Selected recent publications

Our researchers have published papers on a variety of topics.

By core members

Contact us

+44 (0)1904 325501
Department of Computer Science, University of York, York YO10 5GH

Jonathan Barrett, Roger Colbeck and Adrian Kent. "Memory attacks on device-independent quantum cryptography." Physical Review Letters 110 (010503), 2013.

Jonathan Barrett, Roger Colbeck and Adrian Kent. "Unconditionally secure device-independent quantum key distribution with only two devices." Physical Review A 86 (062326), 2012.

Roger Colbeck and Renato Renner. "Free randomness can be amplified." Nature Physics 8 (450-453), 2012.

Roger Colbeck and Adrian Kent. "Private randomness expansion with untrusted devices." Journal of Physics A: Mathematical and Theoretical 44 (095305), 2011.

Full list of publications available from York Research Database and Google Scholar

Manuel Barbosa and Pooya Farshim. "Indifferentiable Authenticated Encryption." CRYPTO 2018.

Balthazar Bauer, Pooya Farshim, and Sogol Mazaheri. "Combiners for Backdoored Random Oracles." CRYPTO 2018.

Martin R. Albrecht, Pooya Farshim, Dennis Hofheinz, Enrique Larraia, and Kenneth G. Paterson. "Multilinear Maps from Obfuscation." TCC 2016-A.

Christina Brzuska, Pooya Farshim, and Arno Mittelbach. "Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources." CRYPTO 2014.

Full list of publications available from DBLP and Google Scholar.

A. Wood, V. Shpilrain, K. Najarian, D. Kahrobaei. "Private Naive Bayes Classification of Personal Biomedical Data: Application in Cancer Data Analysis." Computers in Biology and Medicine 105, 144-150 (2019).

J-C. Faugere, K. Horan, D. Kahrobaei, M. Kaplan, E. Kashe, L. Perret. "Fast Quantum algorithm for solving system of multivariate system of equations." Quantum Information and Computation, Rinton Press, 1-25 (2019).

A. Gribov, D. Kahrobaei, V. Shpilrain. "Practical Private-key Fully Homomorphic Encryption in Rings." Groups Complexity Cryptology 10, 17-27, no. 1 (2018).

G. Di Crescenzo, D. Kahrobaei, M. Khodjaeva, V. Shpilrain. "Practical and Secure Delegation of Exponentiations over Discrete-Log Groups to a Single Malicious Server." CCSW '17 Proceedings of the 2017 on Cloud Computing Security Workshop, Association for Computing Machinery (ACM), 17-28 (2017).

Full list of publications available from personal homepage, Google Scholar and DBLP.

C. Lupo, C. Ottaviani, P. Papanastasiou, S. Pirandola. "Parameter estimation with almost no public communication for continuous-variable quantum key distribution." Physical review letters 120, 220505 (2018).

S. Pirandola, R. Laurenza, C. Ottaviani, L. Banchi. "Fundamental limits of repeaterless quantum communications." Nature communications 8, 15043 (2017).

S. Pirandola, S.L. Braunstein. "Unite to build a quantum internet." Nature, 169-171 (2016).

S. Pirandola et al. "High-rate measurement-device-independent quantum cryptography." Nature Photonics 9, 397-402 (2015).

S. Barzanjeh, S. Guha, C. Weedbrook, D. Vitali, J.H. Shapiro, S. Pirandola. "Microwave quantum illumination." Physical review letters 114, 080503 (2015).

Full list of publications available from personal homepage, Google Scholar and arXiv.

Feng Hao, Roberto Metere, Siamak F. Shahandashti, and Changyu Dong. "Analysing and Patching SPEKE in ISO/IEC". IEEE Transactions on Information Forensics & Security 13(11): 2844-2855, IEEE, 2018.

Ehsan Toreini, Siamak F. Shahandashti, and Feng Hao. "Texture to the Rescue: Practical Paper Fingerprinting based on Texture Patterns". ACM Transactions on Privacy and Security (TOPS): 20(3), Article No. 9, ACM, 2017.

Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. "A Smart Contract for Boardroom Voting with Maximum Voter Privacy". FC 2017, LNCS 10322, pp. 357-375, Springer, 2017.

Siamak F. Shahandashti and Feng Hao. "DRE-ip: A Verifiable E-Voting Scheme without Tallying Authorities". ESORICS 2016, LNCS 9879, pp. 223-240, Springer, 2016.

Full list of publications available from personal homepage, Google Scholar and DBLP.

C. Birkinshaw, E. Rouka, V. Vassilakis. “Implementing an intrusion detection and prevention system using software-defined networking: Defending against port-scanning and denial-of-service attacks.” Journal of Network & Computer Applications, Elsevier, vol. 136, pp. 71-85, June 2019.

M. Akbanov, V. Vassilakis, M. Logothetis. “Ransomware detection and mitigation using software-defined networking: The case of WannaCry.” Journal of Electrical & Computer Engineering, Elsevier, vol. 76, pp. 111-121, June 2019.

B. Alohali, V. Vassilakis, I. Moscholios, M. Logothetis. “A secure scheme for group communication of wireless IoT devices.” 11th IEEE/IET Int. Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP), Budapest, Hungary, July 2018.

V. Vassilakis, L. Wang, I. Moscholios, M. Logothetis. “Calculating distributed denial of service attack probability in Bloom-filter based information-centric networks.” Image Processing and Communications, vol. 21, no. 1, pp. 7-22, April 2017.

V. Vassilakis, I. Chochliouros, A. Spiliopoulou, E. Sfakianakis, M. Belesioti, N. Bombetsis, M. Wilson, C. Turyagyenda, A. Dardamanis. "Security analysis of mobile edge computing in virtualized small cell networks." IFIP Int. Conference on Artificial Intelligence Applications and Innovations (AIAI), Thessaloniki, Greece, Sept. 2016.

Full list of publications available from personal homepage, Google Scholar and DBLP.

By associate members

R. Calinescu, D. Weyns, S. Gerasimou, M.U. Iftikhar, I. Habli, T. Kelly. "Engineering Trustworthy Self-Adaptive Software with Dynamic Assurance Cases." IEEE Transactions on Software Engineering 44(11):1039-1069, 2018.

R. Calinescu, M. Ceska, S. Gerasimou, M. Kwiatkowska, N. Paoletti. "Efficient Synthesis of Robust Models for Stochastic Systems." Journal of Systems and Software 143:140-158, 2018.

C. Paterson, R. Calinescu. "Observation-Enhanced QoS Analysis of Component-Based Systems." IEEE Transactions on Software Engineering, 2018. DOI: 10.1109/TSE.2018.2864159.

S. Gerasimou, R. Calinescu, G. Tamburrelli. "Synthesis of Probabilistic Models for Quality-of-Service Software Engineering." Automated Softw. Eng. J., 2018. DOI: 0.1007/s10515-018-0235-8.

R. Calinescu, C. Ghezzi, K. Johnson, M. Pezze, Y. Rafiq, G. Tamburrelli. "Formal Verification with Confidence Intervals: A New Approach to Establishing the Quality-of-Service Properties of Software Systems." IEEE Transactions on Reliability 65(1):107-125, 2016.

Full list of publications available from personal homepage, Google Scholar, and DBLP.

Bradley R. Schmerl, Javier Cámara, Jeffrey Gennari, David Garlan, Paulo Casanova, Gabriel A. Moreno, Thomas J. Glazier, Jeffrey M. Barnes. "Architecture-based self-protection: composing and reasoning about denial-of-service mitigations." HotSoS 2014: 2

Bradley R. Schmerl, Jeff Gennari, Alireza Sadeghi, Hamid Bagheri, Sam Malek, Javier Cámara, David Garlan. "Architecture Modeling and Analysis of Security in Android Systems." ECSA 2016: 274-290

Thomas J. Glazier, Javier Cámara, Bradley R. Schmerl, David Garlan. "Analyzing Resilience Properties of Different Topologies of Collective Adaptive Systems." SASO Workshops 2015: 55-60

Full list of publications available from personal homepage, Google Scholar and DBLP.

H. Alyasiri, J. A. Clark, D. Kudenko. "Applying cartesian genetic programming to evolve rules for intrusion detection system." International Joint Conference on Computational Intelligence, 2018, pp. 176–183.

H. Alyasiri, J. A. Clark, D. Kudenko. "Evolutionary computation algorithms for detecting known and unknown attacks." 11th International Conference on Security for Information Technology and Communications, 2018.

K. Malialis, D. Kudenko. "Distributed response to network intrusions using multi-agent reinforcement learning." Engineering Applications of Artificial Intelligence 41, May 2015 .

K. Malialis, S. Devlin, D. Kudenko. "Distributed reinforcement learning for adaptive and robust network intrusion response." Connection Science 27(3): 234-252, Sept. 2015.

A. Servin, D. Kudenko. "Multi-agent reinforcement learning for intrusion detection: A case study and evaluation." Sixth German Conference on Multi-Agent System Technologies (MATES), 2008.

Full list of publications available from Google Scholar and DBLP.

Contact us

+44 (0)1904 325501
Department of Computer Science, University of York, York YO10 5GH