Skip to main content

Research Repository

Advanced Search

All Outputs (40)

Unconventional computing 2007 (2007)
Book
Adamatzky, A., de Lacy Costello, B., Bull, L., Stepney, S., & Teuscher, C. (2007). Unconventional computing 2007. Frome: Luniver Press

Subset Signatures with Controlled Context-Hiding
Book
Ghadafi, E. (2017). M. O'Neill (Ed.), Subset Signatures with Controlled Context-Hiding. IMA International Conference on Cryptography and Coding: Springer International Publishing

Subset signatures are a variant of malleable signatures which allow anyone to derive signatures on any subset of previously signed sets in such a way that derived signatures are indistinguishable from new signatures on the subset (i.e.~context-hidi... Read More about Subset Signatures with Controlled Context-Hiding.

Through
Book
Buzzo, D. (2017). Through. blurb

Through. Artists photographic book. "in at one end, side, or surface and out at the other: " 
 
 This book is the second in a series from an exploratory photo study looking up and down and at small things and large things. 
 It was sho... Read More about Through.