Department of Mathematics
Royal Holloway University Of London

Technical Reports

The recommended style for citing a technical report is:

Chris Mitchell and Walter Mitty, A simple proof of Fermat's last theorem, technical report RHUL-MA-2001-0 (Department of Mathematics, Royal Holloway, University of London, 2001), http://www.ma.rhul.ac.uk/tech.

New technical reports should be sent to the Webmaster (Lisa Cavey). For instructions on preparation and submission of technical reports, click here.


 
 

2016

RHUL-ISG-2016-1 (RHUL-MA-2016-1) [abstractpdf]:

Title: Misleading Metrics: On Evaluating Machine Learning for Malware with Confidence
Author: Roberto Jordaney, Zhi Wang, Davide Papini, Ilia Nouretdinov, and Lorenzo Cavallaro 
Comments: Technical Report # 2016-1 Royal Holloway, University of London
 

RHUL-ISG-2016-2 (RHUL-MA-2016-2) [abstractpdf]:

Title: An Ontology of a computing device secured with trusted platform module 2:0. 
Author: Jiun Yi Yap and Allan Tomlinson
Comments: Technical Report # 2016-2 Royal Holloway, University of London 

2015

RHUL-ISG-2015-1 (RHUL-MA-2015-1) [abstract, pdf]:

Title: ClusTheDroid: Clustering Android Malware
Author: David Korczynski
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 79 pages

RHUL-ISG-2015-2 (RHUL-MA-2015-2) [abstract, pdf]:

Title: Adversary Modelling: Evaluating the feasibility of symbolic adversary model on smart transport ticketing system
Author: Sheung Chi Chan
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 53 pages

RHUL-ISG-2015-3 (RHUL-MA-2015-3) [abstract, pdf]:

Title: The Value of Threat Models in Enterprise Security Testing of Database Systems & Services 
Author: Timothy D. Williams
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 165 pages

RHUL-ISG-2015-4 (RHUL-MA-2015-4) [abstract, pdf]:

Title: Verifying the Integrity of Open Source Android Applications
Author: Michael Macnair
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 61 pages

RHUL-ISG-2015-5(RHUL-MA-2015-5) [abstract, pdf]:

Title: The Influence of Software Vulnerabilities on Business Risks
Author: Hilbrand Kramer
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 60  pages

RHUL-ISG-2015-6 (RHUL-MA-2015-6) [abstract, pdf]:

Title: The use of SmartCard authentication as a medium for protecting Taxi passengers
Author: Cesar Augusto Bonilla Alvarez
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 114 pages

RHUL-ISG-2015-7 (RHUL-MA-2015-7) [abstract, pdf]:

Title: Investigating the Effectiveness of Obfuscation Against Android Application Reverse Engineering
Author: Rowena Harrison
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 64 pages

RHUL-ISG-2015-8 (RHUL-MA-2015-8) [abstract, pdf]:

Title: Mac OS X Forensics
Author: Joaquin Moreno Garijo
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 126 pages

RHUL-ISG-2015-9 (RHUL-MA-2015-9) [abstract, pdf]:

Title: Security Protocols for Low Cost RFID Tags: Analysis and Automated Verification of Proposed Solutions
Author: Esteban Masobro Garcia
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 171 pages

RHUL-ISG-2015-10 (RHUL-MA-2015-10) [abstract, pdf]:

Title: The Use of Packers, Obfuscators and Encryptors in Modern Malware
Author: Paul Moon
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 272 pages

RHUL-ISG-2015-11 (RHUL-MA-2015-11) [abstract, pdf]:

Title: Cross-Platform Malware Contamination
Author: Nicholas Aquilina
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 110 pages

RHUL-ISG-2015-12 (RHUL-MA-2015-12) [abstract, pdf]:

Title: Mitigating malicious insider cyber threat
Author: Jason Anthony Smith
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 52 pages

RHUL-ISG-2015-13 (RHUL-MA-2015-13) [abstract, pdf]:

Title: Analysis of the Linux Audit System
Author: Bruno Morisson
Comments: Invited to submit article to the Computer Weekly (Search Security) by Royal Holloway Information Security Thesis Series, 78 pages
 

2014

RHUL-MA-2014-15 [abstract, pdf]:

Title: Investigating the use of Elliptic Curve Cryptography in Transport Ticketing
Author: Thyla Joy van der Merwe
Comments: Technical Report, 102 pages

RHUL-MA-2014-14 [abstract, pdf]:

Title: Interdomain routing security: Motivation and challenges of RPKI
Author: Amreesh Dev, Phokeer
Comments: Technical Report, 74 pages

RHUL-MA-2014-13 [abstract, pdf]:

Title: Concurrent Memory Inspection for Intrusion Detection
Author: Christos V. Tsopokis
Comments: Technical Report, 72 pages

RHUL-MA-2014-12 [abstract, pdf]:

Title: Analysing Application Data Security on Android Devices
Author: Pallavi Sivakumaran
Comments: Technical Repor, 72 pages

RHUL-MA-2014-11 [abstract, pdf]:

Title: Terrorist use of the Internet: an analysis of the current threat and its potential evolution
Author: Matteo Cavallini
Comments: Technical Report, 57 pages

RHUL-MA-2014-10 [abstract, pdf]:

Title: A Security Analysis of TreuCrypt: Detecting Hidden Volumes and Operating Systems
Author: Andrew Davies
Comments: Technical Report, 80 pages

RHUL-MA-2014-9 [abstract, pdf]:

Title: Cloud Encryption and Key Management Considerations
Author: Daniel Cushieri
Comments: Technical Report, 125 pages

RHUL-MA-2014-8 [abstract, pdf]:

Title: A utilitarian re-examination of enterprise-scale information security management
Author: Andrew Stewart
Comments: Technical Report, 42 pages

RHUL-MA-2014-7 [abstract, pdf]:

Title: Security at the Core: Examining Perspectives on Insider Threat
Author: Peter Crowley
Comments: Technical Report, 127 pages

RHUL-MA-2014-6 [abstract, pdf]:

Title: Implementing Information Security Management System in SMEs and ensuring Effectiveness in its Governance
Author: Vadim Gordas
Comments: Technical Report, 80 pages

RHUL-MA-2014-5 [abstract, pdf]:

Title: Cyber Security in the UK: A critical analysis of the threat to the UK and the Government Response (National Cyber Security Strategy 2011)
Author: John Iles
Comments: Technical Report, 70 pages

RHUL-MA-2014-4 [abstract, pdf]:

Title: Analysis and detecting of misbehaviours in VANETs
Author: Shuxian Yan
Comments: Technical Report, 51 pages

RHUL-MA-2014-3 [abstract, pdf]:

Title: Defeating Memory error Exploits by Program Diversification and Process Replication
Author: Marc Nimmerrichter
Comments: Technical Report, 68 pages

RHUL-MA-2014-2 [abstract, pdf]:

Title: Leveraging knowledge sharing for preventing and investigating on-line banking frauds: On-line Fraud Centre
Author: Salvatore Camillo Zammataro
Comments: Technical Report, 68 pages

2013


RHUL-MA-2013-1 [abstract, pdf]:

Title: Fingerprinting Codes and Separating Hash Families
Author: Penying Rochanakul
Comments: PhD Thesis, 164 pages
 

RHUL-MA-2013-2 [abstract, pdf]:

Title: Fair exchange protocols with anonymity and non-repudiation for payments
Author: Athanasios Polychronis
Comments: MSc Dissertation, 59 pages
 

RHUL-MA-2013-3 [abstract, pdf]:

Title: A security enhanced RFID tracking system
Author: Dario Bevilacqua
Comments: MSc Dissertation, 88 pages
 

RHUL-MA-2013-4 [abstract, pdf]:

Title: An analysis of the vulnerabilities introduced with Java Card 3 Connected Edition
Author: Andrew Calafato
Comments: MSc Dissertation, 188 pages
 

RHUL-MA-2013-5 [abstract, pdf]:

Title: Detecting MPEG-2 Video Tampering through Motion Errors
Author: Ho Hee-Meng
Comments: MSc Dissertation, 97 pages, Search Security Award-winning project
 

RHUL-MA-2013-6 [abstract, pdf]:

Title: Sleeping Android: Exploit through Dormant Permission Requests
Author: James Sellwood
Comments: MSc Dissertation, 64 pages
 

RHUL-MA-2013-7 [abstract, pdf]:

Title: Modern Password Cracking: A hands-on approach to creating an optimised and versatile attack
Author: Chrysanthou Yiannis
Comments: MSc Dissertation, 164 pages
 

RHUL-MA-2013-8 [abstract, pdf]:

Title: Visualizations in Vulnerability Management
Author: Marco Krebs
Comments: MSc Dissertation, 101 pages
 

RHUL-MA-2013-9 [abstract, pdf]:

Title: Managing the Client-side Risks of IEEE 802.11 Networks
Author: Daan Stakenburg
Comments: 87 pages
 

RHUL-MA-2013-10 [abstract, pdf]:

Title: Electronic Voting: An Electronic Voting Scheme using the Secure Payment card System
Author: Voke Augoye
Comments: MSc Dissertation, 72 pages
 
 

2012


RHUL-MA-2012-1 [abstract, pdf]:

Title: Some results in group-based cryptography
Author: Ciaran Mullan
Comments: PhD Thesis, 100 pages 
 

RHUL-MA-2012-2 [abstract, pdf]:

Title: Forensic Tracking and Surveillance: Algorithms afor Homogeneous and Heterogeneous Settings
Author: Saif Mohammed S. A. Al-Kuwari
Comments:
PhD Thesis, 155 pages

RHUL-MA-2012-3 [abstract, pdf]:

Title: Topology-Aware Vulnerability Mitigation Worms: Defensive Worms
Author: Ziyad S. Al-Salloum
Comments:
PhD Thesis, 211 pages

RHUL-MA-2012-4 [abstract, pdf]:

Title: Preemptive mobile code protection using spy agents
Author: Georgios Kalogridis
Comments:
PhD Thesis, 299 pages

RHUL-MA-2012-5 [abstract, pdf]:

Title: Wide-sense fingerprinting codes and honeycomb arrays
Author: Anastasia Panoui
Comments:
147 pages
 

RHUL-MA-2012-6 [abstract, pdf]:

Title: Mean Squared Length of Vectors in the Approximate Greatest Divisor Lattice
Author: Sean Murphy
Comments:
Technical report, 7 pages 
 

RHUL-MA-2012-7 [abstract, pdf]:

Title: A Novel Card-Present Payment Scheme using NFC Technology
Author: Albert Attard
Comments: MSc Thesis, 90 pages

RHUL-MA-2012-8 [abstract, pdf]: 

Title: A Pragmatic Policy-Driven XSS Protection Framework
Author: Joseph Bugeja
Comments: MSc Thesis, 129 pages

RHUL-MA-2012-9 [abstract, pdf]: 

Title: A Study on How a Cloud Service Provider Can Offer Adequate Security to its Customers
Author: Robert Farrugia
Comments: MSc Thesis, 171 pages

 

RHUL-MA-2012-10 [abstract, pdf]: 

Title: Malware Armoring: The Case Against incident Related Binary Analysis
Author: Steve Hendrikse
Comments: MSc Thesis, 187 pages

 

RHUL-MA-2012-11 [abstract, pdf]:  

Title: Can PCI DSS compliance be achieved in a cloud environment?
Author: Patrick Durkin
Comments: MSc Thesis, 63 pages

 

RHUL-MA-2012-12 [abstract, pdf]:

Title: Security in the Cloud: The threat of coexist with an unknow tenant on a pubic enviroment
Author: Jacobo Ros
Comments: MSc Thesis, 71 pages

RHUL-MA-2012-13 [abstract, pdf]:

Title: The Analysis of Simultaneous Differences in Differential Cryptanalysis
Author: Sean Murphy
Comments: Technical report

RHUL-MA-2012-14 [abstract, pdf]:

Title: Choosing Algorithms to Standardise
Author: Chris Mitchell
Comments: Technical report

 

 

http://www.isg.rhul.ac.uk/thesisprizes 

 

 
 

2011

RHUL-MA-2011-1 [abstract, pdf]:

Title: Lightweight RFID Authentication Protocols for Special Schemes
Author: Xuefei Leng
Comments:
PhD Thesis, 165 pages

RHUL-MA-2011-2 [abstract, pdf]:

Title: Provable security in practice: analysis of SSH and CBC mode with padding
Author: Gaven J Watson
Comments:
PhD Thesis, 179 pages

RHUL-MA-2011-3 [abstract, pdf]:

Title: New security notions for identity based encryption
Author:  Sriramkrishnan Srinivasan
Comments:
PhD Thesis, 184 pages

RHUL-MA-2011-4 [abstract, pdf]:

Title: Algorithmic algebraic techniques and their application to block cipher cryptoanalysis
Author: Martin Albrecht
Comments: PhD Thesis

RHUL-MA-2011-5 [abstract, pdf]:

Title: Quantum Key Distribution – Protocols and Applications
Author: Sheila Cobourne
Comments:Search Security Award winning project, 95 pages

RHUL-MA-2011-6 [abstract, pdf]:

Title: Developments in confidentiality and consent functions to support wider sharing of electronic health records in the UK
Author: Stephen Elgar
Comments:
Search Security Award winning project, 55 pages

RHUL-MA-2011-7 [abstract, pdf]:

Title: Side Channels, Compromising Emanations and Surveillance: Current and Future Technologies
Author:
Richard Frankland
Comments:Search Security Award winning project, 65 pages

RHUL-MA-2011-8 [abstract, pdf]:

Title: An end-to-end approach to managing information assurance within the Ministry of Defence
Author: Paul Shanes
Comments: Search Security Award winning project, 73 pages

RHUL-MA-2011-9 [abstract, pdf]:

Title: Virtualization Security: Virtual Machine Monitoring and Introspection
Author:
Fotis Tsifountidis
Comments:Search Security Award Winning Project, 114 pages

RHUL-MA-2011-10 [abstract, pdf]:

Title: Towards Trustworthy Virtualisation: Improving the Trusted Virtual Infrastructure
Author:
Carl Gebhardt
Comments: PhD Thesis, 214 pages

RHUL-MA-2011-11 [abstract, pdf]:

Title: The Number of Partitions in Pollard Rho
Author: Simon Blackburn and Sean Murphy
Comments:

RHUL-MA-2011-12 [abstract, pdf]:

Title: CardSpace-OpenID Integration for CardSpace Users
Author: Haitham S. Al-Sinani and Chris J. Mitchell
Comments:

RHUL-MA-2011-13 [abstract, pdf]:

Title: Client-based CardSpace-Shibboleth Interoperation
Author: Haitham S. Al-Sinani and Chris J. Mitchell
Comments:

RHUL-MA-2011-14 [abstract, pdf]:

Title: Using CardSpace as a Password-based Single Sign-On System
Author: Haitham S. Al-Sinani and Chris J. Mitchell
Comments: CardSpace, Single sign-on, Browser Extension

 

RHUL-MA-2011-15 [abstract, pdf]:

Title: Browser Extension-based Interoperation Between OAuth and Information Card-based Systems
Author:
Haitham S. Al-Sinani
Comments: CardSpace, OAuth, Browser Extension

RHUL-MA-2011-16 [abstract, pdf]:

Title: Actor-Network Procedures: Modeling multi-factor authentication, device pairing, social interactions
Author: Dusko Pavlovic
Comments: 32 pages

RHUL-MA-2011-17 [abstract, pdf]:

Title: Towards categorical cryptography
Author: Dusko Pavlovic
Comments: 13 pages

2010

RHUL-MA-2010-1 [abstract, pdf]:

Title: The sizes of consecutive repeat-free codes
Author: Robin Hughes-Jones
Comments:
PhD thesis, 103 pages

RHUL-MA-2010-2 [abstract, pdf]:

Title: Performance Analysis of Authentication Protocols in Vehicular Ad Hoc Networks
(VANET)
Author: Abdul Kalam Kunnel Aboobaker
Comments:
Search Security Award Winning Project, 88 pages

RHUL-MA-2010-3 [abstract, pdf]:

Title: The Domain Name System (DNS): Security challenges and improvements
Author: Richard John Matthew Agar
Comments: 
Search Security Award Winning Project, 101 pages

RHUL-MA-2010-4 [abstract, pdf]:

Title: Securing the Sage Notebook
Author: Yoav Aner
Comments: 
Search Security Award Winning Project, 73 pages

RHUL-MA-2010-5 [abstract, pdf]:

Title: Security Awareness for Children
Author: Clara Brady
Comments: Search Security Award Winning Project, 59 pages

RHUL-MA-2010-6 [abstract, pdf]:

Title: Leveraging The Multi-Disciplinary Approach to Countering Organised Crime
Author: Anna Cevidalli
Comments: 
Search Security Award Winning Project, 168 pages

RHUL-MA-2010-7 [abstract, pdf]:

Title: Business to Business Data Sharing using Trusted Computing
Author: Stephen S. Khan
Comments: 
Search Security Award Winning Project, 84 pages

RHUL-MA-2010-8 [abstract, pdf]:

Title: Improving residual risk management through the use of security metrics
Author: Jonathan Pagett
Comments: 
Search Security Award Winning Project, 47 pages

RHUL-MA-2010-9 [abstract, pdf]:

Title: Attestation in Trusted Computing: Challenges and Potential Solutions
Author: Andrew Lee-Thorp
Comments:
Search Security Award Winning Project, 79 pages

RHUL-MA-2010-10 [abstract, pdf]:

Title: Constructing Key Assignment Schemes from Chain Partitions
Author:
Jason Crampton, Rosli Daud, and Keith M. Martin
Comments: Condensed version appeared in the "Data and Applications Security XXIV", edited by S. Foresti and S. Jajodia

RHUL-MA-2010-11 [abstract, pdf]:

Title: On Plaintext-Aware Public-Key Encryption Schemes
Author:
James Birkett
Comments: PhD Thesis, 188 pages

RHUL-MA-2010-12 [abstract, pdf]:

Title: Challenges for Inter Virtual Machine Communication
Author:
Carl Gebhardt, Allan Tomlinson
Comments:

RHUL-MA-2010-13 [abstract, pdf]:

Title: Congruence Subgroups of the Automorphism Group of a Free Group
Author:
Daniel W. Appel
Comments: PhD Thesis, 116 pages

RHUL-MA-2010-14 [abstract, pdf]:

Title: Privacy and Practicality of Identity Management Systems
Author: Waleed Alrodhan
Comments: PhD Thesis, 261 pages

RHUL-MA-2010-15 [abstract, pdf]:

Title: Implementing PassCard, a CardSpace-based Password Manager
Author: Haitham S. Al-Sinani and Chris J. Mitchell
Comments: 

 

 

2009

RHUL-MA-2009-1 [abstract, pdf]:

Title: Interdomain Routing Security (BGP-4)
Author:
Rostom Zouaghi
Comments: Search Security Award Winning Project

RHUL-MA-2009-2 [abstract, pdf]:

Title: Maximising the Effectiveness of Information Security Awareness
Author:
Geordie Stewart
Comments: Search Security Award Winning Project

RHUL-MA-2009-3 [abstract, pdf]:

Title: Information Security Awareness: An Innovation Approach
Author:
Carlos Orozco Corona
Comments:
Search Security Award Winning Project

RHUL-MA-2009-4 [abstract, pdf]:

Title: Fuzzing for Software Vulnerability Discovery
Author:
Toby Clarke
Comments: Search Security Award Winning Project

RHUL-MA-2009-5 [abstract, pdf]:

Title: Applying Misuse Case to Improve the Security of Information Systems
Author:
John Ruck
Comments: Search Security Award Winning Project

RHUL-MA-2009-6 [abstract, pdf]:

Title: Buffer Overflows in Microsoft Windows Environment
Author:
Parvez Anwar
Comments: Search Security Award Winning Project

RHUL-MA-2009-7 [abstract, pdf]:

Title: Management of Risks Associated with De-Perimeterisation
Author:
Kwok Keeng Lee
Comments: Search Security Award Winning Project

RHUL-MA-2009-8 [abstract, pdf]:

Title: Digital Rights Management: Towards a Balance between Copyright Rights and Fair Use Exceptions
Author:
Christian Bonnici
Comments: Search Security Award Winning Project

RHUL-MA-2009-9 [abstract, pdf]:

Title: Extending Secure Execution Environments Beyond the TPM
Author:
Talha Tariq
Comments: Search Security Award Winning Project

RHUL-MA-2009-10 [abstract, pdf]:

Title: Secure Payment Architectures and Other Applications of Trusted Computing
Author:
Shane Balfe
Comments: PhD Thesis, 223 pages

RHUL-MA-2009-11 [abstract, pdf]:

Title: On Quantum Codes and Networks
Author: Colin Michael Wilmott 
Comments: PhD Thesis, 211 pages

RHUL-MA-2009-12 [abstract, pdf]:

Title: Applications of Frobenius Expansions in Elliptic Curve Cryptography
Author: Waldyr Dias Benits Junior
Comments: PhD Thesis, 204 pages

RHUL-MA-2009-13 [abstract, pdf]:

Title: On the Decisional Diffie-Hellman Problem in Genus 2
Author:
Jordi Pujolas
Comments:
PhD Thesis, 99 pages

RHUL-MA-2009-14 [abstract, pdf]:

Title: Pairwise Generating Sets for the Symmetric and Alternating Groups
Author:
Linda Stringer
Comments:
  PhD thesis, 185 pages

RHUL-MA-2009-15 [abstract, pdf]:

Title: Design and Analysis of Fair Content Tracing Protocols
Author:
Geong Sen Poh
Comments: PhD thesis, 231 pages

RHUL-MA-2009-16 [abstract, pdf]:

Title: E-business Information Systems Security Design Paradigm and Model
Author: Sharon Nachtigal
Comments:
PhD thesis, 346 pages

RHUL-MA-2009-17 [abstract, pdf]:

Title: Securing Mobile Services using Trusted Computing
Author: Adrian Ho Yin Leung
Comments: PhD thesis, 198 pages

RHUL-MA-2009-18 [abstract, pdf]:

Title: The application of hash chains and hash structures to cryptography
Author: Thomas Page
Comments: PhD thesis, 232 pages

RHUL-MA-2009-19 [abstract, pdf]:

Title: The Effectiveness of the Linear Hull Effect
Author: Sean Murphy
Comments: 

RHUL-MA-2009-20 [abstract, pdf]:

Title: The Return of the Boomerang
Author: Sean Murphy
Comments:

RHUL-MA-2009-21 [abstract, pdf]:

Title: Overestimates for the Gain of Multiple Linear Approximations
Author: Sean Murphy
Comments:

RHUL-MA-2009-22 [abstract, pdf]:

Title: Cryptanalysis of Dedicated Cryptographic Hash Functions
Author: Markku-Juhani Olavi Saarinen
Comments:
PhD thesis, 116 pages

RHUL-MA-2009-23 [abstract, pdf]:

Title: Diameters of Orbital Graphs associated to Groups
Author: Tom Smith
Comments:
42 pages

RHUL-MA-2009-24 [abstract, pdf]:

Title: RFID Authentification Protocols using Symmetric Cryptography
Author:
Boyeon Song
Comments: PhD thesis, 133 pages

RHUL-MA-2009-25 [abstract, pdf]:

Title: E-payments: cardholder privacy and non-repudiation
Author: David John Boyd
Comments: PhD thesis, 270 pages

RHUL-MA-2009-26 [abstract, pdf]:

Title: Efficient, Reliable and Secure Distributed Protocols for MANETs
Author:
Steffen Reidt
Comments: PhD thesis, 216 pages

2008

RHUL-MA-2008-1 [abstract, pdf]:

Title: Intrusion Detection and Prevention: Immunologically Inspired Approaches
Author: Devid Pipa
Comments: Search Security Award M.Sc. thesis, 98 pages

RHUL-MA-2008-2 [abstract, pdf]:

Title: Metamorphic Virus: Analysis and Detection
Author: Evgenios Konstantinou
Comments: Search Security Award M.Sc. thesis, 93 pages

RHUL-MA-2008-3 [abstract, pdf]:

Title: Copy Protection of Computer Games
Author: Richard Hyams
Comments: Search Security Award M.Sc. thesis, 64 pages

RHUL-MA-2008-4 [abstract, pdf]:

Title: Forensics of BitTorrent
Author: Jamie Acorn
Comments: Search Security Award M.Sc. thesis, 92 pages

RHUL-MA-2008-5 [abstract, pdf]:

Title: Securing Financially Sensitive Environments with OpenBSD
Author: Nicholas C. P. Humphrey
Comments: Search Security Award M.Sc. thesis, 95 pages

RHUL-MA-2008-6 [abstract, pdf]:

Title: Cheating and Virtual Crime in Massively Multiplayer Online Games
Author: Rahul Joshi
Comments: Search Security Award M.Sc. thesis, 89 pages

RHUL-MA-2008-7 [abstract, pdf]:

Title: Review and Analysis of Current and Future European e-ID Schemes
Author:
Siddhartha Arora
Comments: Search Security Award M.Sc. thesis, 73 pages

RHUL-MA-2008-8 [abstract, pdf]:

Title: Information Security Training & Awareness
Author:
Monique Hogervorst
Comments: Search Security Award M.Sc. thesis, 108 pages

RHUL-MA-2008-9 [abstract, pdf]:

Title: Computer Security: A Machine Learning Approach
Author:
Sandeep V. Sabnani
Comments: Search Security Award M.Sc. thesis, 62 pages

RHUL-MA-2008-10 [abstract, pdf]:

Title: Proposed Model for Outsourcing PKI
Author:
Christopher McLaughlin
Comments: Search Security Award M.Sc. thesis, 173 pages

RHUL-MA-2008-11 [abstract, pdf]:

Title: Network Covert Channels: Review of Current State and Analysis of Viability of the use of X.509 Certificates for Covert Communications
Author:
Carlos Scott
Comments: Search Security Award M.Sc. thesis, 50 pages

RHUL-MA-2008-12 [abstract, pdf]:

Title: Detecting Pandemic and Endemic Incidents through Network Telescopes: Security Analysis
Author:
Fotis Gagadis
Comments: Search Security Award M.Sc. thesis, 106 pages

RHUL-MA-2008-13 [abstract, pdf]:

Title: Tigger team -- a novel methodology to manage business risk
Author:
Ian McKinnon
Comments: Search Security Award M.Sc. thesis, 50 pages

RHUL-MA-2008-14 [abstract, pdf]:

Title: Challenges for Trusted Computing
Author:
Shane Balfe, Eimear Gallery, Chris J. Mitchell and Kenneth G. Paterson
Comments: 24 pages

RHUL-MA-2008-15 [abstract, pdf]:

Title: Internet Authentication for Remote Access
Author:
Paulo Sergio Pagliusi
Comments: PhD thesis, 425 pages

RHUL-MA-2008-16 [abstract, pdf]:

Title: Security consideration for virtualization
Author:
Carl Gebhardt and Allan Tomlinson
Comments: 16 pages

RHUL-MA-2008-17 [abstract, pdf]:

Title: Digital Rights Management for Personal Networks
Author:
Imad Mahmoud Aref Abbadi
Comments: PhD thesis, 262 pages

RHUL-MA-2008-18 [abstract, pdf]:

Title: A key management framework for secure group communication in wireless mobile environment
Author: Laila Mat Kia
Comments: PhD thesis

RHUL-MA-2008-19 [abstract , pdf]

Title: Cryptanalysis of Block Ciphers
Author:
Jiqiang Lu
Comments: PhD thesis, 222 pages

RHUL-MA-2008-20 [abstract , pdf]

Title: Security Challenges for Swarm Robotics
Author:
Fiona Higgins
Comments: 11 pages

2007

RHUL-MA-2007-1 [abstract, pdf]:

Title: Enhancing End User Security - Attacks & Solutions
Author: Adil M. Alsaid
Comments: PhD thesis, 177 pages

RHUL-MA-2007-2 [abstract, pdf]:

Title: Role Signatures for Access Control in Grid Computing
Authors: Jason Crampton and Hoon Wei Lim
Comments: 19 pages

RHUL-MA-2007-3 [abstract, pdf]:

Title: Authorisation Issues for Mobile Code in Mobile Systems
Authors: Eimear Gallery
Comments: PhD thesis, 596 pages

RHUL-MA-2007-4 [abstract, pdf]:

Title: A Geometric View of Cryptographic Equation Solving
Authors: Sean Murphy and Maura Paterson
Comments: 50 pages

RHUL-MA-2007-5 [abstract, pdf]:

Title: Secure Cryptographic Algorithm Implementation on Embedded Platforms
Author: Michael Tunstall
Comments: PhD thesis, 242 pages

RHUL-MA-2007-6 [abstract, pdf]:

Title: Resonance behaviour for classes of billiards on the Poincaré half-plane
Author: Phil Howard
Comments: PhD thesis, 177 pages

RHUL-MA-2007-7 [abstract, pdf]:

Title: On User Privacy for Location-based Services
Author: Anand S. Gajparia
Comments: PhD thesis, 190 pages

RHUL-MA-2007-8 [abstract, pdf]:

Title: Comments on the security of the SPAPA strong password authentication protocol
Authors: Chris J. Mitchell and Siaw-Lynn Ng
Comments: 4 pages

RHUL-MA-2007-9 [abstract, pdf]:

Title: Key Establishment Protocols and Timed-Release Encryption Schemes
Authors: Qiang Tang
Comments: PhD thesis, 270 pages

RHUL-MA-2007-10 [abstract, pdf]:

Title: On a Possible Privacy Flaw in Direct Anonymous Attestation
Authors: Adrian Leung, Liqun Chen, and Chris J. Mitchell
Comments: 13 pages

2006


RHUL-MA-2006-1 [abstract, pdf]:

Title: On the Difficulty of Prime Root Computation in Certain Finite Cyclic Groups
Author: Anna M. Johnston
Comments: PhD thesis, 147 pages

RHUL-MA- 2006-2 [abstract, pdf]:

Title: On the Application of Identity-Based Cryptography in Grid Security
Author: Hoon Wei Lim
Comments: PhD thesis, 189 pages

RHUL-MA-2006-3 [abstract, pdf]:

Title: Likelihood Estimation for Block Cipher Keys
Author: Sean Murphy, Fred Piper, Michael Walker and Peter Wild
Comments: 27 Pages. This version was written in 1995. Similar versions were written in 1994 and 1992.

RHUL-MA-2006-4 [abstract, pdf]:

Title: Projective Aspects of the AES Inversion
Author: Wen-Ai Jackson and Sean Murphy
Comments: 15 pages

RHUL-MA-2006-5 [abstract, pdf]:

Title: An Electronic Voting System Using GSM Mobile Technology
Author: Yang Feng, Siaw-Lynn Ng and Scarlet Schwiderski-Grosche
Comments: 17 pages

RHUL-MA-2006-6 [abstract, pdf]:

Title: Location Discovery using Ad Hoc Networks
Author: Anand S. Gajparia and Po Wah Yau
Comments: 19 pages

RHUL-MA-2006-7 [abstract, pdf]:

Title: Cryptanalysis of a Homomorphic Public-Key Cryptosystem
Author: Su-Jeong Choi
Comments: PhD thesis, 309 pages

RHUL-MA-2006-8 [abstract, pdf]:

Title: Special Signature Schemes and Key Agreement Protocols
Author: Caroline J. Kudla
Comments: PhD thesis, 188 pages

RHUL-MA-2006-9 [abstract, pdf]:

Title: Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis
Authors: Shane Balfe and Kenneth G. Paterson
Comments: 30 pages

RHUL-MA-2006-9-v2 [abstract, pdf]:

Title: Augmenting Internet-based Card Not Present Transactions with Trusted Computing: An Analysis
Authors: Shane Balfe and Kenneth G. Paterson
Comments: 25 pages

RHUL-MA-2006-10 [abstract, pdf]:

Title: e-EMV: Emulating EMV for Internet payments using Trusted Computing technology
Authors: Shane Balfe and Kenneth G. Paterson
Comments: 52 pages

RHUL-MA-2006-10 v2 [abstract, pdf]:

Title: e-EMV: Emulating EMV for Internet Payments using Trusted Computing Technology
Authors: Shane Balfe and Kenneth G. Paterson
Comments: 33 pages

RHUL-MA-2006-11 [abstract, pdf]:

Title: Lazy updates in key assignment schemes for hierarchical access control
Authors: Jason Crampton
Comments: 20 pages

2005


RHUL-MA-2005-1 [abstract, postscript, pdf]:

Title: Security of the Lin-Lai smart card based user authentication scheme
Author: Chris J. Mitchell and Qiang Tang
Comments: 9 pages

RHUL-MA-2005-2 [abstract, pdf]:

Title: Cryptographic Schemes based on Elliptic Curve Pairings
Author: Sattam S. Al-Riyami
Comments: PhD thesis, 277 pages

RHUL-MA- 2005-3 [abstract, postscript, pdf]:

Title: Timestamps and authentication protocols
Author: Chris J. Mitchell
Comments: 9 pages

RHUL-MA-2005-4 [abstract, pdf]:

Title: Cryptanalysis of a technique to transform discrete logarithm based cryptosystems into identity-based cryptosystems
Author: Qiang Tang and Chris J. Mitchell
Comments: 5 pages

RHUL-MA-2005-5 [abstract, pdf]:

Title: A set theoretic approach to broadcast encryption
Author: Thomas Martin
Comments: PhD thesis, 240 pages

RHUL-MA-2005-6 [abstract, pdf]:

Title: Understanding and Developing Role-Based Administrative Models
Author: Jason Crampton
Comments: 26 pages

RHUL-MA-2005-7 [abstract, postscript, pdf]:

Title: Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption?
Author: Chris J. Mitchell
Comments: 18 pages

RHUL-MA-2005-8 [abstract, postscript, pdf]:

Title: PKI - An Insider's View (Extended Abstract)
Author: Geraint Price
Comments: 30 pages

RHUL-MA-2005-9 [abstract, postscript, pdf]:

Title: Towards the Secure Initialisation of a Personal Distributed Environment
Author: Scarlet Schwiderski-Grosche, Allan Tomlinson and David B. Pearce
Comments: 22 pages

RHUL-MA-2005-10 [abstract, postscript, pdf]:

Title: Decoherent Histories and Quantum Maps
Author: Artur Scherer
Comments: PhD thesis, 140 pages

RHUL-MA-2005-11 [abstract, pdf]:

Title: Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers
Author: Eimear Gallery, Allan Tomlinson and Rob Delicata
Comments: 35 pages

RHUL-MA-2005-12 [abstract, pdf]:

Title: Dynamic Frameproof Codes
Author: Maura Paterson
Comments: PhD thesis, 122 pages

RHUL-MA-2005-13 [abstract, pdf]:

Title: Interdomain User Authentication and Privacy
Author: Andreas Pashalidis
Comments: PhD thesis, 310 pages

2004


RHUL-MA-2004-1 [abstract, postscript, pdf]:

Title: On the satisfiability of constraints in workflow systems
Author: Jason Crampton
Comments: 21 pages

RHUL-MA-2004-2 [abstract, pdf]:

Title: Performance study of a COTS Distributed DBMS adapted for multilevel security
Author: Moses Garuba
Comments: PhD thesis, 147 pages

RHUL-MA-2004-3 [abstract, pdf]:

Title: Some observations on the Bit-Search Generator
Author: Chris J. Mitchell
Comments: 8 pages

RHUL-MA-2004-4 [abstract, pdf]:

Title: Cryptanalysis of the Yeh-Sun password-based authentication protocols
Author: Chris J. Mitchell and Qiang Tang
Comments: 6 pages

RHUL-MA-2004-5 [abstract, pdf]:

Title: Secure electronic payments for Islamic finance
Author: Mansour Al-Meaither
Comments: PhD thesis, 200 pages

2003


RHUL-MA-2003-1 [abstract, postscript, pdf]:

Title: On Recursive Parametric Estimation Theory
Author: Teo Sharia
Comments: 35 pages

RHUL-MA-2003-2 [abstract, postscript, pdf]:

Title: On the theory of Point Weight Designs
Author: Alexander W. Dent
Comments: PhD thesis, 111 pages

RHUL-MA-2003-3 [abstract, postscript, pdf]:

Title: Single sign-on using trusted platforms
Author: Andreas Pashalidis and Chris Mitchell
Comments: 15 pages

RHUL-MA-2003-4 [abstract, postscript, pdf]:

Title: On the security of XCBC, TMAC and OMAC
Author: Chris Mitchell
Comments: 15 pages

RHUL-MA-2003-5 [abstract, pdf]:

Title: Multi-agent system security for mobile communication
Author: Niklas Borselius
Comments: PhD thesis, 214 pages

RHUL-MA-2003-6 [abstract, postscript, pdf]:

Title: Public key encryption using block ciphers
Author: Chris Mitchell
Comments: 6 pages

RHUL-MA-2003-7 [abstract, pdf]:

Title: Enhancing the security of electronic commerce transactions
Author: Vorapranee Khu-smith
Comments: PhD thesis, 182 pages

2002


RHUL-MA-2002-1 [pdf]:

Title: Feedback and information gain in single atom cavity QED
Author: Andrei N. Soklakov
Comments: 11 pages

RHUL-MA-2002-2 [abstract, postscript, pdf]:

Title: Contributions to Metric Number Theory
Author: Paul M. D. Rowe
Comments: PhD thesis, 92 pages

RHUL-MA-2002-3 [abstract, postscript, pdf]:

Title: Enhancing e-commerce security using GSM authentication
Author: Vorapranee Khu-smith and Chris J. Mitchell
Comments: 13 pages

2001


RHUL-MA-2001-1 [abstract, postscript, pdf]:

Title: Measures of Dynamical Complexity
Author: Andrei N. Soklakov
Comments: PhD thesis, 119 pages

RHUL-MA-2001-2 [abstract, postscript, pdf]:

Title: Breaking the Simple Authenticated Key Agreement (SAKA) protocol
Author: Chris J. Mitchell
Comments: 3 pages

RHUL-MA-2001-3 [abstract, postscript, pdf]:

Title: The security of the GSM air interface protocol
Author: Chris J. Mitchell
Comments: 15 pages

RHUL-MA-2001-4 [abstract, pdf]:

Title: Key recovery in a business environment
Author: Konstantinos Rantos
Comments: PhD thesis, 190 pages

RHUL-MA-2001-5 [abstract, pdf]:

Title: Design, analysis and applications of cryptographic techniques
Author: Chan Yeob Yeun
Comments: PhD thesis, 135 pages

RHUL-MA-2001-6 [abstract, pdf]:

Title: Secure logging mechanisms for smart cards
Author: Constantinos Markantonakis
Comments: PhD thesis, 187 pages

RHUL-MA-2001-8 [abstract, postscript, pdf]:

Title: Remarks on the security of the alpha1 stream cipher
Author: Chris J. Mitchell
Comments: 5 pages

RHUL-MA-2001-9 [abstract, postscript, pdf]:

Title: An attack on an ID-based multisignature scheme
Author: Chris J. Mitchell
Comments: 2 pages

Department of Mathematics, Royal Holloway, University of London, Egham, Surrey TW20 0EX
Tel/Fax: +44 (0)1784 443093/430766