Project Details
| Short title | First Grant scheme: New Techniques for Finding and Analysing Information Leaks |
|---|---|
| Status | Finished |
| Effective start/end date | 2/04/12 → 1/08/13 |
Funding
- Engineering & Physical Science Research Council
Fingerprint
Explore the research topics touched on by this project. These labels are generated based on the underlying awards/grants. Together they form a unique fingerprint.
Research output
- 2 Conference contribution
-
LeakWatch: Estimating information leakage from java programs
Chothia, T., Kawamoto, Y. & Novakovic, C., 2014, Computer Security - ESORICS 2014 : 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part II. Kutyłowski, M. & Vaidya , J. (eds.). PART 2 ed. Springer, Vol. 8713 LNCS. p. 219-236 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8713 LNCS, no. PART 2).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
27 Citations (Scopus) -
The Unbearable Lightness of Monitoring: Indirect and Direct Peer Monitoring in BitTorrent
Chothia, T., Cova, M., Novakovic, C. & Toro, C., 2012, Security and Privacy in Communication Networks: 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers. Keromytis, A. & Di Pietro, R. (eds.). Springer, p. 185-202 (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; vol. 106).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
File2 Citations (Scopus)440 Downloads (Pure)