Self-Adaptive and Self-Organizing Systems 148-149

Elasticity debt: a debt-aware approach to reason about elasticity decisions in the cloud

Carlos Mera-Gomez, Rami Bahsoon and Rajkumar Buyya 2016 ACM 9th International Conference on Utility and Cloud Computing 79-88

Synthesizing efficient systems in probabilistic environments

Christian von Essen, Barbara Jobstmann, David Parker, Rahul Varshneya 2016 Acta Informatica 53(4), 425-457

Formal Quantitative Analysis of Reaction Networks Using Chemical Organisation Theory

Chunyan Mu, Peter Dittrich, David Parker , Jonathan E. Rowe 2016 Springer Lecture Notes in Computer Science 9859 Computational Methods in Biology, 232-251

Quantitative Verification and Synthesis of Attack-Defence Scenarios

Zaruhi Aslanyan, Flemming Nielson, David Parker 2016 IEEE 29th Computer Security Foundations Symposium 105-119

Finite-Horizon Bisimulation Minimisation for Probabilistic Systems

Nishanthan Kamaleson, David Parker and Jonathan E. Rowe 2016 Springer Lecture Notes in Computer Science 9641 Model Checking Software, 147-164

PRISM-Games 2.0: A Tool for Multi-objective Strategy Synthesis for Stochastic Games

Marta Kwiatkowska, David Parker and Clemens Wiltsche 2016 Springer Lecture Notes in Computer Science 9636 Tools and Algorithms for the Construction and Analysis of Systems, 560-566

2015

Device attacker models: fact and fiction

Jiangshan Yu and Mark D. Ryan 2015 Security Protocols XXIII 158-167

Formal analysis of privacy in Direct Anonymous Attestation schemes

Ben Smyth, Mark D. Ryan, and Liqun Chen 2015 Science of Computer Programming 111(2), 300-317

Du-Vote: Remote Electronic Voting with Untrusted Computers

Gurchetan Grewal, Mark D. Ryan, Liqun Chen and Michael R. Clarkson 2015 28th IEEE Computer Security Foundations Symposium CSF 2015, 155-169

Privacy and Security in an Age of Surveillance

Bar Preneel, Phillip Rogaway, Mark D. Ryan and Peter Y.A. Ryan 2015 Dagstuhl Manifesto 5(1), 25-37

Time-release protocol from Bitcoin and Witness Encryption for SAT

Jia Liu, Flavio Garcia and Mark Ryan 2015 IACR Cryptology ePrint Archive 482

How to detect unauthorised usage of a key

Jiangshan Yu, Mark Ryan and Cas Cremers 2015 IACR Cryptology ePrint Archive 486

An Offline Capture The Flag-Style Virtual Machine and an Assessment of its Value for Cybersecurity Education

Tom Chothia and Chris Novakovic 2015 USENIX 3GSE'15

Calculating Quantitative Integrity and Secrecy for Imperative Programs

Tom Chothia, Chris Novakovic and Rajiv Ranjan Singh 2015 International Journal of Secure Software Engineering 6(2), 23-46

Relay Cost Bounding for Contactless EMV Payments

Tom Chothia, Flavio D. Garcia, Joeri de Ruiter, Jordi van den Breekel and Matthew Thompson 2015 Financial Cryptography 189-206

Automatically Checking Commitment Protocols in ProVerif without False Attacks

Tom Chothia, Ben Smyth and Chris Staite 2015 Springer Lecture Notes in Computer Science 9036 Principles of Security and Trust, 137-155

Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware Detection

Nada Alruhaily, Behzad Bordbar and Tom Chothia 2015 IEEE Trustcom/BigDataSE/ISPA 766-773

Automatically Calculating Quantitative Integrety Measures for Imperative Programs

Tom Chothia, Chris Novakovic and Rajiv Ranjan Singh 2015 Springer Lecture Notes in Computer Science 8872 Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 250-265

Cryptanalysis of the Megamos Crypto Automotive Immobilizer

Roel Verdult and Flavio D. Garcia 2015 USENIX ;login: 40(6), 17-22

Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer

Roel Verdult, Flavio D. Garcia and Baris Ege 2015 22nd USENIX Security Symposium 703-718

Physical Security Evaluation of the Bitstream Encryption Mechanism of Altera Stratix II and Stratix III FPGAs

Pawel Swierczynski, Amir Moradi, David Oswald and Christof Paar 2015 ACM Transactions on Reconfigurable Technology and Systems 7(4) 34, 23p

SCANDALee: A Side-ChANnel-based DisAssembLer using Local Electromagnetic Emanations

Daehyun Strobel, Florian Bache, David Oswald, Falk Schellenberg and Christof Paar 2015 IEEE Design, Automation & Test in Europe Conference & Exhibition 139-144

Compact hierarchical identity-based encryption based on a harder decisional problem

David Galindo 2015 International Journal of Computer Mathematics 92(3), 463-472

SoK: A Comprehensive Analysis of Game-Based Ballot Privacy Definitions

David Bernhard, Veronique Cortier, David Galindo, Olivier Pereira and Bogdan Warinschi 2015 IEEE Symposium on Security and Privacy 499-516

2015 Neuchatel's Cast-as-Intended Verification Mechanism

David Galindo, Sandra Guasch and Jordi Puiggali 2015 Springer Lecture Notes in Computer Science 9269 E-Voting and Identity, 3-18

BeleniosRF: A Strongly Receipt-Free Electronic Voting Scheme

Veronique Cortier, Georg Fuchsbauer and David Galindo 2015 IACR Cryptology ePrint Archive 629, 16p

Short Accountable Ring Signatures from the DDH Assumption

Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth, Christophe Petit 2015 Springer Lecture Notes in Computer Science 9326 ESORICS - 20th European Symposium on Research in Computer Security, 243-265

Permissive Controller Synthesis for Probabilistic Systems

Klaus Drager, Vojtech Forejt, Marta Kwiatkowska, David Parker and Mateusz Ujma 2015 Logical Methods in Computer Science 11(2:16)

Verification and Control of Partially Observable Probabilistic Real-Time Systems

Gethin Norman, David Parker and Xueyi Zou 2015 Springer Lecture Notes in Computer Science 9268 Formal Modeling and Analysis of Timed Systems, 240-255

The Hanoi Omega-Automata Format

Tomás Babiak, Frantisek Blahoudek, Alexandre Duret-Lutz, Joachim Klein, Jan Kretínský, David Müller, David Parker, Jan Strejcek 2015 Springer Lecture Notes in Computer Science 9206 Computer Aided Verification, 479-486

Optimal Policy Generation for Partially Satisfiable Co-Safe LTL Specifications

Bruno Lacerda, David Parker and Nick Hawes 2015 International Joint Conference on Artificial Intelligence Organization 2015, 1587-1593

A risk - aware framework for compliance goal-obstacle analysis

Bendra Ojameruaye and Rami Bahsoon 2015 ACM 30th Symposium on Applied Computing 1401-1402

Architectural Aspects of Self-Aware and Self-Expressive Computing Systems: From Psychology to Engineering

Peter R. Lewis, Arjun Chandra, Funmilade Faniyi, Kyrre Glette, Tao Chen, Rami Bahsoon, Jim Tørresen, Xin Yao 2015 Computer 48(8), 62-70

Toward a Smarter Cloud: Self-Aware Autoscaling of Cloud Configurations and Resources

Tao Chen, Rami Bahsoon 2015 Computer 48(9), 93-96

Implementing Design Diversity Using Portfolio Thinking to Dynamically and Adaptively Manage the Allocation of Web Services in the Cloud

Faisal ALRebeish and Rami Bahsoon 2015 IEEE Transactions on Cloud Computing 3(3), 318-331

Quality-Driven Architectural Patterns for Self-Aware Cloud-Based Software

Maria Salama, Rami Bahsoon 2015 IEEE 8th International Conference on Cloud Computing 844-851

Minimizing Nasty Surprises with Better Informed Decision-Making in Self-Adaptive Systems

Sara Hassan, Nelly Bencomo, Rami Bahsoon 2015 IEEE/ACM 10th International Symposium on Software Engineering for Adaptive and Self-Managing Systems 134-145

Stabilising Performance in Cloud Services Composition Using Portfolio Theory

Faisal ALRebeish and Rami Bahsoon 2015 IEEE International Conference on Web Services 1-8

Self-Adaptive Volunteered Services Composition through Stimulus- and Time-Awareness

Abdessalam Elhabbash, Rami Bahsoon, Peter Tino, Peter R. Lewis 2015 IEEE International Conference on Web Services 57-64

The IEEE Services Visionary Track on the Future of Software Engineering for/in the Cloud

Rami Bahsoon, Nour Ali, Ivan Mistrík, T. S. Mohan 2015 IEEE World Congress on Services 29-30

The Visionary Track on Engineering Mobile Service Oriented Systems

Nour Ali, Rami Bahsoon, Ian Gorton 2015 IEEE World Congress on Services 103-104

2015 IEEE World Congress on Services

Liang-Jie Zhang, Rami Bahsoon (eds.) 2015 IEEE Computer Security

Organising Monkeys or How to Run a Hacking Club

Andreea-Ina Radu and Sam L. Thomas 2015 Vibrant Workshop 2015 The First UK Workshop on Cybersecurity Training & Education

2014

A Future for Privacy

Joshua Phillips and Mark D. Ryan 2014 Privacy vs. Security: Springer Briefs in Cybersecurity 91-115. Sophia Stalla-Bourdillon, Joshua Phillips and Mark D. Ryan (eds.). Springer

StatVerif: Verification of stateful processes

Myrto Arapinis, Joshua Phillips, Eike Ritter, Mark D. Ryan 2014 Journal of Computer Security 22(5), 743-821

Balancing Societal Security and Individual Privacy: Accountable Escrow System

Jia Liu, Mark D. Ryan and Liqun Chen 2014 27th IEEE Computer Security Foundations Symposium 427-440

Privacy through Pseudonymity in Mobile Telephony Systems

Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter and Mark Ryan 2014 Network and Distributed System Security 14p

Enhanced Certificate Transparency and End-toend Encrypted Mail

Mark D. Ryan 2014 Network and Distributed System Security 14p

Stateful Applied Pi Calculus

Myrto Arapinis, Jia Liu, Eike Ritter and Mark Ryan 2014 Springer Lecture Notes in Computer Science 8414 Principles of Security and Trust, 22-41

Tests for Establishing Security Properties

Vincent Cheval, Stephanie Delaune and Mark Ryan 2014 Springer Lecture Notes in Computer Science 8902 Trustworthy Global Computing, 82-96

Dynamic Measurement and Protected Execution: Model and Analysis

Shiwei Xu, Ian Battern and Mark Ryan 2014 Springer Lecture Notes in Computer Science 8358 Trustworthy Global Computing, 45-63

LeakWatch: Estimating Information Leakage from Java Programs

Tom Chothia, Yusuke Kawamoto and Chris Novakovic 2014 Springer Lecture Notes in Computer Science 8713 Computer Security – ESORICS, 219-236

Wirelessly lockpicking a smart card reader

Flavio D. Garcia, Gerhard de Koning Gans and Roel Verdult 2014 International Journal of Information Security 13(5), 403-420

Sweet Dreams and Nightmares: Security in the Internet of Things

Timo Kasper, David Oswald and Christof Paar 2014 Springer Lecture Notes in Computer Science 8501 Information Security Theory and Practice, Securing the Internet of Things, 1-9

Microcontrollers as (In)Security Devices for Pervasive Computing Applications

Daehyun Strobel, David Oswald, Basian Richter, Falk Schellenberg and Christof Paar 2014 Proceedings of the IEEE 102(8), 1157-1173

Cryptographic Algorithms on the GA144 Asynchronous Multi-Core Processor - Implementation and Side-Channel Analysis

Tobias Shneider, Ingo von Maurich, Tim Guneysu and David Oswald 2014 Journal of Signal Processing Systems 77(1-2), 151-167

Limits of a conjecture on a leakage-resilient cryptosystem

David Galindo and Srinivas Vivek 2014 Infomation Processing Letters 114(4), 192-196

Election Verifiability for Helios under Weaker Trust Assumptions

Veronique Cortier, David Galindo, Stephane Glondu and Malika Izabachene 2014 Springer Lecture Notes in Computer Science 84713 Computer Security – ESORICS 2014, 327-344

Implementation and Evaluation of a Leakage-Resilient ElGamal Key Encapsulation Mechanism

David Galindo, Johann Grossschadl, Zhe Ziu, Praveen Kumar Vadnala and Srinivas Vivek 2014 IACR Cryptology ePrint Archive 835, 23p

First fall degree and Weil Descent

Tim Hodges, Christophe Petit and Jacob Schlather 2014 Finite Fields and their Applications 30, 155-177

On the quaternion l-isogeny path problem

David Kohel, Kristin Lauter, Christophe Petit, Jean-Pierre Tignol 2014 LMS Journal of Computation and Mathematics 17(A), 418-432

Finding Roots in GF(p^n) with the Successive Resultant Algorithm

Christophe Petit 2014 LMS Journal of Computation and Mathematics 17(A), 203-217

On a particular case of the bisymmetric equation for quasigroups

Christophe Petit, François-Xavier Standaert, Mathieu Renauld 2014 Acta Mathematica Hungarica 143(2), 330-336

Provable security of a pairing-free one-pass authenticated key establishment protocol for wireless sensor networks

Rehana Yasmin, Eike Ritter and Guilin Wang 2014 International Journal of Information Security 13(5), 453-465

A proof-theoretic analysis of the classical propositional matrix method

David J. Pym, Eike Ritter and Edmund Robinson 2014 Journal of Logic and Computation 24(1), 283-301

Verification of Markov Decision Processes using Learning Algorithms

Tomas Brazdil, Krishnendu Chatterjee, Martin Chmelik, Vojtech Forejt, Jan Kretinsky, Marta Kwiatkowska, David Parker and Mateusz Ujma 2014 Springer Lecture Notes in Computer Science 8837 Automated Technology for Verification and Analysis, 98-114

Local abstraction refinement for probabilistic timed programs

Klaus Dräger, Marta Z. Kwiatkowska, David Parker, Hongyang Qu 2014 Theoretical Computer Science 538, 37-53

Probabilistic Model Checking of Labelled Markov Processes via Finite Approximate Bisimulations

Alessandro Abate, Marta Z. Kwiatkowska, Gethin Norman, David Parker 2014 Springer Lecture Notes in Computer Science 8464 Horizons of the Mind: A Tribute to Prakash Panangaden, 40-58

On Incremental Quantitative Verification for Probabilistic Systems

Marta Z. Kwiatkowska, David Parker, Hongyang Qu, Mateusz Ujma 2014 HOWARD-60: A Festschrift on the Occasion of Howard Barringer's 60th Birthday 245-257

Optimal and dynamic planning for Markov decision processes with co-safe LTL specifications

Bruno Lacerda, David Parker, Nick Hawes 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems 1511-1516

Permissive Controller Synthesis for Probabilistic Systems

Klaus Dräger, Vojtech Forejt, Marta Z. Kwiatkowska, David Parker, Mateusz Ujma 2014 Springer Lecture Notes in Computer Science 8413 Tools and Algorithms for the Construction and Analysis of Systems, 531-546

Securing Cloud Users at Runtime via a Market Mechanism: A Case for Federated Identity

Giannis Tziakouris, Carlos Joseph Mera Gomez and Rami Bahsoon 2014 IEEE 6th International Symposium on Cyberspace Safety and Security 221-228

Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory

Bendra Ojameruaye and Rami Bahsoon 2014 Springer Lecture Notes in Computer Science 8396 Requirements Engineering: Foundation for Software Quality, 152-167

Scalable service-oriented replication with flexible consistency guarantee in the cloud

Tao Chen, Rami Bahsoon, Abdel-Rahman H. Tawil 2014 Information Sciences 264, 349-370

Evaluating Technical Debt in Cloud-Based Architectures Using Real Options

Esra Alzaghoul, Rami Bahsoon 2014 IEEE 23rd Australian Software Engineering Conference 1-10

Predicting and quantifying the technical debt in cloud software engineering

Georgios Skourletopoulos, Constandinos X. Mavromoustakis, Rami Bahsoon, George Mastorakis, Evangelos Pallis 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks 36-40

Towards Self-Aware Service Composition

Abdessalam Elhabbash, Rami Bahsoon, Peter Tino 2014 IEEE International Conference on High Performance Computing and Communications; IEEE 6th International Symposium on Cyberspace Safety and Security; and IEEE 11th International Conference on Embedded Software 1275-1279

Symbiotic and sensitivity-aware architecture for globally-optimal benefit in self-adaptive cloud

Tao Chen, Rami Bahsoon 2014 ACM 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems 85-94

Requirements-Driven Social Adaptation: Expert Survey

Malik Almaliki, Funmilade Faniyi, Rami Bahsoon, Keith Phalp, Raian Ali 2014 Springer Lecture Notes in Computer Science 8396 Requirements Engineering: Foundation for Software Quality, 72-87

Cloud adoption: prioritizing obstacles and obstacles resolution tactics using AHP

Shehnila Zardari, Rami Bahsoon, Anikó Ekárt 2014 ACM 29th Symposium on Applied Computing 1013-1020

Green-as-a-service (GaaS) for cloud service provision operation

Mahamat Issa Hassan, Rami Bahsoon 2014 ACM 29th Symposium on Applied Computing 1219-1220

Online QoS Modeling in the Cloud: A Hybrid and Adaptive Multi-learners Approach

Tao Chen, Rami Bahsoon, Xin Yao 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing 327-336

A Utility Model for Volunteered Service Composition

Abdessalam Elhabbash, Rami Bahsoon, Peter Tino, Peter R. Lewis 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing 337-344

Architecting Self-Aware Software Systems

Funmilade Faniyi, Peter R. Lewis, Rami Bahsoon, Xin Yao 2014 IEEE/IFIP Conference on Software Architecture 91-94

2013

Privacy-supporting cloud computing by in-browser key translation

Myrto Arapinis, Sergiu Bursuc and Mark Ryan 2013 Journal of Computer Security 21(6), 847-880

Verification of agent knowledge in dynamic access control policies

Masoud Koleini, Eike Ritter and Mark Ryan 2013 Springer Lecture Notes in Computer Science 7795, 448-462

Composition of password-based protocols

Celine Chevalier, Stephanie Delaune, Steve Kremer and Mark D. Ryan 2013 Formal Methods in System Design 43(3), 369-413

Cloud computing security: The scientific challenge, and a survey of solutions

Mark D Ryan 2013 Journal of Systems and Software 96(9), 2263-2268

Practical everlasting privacy

Myrto Arapinis, Veronique Cortier, Steve Kremer and Mark Ryan 2013 Springer Lecture Notes in Computer Science 7796 Principles of Security and Trust, 21-40

Caveat Coercitor: Coercion-Evidence in Electronic Voting

Gurchetan Grewal, Mark D. Ryan, Sergiu Bursuc and Peter Y.A. Ryan 2013 IEEE Symposium on Security and Privacy 367-381

Model Checking Agent Knowledge in Dynamic Access Control Policies

Masoud Koleini, Eike Ritter and Mark Ryan 2013 Springer Lecture Notes in Computer Science 7795 Tools and Algorithms for the Construction and Analysis of Systems, 448-462

A Tool for Estimating Information Leakage

Tom Chothia, Yusuke Kawamoto and Chris Novakovic 2013 Springer Lecture Notes in Computer Science 8044 Computer Aided Verification, 690-695

Probabilistic Point-to-Point Information Leakage

Tom Chothia, Yusuke Kawamoto, Chris Novakovic and David Parker 2013 IEEE Computer Security Foundations Symposium 193-205

Cell-based privacy-friendly roadpricing

Flavio D. Garcia, Eric R. Verheul and Bart Jacobs 2013 Computers & Mathematics with Applications 65(5), 774-785

Fuming Acid and Cryptanalysis: Handy Tools for Overcoming a Digital Locking and Access Control System

Daehyun Strobel, Benedikt Driessen, Timo Kasper, Gregor Leander, David Oswald, Falk Schellenberg and Christof Paar 2013 Springer Lecture Notes in Computer Science 8042 Advances in Cryptology – CRYPTO 2013, 147-164

Side-channel attacks on the bitstream encryption mechanism of Altera Stratix II: facilitating black-box analysis using software reverse-engineering

Amir Moradi, David Oswald, Christof Paar and Pawel Swierczynski 2013 Proceedings of the ACM/SIGDA international symposium on Field programmable gate arrays 91-100

Side-Channel Attacks on the Yubikey 2 One-Time Password Generator

David Oswald, Bastian Richter and Christof Paar 2013 Springer Lecture Notes in Computer Science 8145 Research in Attacks, Intrusions and Defenses, 204-222

Rights Management with NFC Smartphones and Electronic ID Cards: A Proof of Concept for Modern Car Sharing

Timo Kasper, Alexander Kuhn, David Oswald, Christian Zenger and Christof Paar 2013 Springer Lecture Notes in Computer Science 8262 Radio Frequency Identification, 34-53

When Reverse-Engineering Meets Side-Channel Analysis - Digital Lockpicking in Practice

David Oswald, Daehyun Strobel, Falk Schellenberg, Timo Kasper and Christof Paar 2013 Springer Lecture Notes in Computer Science 8282 Selected Areas in Cryptography, 571-588

A note on an IND-CCA2 secure Paillier-based cryptosystem

David Galindo 2013 Infomation Processing Letters 113(22-24), 913-914

A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme

David Galindo and Srinivas Vivek 2013 Springer Lecture Notes in Computer Science 8308 Cryptology and Coding, 173-192

Distributed ElGamal a la Pedersen: Application to Helios

Veronique Cortier, David Galindo, Stephane Glondu and Malika Izabachene 2013 Proceedings of the 12th ACM workshop on privacy in the electronic society 131-142

A generic construction for voting correctness at minimum cost - Application to Helios

Veronique Cortier, David Galindo, Stephane Glondu and Malika Izabachene 2013 IACR Cryptology ePrint Archive 177, 23p

Improvement of Faugère et al.'s method to solve ECDLP

Huang Yun-Ju, Christophe Petit, Naoyuki Shinohara, and Tsuyoshi Takagi 2013 Springer Lecture Notes in Computer Science 8231 IWSEC 2013 - Advances in Information and Computer Security, 115-132

Rubik's for cryptographers

Christophe Petit and Jean-Jacques Quisquater 2013 Notices of the American Mathematical Society 60(6), 733-739

Automatic verification of competitive stochastic systems

Taolue Chen, Vojtech Forejt, Marta Z. Kwiatkowska, David Parker, Aistis Simaitis 2013 Formal Methods in System Design 43(1), 61-92

Model checking for probabilistic timed automata

Gethin Norman, David Parker, Jeremy Sproston 2013 Formal Methods in System Design 43(2), 164-190

Compositional probabilistic verification through multi-objective model checking

Marta Z. Kwiatkowska, Gethin Norman, David Parker, Hongyang Qu 2013 Information and Computation 232, 38-65

Automated Verification and Strategy Synthesis for Probabilistic Systems

Marta Z. Kwiatkowska, David Parker 2013 Springer Lecture Notes in Computer Science 8172 Automated Technology for Verification and Analysis, 5-22

PRISM-games: A Model Checker for Stochastic Multi-Player Games

Taolue Chen, Vojtech Forejt, Marta Z. Kwiatkowska, David Parker, Aistis Simaitis 2013 Springer Lecture Notes in Computer Science 7795 Tools and Algorithms for the Construction and Analysis of Systems, 185-191

SMT-Based Bisimulation Minimisation of Markov Models

Christian Dehnert, Joost-Pieter Katoen, David Parker 2013 Springer Lecture Notes in Computer Science 7737 Verification, Model Checking, and Abstract Interpretation, 28-47

Strategic Analysis of Trust Models for User-Centric Networks

Marta Z. Kwiatkowska, David Parker, Aistis Simaitis 2013 Electronic Proceedings in Theoretical Computer Science 112 1st International Workshop on Strategic Reasoning, 53-60

The future of software engineering IN and FOR the cloud

Rami Bahsoon, Ivan Mistrik, Nour Ali, T.S. Mohan and Nenad Medvidovic 2013 Journal of Systems and Software 89(9), 2221-2224

Risk-Aware Web Service Allocation in the Cloud Using Portfolio Theory

Faisal ALRebeish and Rami Bahsoon 2013 IEEE 10th International Conference on Services Computing 675-682

A Decentralized Self-Adaptation Mechanism for Service-Based Applications in the Cloud

Vivek Nallur, Rami Bahsoon 2013 IEEE Transactions on Software Engineering 39(5), 591-612

Using portfolio theory to diversify the dynamic allocation of web services in the cloud

Faisal ALRebeish and Rami Bahsoon 2013 ACM 15th Conference Companion on Genetic and Evolutionary Computation 197-198

Dynamic QoS Optimization Architecture for Cloud-Based DDDAS

Tao Chen, Rami Bahsoon, Georgios Theodoropoulos 2013 Procedia Computer Science 18, 1881-1890

Self-adaptive and sensitivity-aware QoS modeling for the cloud

Tao Chen, Rami Bahsoon 2013 IEEE 8th International Symposium on Software Engineering for Adaptive and Self-Managing Systems 43-52

Economics-Driven Approach for Managing Technical Debt in Cloud-Based Architectures

Esra Alzaghoul, Rami Bahsoon 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing 239-242

An Economics-Driven Approach for Automated SLA Negotiation for Cloud Services Adoption: Aspoc2

Samir Nisar, Rami Bahsoon 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing 243-246

2012

New privacy issues in mobile telephony: fix and verification

Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter, Mark Ryan, Nico Golde, Kevin Redon and Ravishankar Borgaonkar 2012 ACM Conference on Computer and Communications Security 205-216

Automatic Analysis of Security Properties of the TPM

Mark D Ryan 2012 Springer Lecture Notes in Computer Science 7711 Trusted Systems, 1-4

Privacy supporting cloud computing: ConfiChair, a case study

Myrto Arapinis, Sergiu Bursuc and Mark Ryan 2012 Springer Lecture Notes in Computer Science 7215 Principles of Security and Trust, 89-108

Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity

Myrto Arapinis, Sergiu Bursuc and Mark Ryan 2012 Springer Lecture Notes in Computer Science 7215 Principles of Security and Trust, 169-188

Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings

Mark D Ryan, Ben Smyth and Guilin Wand (eds.) 2012 Springer Lecture Notes in Computer Science 7232

The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent

Tom Chothia, Marco Cova, Chris Novakovic and Camilo Gonzalez Toro 2012 Springer Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 106 Security and privacy in Communication Networks, 185-202

Gone in 360 Seconds: Hijacking with Hitag2

Roel Verdult, Flavio D. Garcia and Josep Balasch 2012 USENIX Security Symposium 237-252

Dismantling iClass and iClass Elite

Flavio D. Garcia, Gerhard de Koning Gans, Roel Verdult and Milosch Meriac 2012 Springer Lecture Notes in Computer Science 7459 Computer Security – ESORICS 2012, 697-715

A Toolbox for RFID Protocol Analysis

Gerhard de Koning Gans, Roel Verdult and Flavio D. Garcia 2012 IEEE 4th International EURASIP Workshop on RFID Technology 27-34

Improving Side-Channel Analysis with Optimal Linear Transforms

David Oswald and Christof Paar 2012 Springer Lecture Notes in Computer Science 7771 Smart Card Research and Advanced Applications, 219-233

On the energy cost of authenticated key agreement in wireless sensor networks

David Galindo, Rodrigo Roman and Javier Lopez 2012 Wireless Communications and Mobile Computing 12(1), 133-143

Extended Security Arguments for Signature Schemes

Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo and Pierre-Louis Cayre 2012 Springer Lecture Notes in Computer Science 7374 Progress in Cryptology – AFRICACRYPT 2012, 19-34

Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience

David Galindo, Javier Herranz and Jorge Villar 2012 Springer Lecture Notes in Computer Science 7459 Computer Security – ESORICS 2012, 627-642

A Practical Leakage-Resilient Signature Scheme in the Generic Group Model

David Galindo and Srinivas Vivek 2012 Springer Lecture Notes in Computer Science 7707 Selected Areas in Cryptography, 50-65

On polynomial systems arising from a Weil descent

Christophe Petit and Jean-Jacques Quisquater 2012 7658 ASIACRYPT – Advances in Cryptology, 451-466

Towards factoring in SL(2,2^n)

Christophe Petit 2012 Design, Codes and Cryptography 71(3), 409-431

Improving the complexity of index calculus algorithms in elliptic curves over binary fields

Jean-Charles Faugère, Ludovic Perret, Christophe Petit, Guénaël Renault 2012 Springer Lecture Notes in Computer Science 7237 EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 27-44

Masking with Randomized Look Up Tables (Towards Preventing Side-Channel Attacks of All)

François-Xavier Standaert, Christophe Petit, Nicolas Veyrat-Charvillon 2012 Springer Lecture Notes in Computer Science 6805 Cryptography and Security: From Theory to Applications, 283-299

An Authentication Framework for Wireless Sensor Networks Using Identity-Based Signatures: Implementation and Evaluation

Rehana Yasmin, Eike Ritter and Guilin Wang 2012 IEICE TRANSACTIONS on Information Systems E95-D(1), 126-133

Auditable Envelopes: Tracking Anonymity Revocation Using Trusted Computing

Matt Smart and Eike Ritter 2012 Springer Lecture Notes in Computer Science 7344 Trust and Trustworthy Computing, 19-33

Probabilistic verification of Herman's self-stabilisation algorithm

Marta Z. Kwiatkowska, Gethin Norman, David Parker 2012 Formal Aspects of Computing 24(4), 661-670

Evaluation of Sustained Stochastic Oscillations by Means of a System of Differential Equations

Jorge Júlvez, Marta Z. Kwiatkowska, Gethin Norman, David Parker 2012 International Journal of Computers and Applications 19(2), 101-111

Pareto Curves for Probabilistic Model Checking

Vojtech Forejt, Marta Z. Kwiatkowska, David Parker 2012 Springer Lecture Notes in Computer Science 7561 Automated Technology for Verification and Analysis, 317-332

The PRISM Benchmark Suite

Marta Z. Kwiatkowska, Gethin Norman, David Parker 2012 IEEE 9th International Conference on Quantitative Evaluation of Systems 203-204

Incremental Runtime Verification of Probabilistic Systems

Vojtech Forejt, Marta Z. Kwiatkowska, David Parker, Hongyang Qu, Mateusz Ujma 2012 Springer Lecture Notes in Computer Science 7687 Runtime Verification, 314-319

Automatic Verification of Competitive Stochastic Systems

Taolue Chen, Vojtech Forejt, Marta Z. Kwiatkowska, David Parker, Aistis Simaitis 2012 Springer Lecture Notes in Computer Science 7214 Tools and Algorithms for the Construction and Analysis of Systems, 315-330

Advances in Probabilistic Model Checking

Marta Z. Kwiatkowska, David Parker 2012 NATO Science for Peace and Security Series – D: Information and Communication Security 33 Software Safety and Security, 126-151

Model Checking Software

Alastair Donaldson and David Parker (eds.) 2012 Springer Lecture Notes in Computer Science 7385

Agent-based trust management and prediction using D3-FRT

Olufunmilola Onolaja, Rami Bahsoon and Georgios Theodoropoulos 2012 Procedia Computer Science 9, 1119-1128

A Dynamic Data-Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation

Funmilade Faniyi, Rami Bahsoon and Georgios Theodoropoulos 2012 Procedia Computer Science 9, 1167-1176

EPiCS: Engineering Proprioception in Computing Systems

Tobias Becker, Andreas Agne, Peter R. Lewis, Rami Bahsoon, Funmilade Faniyi, Lukas Esterle, Ariane Keller, Arjun Chandra, Alexander Refsum Jensenius, Stephan C. Stilkerich 2012 IEEE 15th International Conference on Computational Science and Engineering 353-360

CloudMTD: Using real options to manage technical debt in cloud-based service selection

Esra Alzaghoul, Rami Bahsoon 2012 IEEE 4th International Workshop on Managing Technical Debt 55-62

Evaluating identity management architectures

Christopher Staite, Rami Bahsoon 2012 ACM 3rd SIGSOFT Symposium on Arhitecting Critical Systems 11-20

Self-managing SLA compliance in cloud architectures: a market-based approach

Funmilade Faniyi and Rami Bahsoon 2012 ACM 3rd SIGSOFT Symposium on Arhitecting Critical Systems 61-70

SecArch: Architecture-level Evaluation and Testing for Security

Sarah Al-Azzani, Rami Bahsoon 2012 IEEE Joint Working Conference on Software Architecture & 6th European Conference on Software Architecture 51-60

Towards Securing Client-Server Connections against Man-in-the-Middle Attacks

Mihai Ordean and Miercea Giurgiu 2012 IEEE 10th International Symposium on Electronics and Telecommunications 127-130

Catch me if you can: Using Self-Camouflaging Images to Strengthen Graphical Passwords

Mihai Ordean and Karen Renaud 2012 IEEE 8th International Conference on Intelligent Computer Communication and Processing 309-315

2011

Cloud Computing Privacy Concerns on Our Doorstep

Mark D. Ryan 2011 Communications of the ACM 54(1), 36-38

Formal Analysis of Protocols Based on TPM State Registers

Stéphanie Delaune, Steve Kremer, Mark D. Ryan and Graham Steel 2011 IEEE 25th Computer Security Foundations Symposium 66-80

A Knowledge-Based Verification Method for Dynamic Access Control Policies

Masoud Koleini and Mark Ryan 2011 Springer Lecture Notes in Computer Science 6991 Formal Methods and Software Engineering, 243-258

Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes

Ben Smyth, Mark D. Ryan, and Liqun Chen 2011 Springer Lecture Notes in Computer Science 7140 Formal Aspects of Security and Trust, 245-262

Trivitas: Voters directly verifying votes

Sergiu Bursuc, Gurchetan S. Grewal and Mark D. Ryan 2011 Springer Lecture Notes in Computer Science 7187 E-Voting and Identity, 190-207

Applied Pi Calculus

Mark D. Ryan and Ben Smyth 2011 Formal Models and Techniques for Analyzing Security Protocols – Volume 5 Cryptology and Information Security Series Chapter 6. Veronique Cortier and Steve Kremer (eds.). IOS Press

Formal Analysis of UMTS Privacy

Myrto Arapinis, Loretta Ilaria Mancini, Eike Ritter and Mark Ryan 2011 CoRR 18p

A Statistical Test for Information Leaks Using Continuous Mutual Information

Tom Chothia and Apratim Guha 2011 IEEE 25th Computer Security Foundations Symposium 177-190

Cell-based Roadpricing

Flavio D. Garcia, Eric R. Verheul and Bart Jacobs 2011 Springer Lecture Notes in Computer Science 7163 Public Key Infrastructures, Services and Applications, 106-122

Exposing iClass Key Diversification

Flavio D. Garcia, Gerhard de Koning Gans and Roel Verdult 2011 5th USENIX Workshop on Offensive Technologies 128-136

Seitenkanalanalyse kontaktloser SmartCards

Timo Kasper, David Oswald and Christof Paar 2011 Datenschutz und Datensicherheit 35(11), 786-790

Breaking Mifare DESFire MF3ICD40: Power Analysis and Templates in the Real World

David Oswald and Christof Paar 2011 Springer Lecture Notes in Computer Science 6917 Cryptographic Hardware and Embedded Systems, 207-222

Side-Channel Analysis of Cryptographic RFIDs with Analog Demodulation

Timo Kasper, David Oswald and Christof Paar 2011 Springer Lecture Notes in Computer Science 7055 RFID Security and Privacy, 61-77

Security of Wireless Embedded Devices in the Real World

Timo Kasper, David Oswald and Christof Paar 2011 Information Security Solutions Securing Electronic Business Processes, 174-189

Non-interactive distributed encryption: a new primitive for revocable privacy

Jaap-Henk Hoepman and David Galindo 2011 Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society 81-92

Fresh Re-Keying II: Securing Multiple Parties against Side-Channel and Fault Attacks

Marcel Medwed, Christophe Petit, Francesco Regazzoni, Mathieu Renauld, and François-Xavier Standaert 2011 CARDIS 2016 – Smart Card Research and Advanced Applications, 18p

Cayley hash functions

Christophe Petit, and Jean-Jacques Quisquater 2011 Encyclopedia of Cryptography and Security 183-184

True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing

Matt Smart and Eike Ritter 2011 Springer Lecture Notes in Computer Science 6906 Autonomic and Trusted Computing, 187-202

Learning-Based Compositional Verification for Synchronous Probabilistic Systems

Lu Feng, Tingting Han, Marta Z. Kwiatkowska, David Parker 2011 Springer Lecture Notes in Computer Science 6996 Automated Technology for Verification and Analysis, 511-521

A Systematic Approach to Evaluate Sustained Stochastic Oscillations.

Jorge Júlvez, Marta Z. Kwiatkowska, Gethin Norman, David Parker 2011 ISCA 3rd International Conference on Bioimformatics and Computational Biology 134-139

PRISM 4.0: Verification of Probabilistic Real-Time Systems

Marta Z. Kwiatkowska, Gethin Norman, David Parker 2011 Springer Lecture Notes in Computer Science 6806 Computer Aided Verification, 585-591

Verifying Team Formation Protocols with Probabilistic Model Checking

Taolue Chen, Marta Z. Kwiatkowska, David Parker, Aistis Simaitis 2011 Springer Lecture Notes in Computer Science 6814 Computational Logic in Multi-Agent Systems, 190-207

Incremental quantitative verification for Markov decision processes

Marta Z. Kwiatkowska, David Parker, Hongyang Qu 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks 359-370

Automated Learning of Probabilistic Assumptions for Compositional Reasoning

Lu Feng, Marta Z. Kwiatkowska, David Parker 2011 Springer Lecture Notes in Computer Science 6603 Fundamental Approaches to Software Engineering, 2-17

Game-based Abstraction and Controller Synthesis for Probabilistic Hybrid Systems

Ernst Moritz Hahn, Gethin Norman, David Parker, Björn Wachter, Lijun Zhang 2011 IEEE 8th International Conference on Quantitative Evaluation of Systems 69-78

Automated Verification Techniques for Probabilistic Systems

Vojtech Forejt, Marta Z. Kwiatkowska, Gethin Norman, David Parker 2011 Springer Lecture Notes in Computer Science 6659 Formal Methods for Eternal Networked Software Systems, 53-113

Quantitative Multi-objective Verification for Probabilistic Systems

Vojtech Forejt, Marta Z. Kwiatkowska, Gethin Norman, David Parker, Hongyang Qu 2011 Springer Lecture Notes in Computer Science 6605 Tools and Algorithms for the Construction and Analysis of Systems, 112-127

Trust Dynamics: A Data-Driven Simulation Approach

Olufunmilola Onolaja, Rami Bahsoon and Georgios Theodoropoulos 2011 IFIP Advances in Information and Communication Technology 358 Trust Management V, 323-334

Evaluating Security Properties of Architectures in Unpredictable Environments: A Case for Cloud

Funmilade Faniyi, Rami Bahsoon, Andy Evans and Rick Kazman 2011 9th Working IEEE/IFIP Conference on Software Architecture 127-136

A Data-Driven Framework for Dynamic Trust Management

Olufunmilola Onolaja, Georgios Theodoropoulos and Rami Bahsoon 2011 Procedia Computer Science 4, 1751-1760

Scalable Service Oriented Replication in the Cloud

Tao Chen, Rami Bahsoon 2011 IEEE International Conference on Cloud Computing 766-767

A Survey of Self-Awareness and Its Application in Computing Systems

Peter R. Lewis, Arjun Chandra, Shaun Parsons, Edward Robinson, Kyrre Glette, Rami Bahsoon, Jim Tørresen, Xin Yao 2011 IEEE 5th Conference on Self-Adaptive and Self-Organizing Systems Workshops 102-107

Engineering Proprioception in SLA Management for Cloud Architectures

Funmilade Faniyi and Rami Bahsoon 2011 IEEE/IFIP 9th Working Conference on Software Architecture 336-340

Economics-Driven Architecting for Non Functional Requirements in the Presence of Middleware

Rami Bahsoon, Wolfgang Emmerich 2011 Relating Software Requirements and Architectures 353-371. Paris Avgeriou, John Grundy, Jon G. Hall, Patricia Lago, Ivan Mistrik (eds). Springer.

2010

Anonymity Protocol with Identity Escrow and Analysis in the Applied pi-calculus

A. Mukhamedov and Mark D. Ryan 2010 ACM Transactions on Information and System Security 13(4) 41, 29p

Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster

Stéphanie Delaune, Steve Kremer and Mark Ryan 2010 Springer Lecture Notes in Computer Science 6000 Towards Trustworthy Elections, 289-309

Escrowed Data and the Digital Envelope

King Ables and Mark D. Ryan 2010 Springer Lecture Notes in Computer Science 6101 Trust and Trustworthy Computing, 246-256

Towards Automatic Analysis of Election Verifiability Properties

Ben smyth, Mark Ryan, Steve Kremer and Mournira Kourjieh 2010 Springer Lecture Notes in Computer Science 6186 Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, 146-163

Attack, solution and verification for shared authorisation data in TCG TPM

Liqun Chen and Mark Ryan 2010 Springer Lecture Notes in Computer Science 5983 Formal Aspects in Security and Trust, 201-216

Trusted Integrity Measurement and Reporting for Virtualized Platforms

Serdar Cabuk, Liqun Chen, David Plaquin, Mark Ryan 2010 Springer Lecture Notes in Computer Science 6163 Trusted Systems, 180-196

A Formal Analysis of Authentication in the TPM

Stéphanie Delaune, Steve Kremer, Mark D. Ryan and Graham Steel 2010 Springer Lecture Notes in Computer Science 6561 Formal Aspects in Security and Trust, 111-125

Election Verifiability in Electronic Voting Protocols

Steve Kremer, Mark Ryan and Ben Smyth 2010 Springer Lecture Notes in Computer Science 6345 Computer Security – ESORICS 2010, 389-404

Verifying Security Property of Peer-to-Peer Systems Using CSP

Tien Tuan Anh Dinh and Mark Ryan 2010 Springer Lecture Notes in Computer Science 6345 Computer Security – ESORICS 2010, 319-339

Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems

Hasan Qunoo and Mark Ryan 2010 Springer Lecture Notes in Computer Science 6166 Data and Applications Security and Privacy XXIV, 295-301

Analysing Unlinkability and Anonymity Using the Applied Pi Calculus

Myrto Arapinis, Tom Chothia, Eike Ritter and Mark Ryan 2010 IEEE 25th Computer Security Foundations Symposium 107-121

Symbolic Bisimulation for the Applied Pi Calculus

Stéphanie Delaune, Steve Kremer and Mark D. Ryan 2010 Journal of Computer Security 18(2) Security Issues in Concurrency, 317-377

Statistical Measurement of Information Leakage

Konstantinos Chatzikokolakis, Tom Chothia and Apratim Guha 2010 Springer Lecture Notes in Computer Science 6015 Tools and Algorithms for the Construction and Analysis of Systems, 390-404

A Traceability Attack against e-Passports

Tom Chothia and Vitaliy Smirnov 2010 Springer Lecture Notes in Computer Science 6052 Financial Cryptography and Data Security, 20-34

Modeling Privacy for Off-Line RFID Systems

Flavio D. Garcia and Peter van Rossum 2010 Springer Lecture Notes in Computer Science 6035 Smart Card Research and Advanced Application, 194-208

Towards a Practical Solution to the RFID Desynchronization Problem

Gerhard de Koning Gans and Flavio D. Garcia 2010 Springer Lecture Notes in Computer Science 6370 Radio Frequency Identification: Security and Privacy Issues, 203-219

Privacy-Friendly Energy-Metering via Homomorphic Encryption

Flavio D. Garcia and Bart Jacobs 2010 Springer Lecture Notes in Computer Science 6710 Security and Trust Management, 226-238

Dismantling SecureMemory, CryptoMemory and CryptoRF

Flavio D. Garcia, Peter van Rossum, Roel Verdult and Ronny Wichers Schreur 2010 17th ACM Conference on Computer and Communications Security 250-259

Combined Implementation Attack Resistent Exponentiation

Jörn-Marc Schmidt, Michael Tunstall, Roberto Maria Avanzi, Ilya Kizhvatov, Timo Kasper and David Oswald 2010 Springer Lecture Notes in Computer Science 6212 Progress in Cryptology – LATINCRYPT 2010, 305-322

Chameleon: A Versatile Emulator for Contactless Smartcards

Timo Kasper, Ingo von Maurich, David Oswald and Christof Paar 2010 Springer Lecture Notes in Computer Science 6829 Information Security and Cryptology, 189-206

A Versatile Framework for Implementation Attacks on Cryptographic RFIDs and Embedded Devices

Timo Kasper, David Oswald and Christof Paar 2010 Springer Lecture Notes in Computer Science 6340 Transactions on Computational Science X, 100-130

Chosen-Ciphertext Secure Identity-Based Encryption from Computational Bilinear Diffie-Hellman

David Galindo 2010 Springer Lecture Notes in Computer Science 6487 Pairing-Based Cryptography, 367-376

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions

David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis and Dominique Schröder 2010 Springer Lecture Notes in Computer Science 6055 Progress in Cryptography – AFRICACRYPT 2010, 333-350

On the Generic Construction of Identity-Based Signatures with Additional Properties

David Galindo, Jvier Herrnaz and Eike Kiltz 2010 Advances in Mathematics of Communications 4(4), 453-483

One-time trapdoor one-way functions

Julien Cathalo, Christophe Petit 2010 Springer Lecture Notes in Computer Science 6531 ISC 2010 – Information Security, 283-298

Preimage algorithms for the Tillich-Zémor hash function

Christophe Petit, and Jean-Jacques Quisquater 2010 Springer Lecture Notes in Computer Science 6544 SAC 2010 – Selected Areas in Cryptography, 282-301

Equitable Cake Cutting without Mediator

Sophie Mawet, Olivier Pereira and Christophe Petit 2010 Proceedings of the 5th Benelux Workshop on Information and System Security 906-909

An Authentication Framework for Wireless Sensor Networks using Identity-Based Signatures

Rehana Yasmin, Eike Ritter and Guilin Wang 2010 IEEE 10th International Conference on Computer and Information Technology 882-889

A game-based abstraction-refinement framework for Markov decision processes

Mark Kattenbelt, Marta Z. Kwiatkowska, Gethin Norman, David Parker 2010 Formal Methods in System Design 36(3), 246-280

A Framework for Verification of Software with Time and Probabilities

Marta Z. Kwiatkowska, Gethin Norman, David Parker 2010 Springer Lecture Notes in Computer Science 6246 Formal Modeling and Analysis of Timed Systems, 25-45

Compositional Verification of Probabilistic Systems Using Learning

Lu Feng, Marta Z. Kwiatkowska, David Parker 2010 IEEE 7th International Conference on Quantitative Evaluation of Systems 113-142

Assume-Guarantee Verification for Probabilistic Systems

Marta Z. Kwiatkowska, Gethin Norman, David Parker, Hongyang Qu 2010 Springer Lecture Notes in Computer Science 6015 Tools and Algorithms for the Construction and Analysis of Systems, 23-37

Conceptual framework for dynamic trust monitoring and prediction

Olufunmilola Onolaja, Rami Bahsoon and Georgios Theodoropoulos 2010 Procedia Computer Science 1(1), 1241-1250

Special Issue on Software Architecture and Mobility

Rami Bahsoon, Licia Capra, Wolfgang Emmerich, Mohamed E. Fayad (eds) 2010 Journal of Systems and Software 83

A Framework for Dynamic Self-optimization of Power and Dependability Requirements in Green Cloud Architectures

Rami Bahsoon 2010 Springer Lecture Notes in Computer Science 6285 Software Engineering, 510-514

Using implied scenarios in security testing

Sarah Al-Azzani, Rami Bahsoon 2010 ICSE Workshop on Software Engineering for Secure Systems 15-21

Design of a market-based mechanism for quality attribute tradeoff of services in the cloud

Vivek Nallur, Rami Bahsoon 2010 ACM Symposium on Applied Computing 367-371

Self-adapting Applications Based on QA Requirements in the Cloud Using Market-Based Heuristics

Vivek Nallur, Rami Bahsoon 2010 Springer Lecture Notes in Computer Science 6481 Towards a Service-Based Internet, 51-62

Implementation of a security layer for the SSL/TLS protocol

Mihai Ordean and Mirceau Giurgiu 2010 IEEE 9th International Symposium on Electronics and Telecommunications 209-212