default search action
Michael Roe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Alexandre Joannou, Peter Rugg, Jonathan Woodruff, Franz A. Fuchs, Marno van der Maas, Matthew Naylor, Michael Roe, Robert N. M. Watson, Peter G. Neumann, Simon W. Moore:
Randomized Testing of RISC-V CPUs Using Direct Instruction Injection. IEEE Des. Test 41(1): 40-49 (2024) - 2022
- [i1]Michael Roe, Konstantina Spanaki, Athina Ioannou, Efpraxia D. Zamani, Mihalis Giannakis:
Drivers and challenges of internet of things diffusion in smart stores: A field exploration. CoRR abs/2203.03938 (2022) - 2020
- [c46]Nathaniel Wesley Filardo, Brett F. Gutstein, Jonathan Woodruff, Sam Ainsworth, Lucian Paul-Trifu, Brooks Davis, Hongyan Xia, Edward Tomasz Napierala, Alexander Richardson, John Baldwin, David Chisnall, Jessica Clarke, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Alfredo Mazzinghi, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Timothy M. Jones, Simon W. Moore, Peter G. Neumann, Robert N. M. Watson:
Cornucopia: Temporal Safety for CHERI Heaps. SP 2020: 608-625 - [c45]Kyndylan Nienhuis, Alexandre Joannou, Thomas Bauereiss, Anthony C. J. Fox, Michael Roe, Brian Campbell, Matthew Naylor, Robert M. Norton, Simon W. Moore, Peter G. Neumann, Ian Stark, Robert N. M. Watson, Peter Sewell:
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process. SP 2020: 1003-1020
2010 – 2019
- 2019
- [j5]Jonathan Woodruff, Alexandre Joannou, Hongyan Xia, Anthony C. J. Fox, Robert M. Norton, David Chisnall, Brooks Davis, Khilan Gudka, Nathaniel Wesley Filardo, A. Theodore Markettos, Michael Roe, Peter G. Neumann, Robert N. M. Watson, Simon W. Moore:
CHERI Concentrate: Practical Compressed Capabilities. IEEE Trans. Computers 68(10): 1455-1469 (2019) - [c44]Brooks Davis, Robert N. M. Watson, Alexander Richardson, Peter G. Neumann, Simon W. Moore, John Baldwin, David Chisnall, Jessica Clarke, Nathaniel Wesley Filardo, Khilan Gudka, Alexandre Joannou, Ben Laurie, A. Theodore Markettos, J. Edward Maste, Alfredo Mazzinghi, Edward Tomasz Napierala, Robert M. Norton, Michael Roe, Peter Sewell, Stacey D. Son, Jonathan Woodruff:
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment. ASPLOS 2019: 379-393 - [c43]Hongyan Xia, Jonathan Woodruff, Sam Ainsworth, Nathaniel Wesley Filardo, Michael Roe, Alexander Richardson, Peter Rugg, Peter G. Neumann, Simon W. Moore, Robert N. M. Watson, Timothy M. Jones:
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety. MICRO 2019: 545-557 - 2018
- [c42]Hongyan Xia, Jonathan Woodruff, Hadrien Barral, Lawrence Esswood, Alexandre Joannou, Robert Kovacsics, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alexander Richardson, Simon W. Moore, Robert N. M. Watson:
CheriRTOS: A Capability Model for Embedded Devices. ICCD 2018: 92-99 - 2017
- [c41]David Chisnall, Brooks Davis, Khilan Gudka, David Brazdil, Alexandre Joannou, Jonathan Woodruff, A. Theodore Markettos, J. Edward Maste, Robert M. Norton, Stacey D. Son, Michael Roe, Simon W. Moore, Peter G. Neumann, Ben Laurie, Robert N. M. Watson:
CHERI JNI: Sinking the Java Security Model into the C. ASPLOS 2017: 569-583 - [c40]Alexandre Joannou, Jonathan Woodruff, Robert Kovacsics, Simon W. Moore, Alex Bradbury, Hongyan Xia, Robert N. M. Watson, David Chisnall, Michael Roe, Brooks Davis, Edward Napierala, John Baldwin, Khilan Gudka, Peter G. Neumann, Alfredo Mazzinghi, Alex Richardson, Stacey D. Son, A. Theodore Markettos:
Efficient Tagged Memory. ICCD 2017: 641-648 - 2016
- [j4]Robert N. M. Watson, Robert M. Norton, Jonathan Woodruff, Simon W. Moore, Peter G. Neumann, Jonathan Anderson, David Chisnall, Brooks Davis, Ben Laurie, Michael Roe, Nirav H. Dave, Khilan Gudka, Alexandre Joannou, A. Theodore Markettos, Ed Maste, Steven J. Murdoch, Colin Rothwell, Stacey D. Son, Munraj Vadera:
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture. IEEE Micro 36(5): 38-49 (2016) - 2015
- [c39]David Chisnall, Colin Rothwell, Robert N. M. Watson, Jonathan Woodruff, Munraj Vadera, Simon W. Moore, Michael Roe, Brooks Davis, Peter G. Neumann:
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine. ASPLOS 2015: 117-130 - [c38]Robert N. M. Watson, Jonathan Woodruff, Peter G. Neumann, Simon W. Moore, Jonathan Anderson, David Chisnall, Nirav H. Dave, Brooks Davis, Khilan Gudka, Ben Laurie, Steven J. Murdoch, Robert M. Norton, Michael Roe, Stacey D. Son, Munraj Vadera:
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization. IEEE Symposium on Security and Privacy 2015: 20-37 - 2014
- [c37]Jonathan Woodruff, Robert N. M. Watson, David Chisnall, Simon W. Moore, Jonathan Anderson, Brooks Davis, Ben Laurie, Peter G. Neumann, Robert M. Norton, Michael Roe:
The CHERI capability model: Revisiting RISC in an age of risk. ISCA 2014: 457-468 - 2013
- [e13]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Lecture Notes in Computer Science 7028, Springer 2013, ISBN 978-3-642-36212-5 [contents] - 2011
- [c36]Wei Xu, Dongping Song, Michael Roe:
Production and raw material ordering management for a manufacturing supply chain with uncertainties. IEEM 2011: 747-751 - [c35]Michael Roe:
The Metaplace Security Model. Security Protocols Workshop 2011: 313-326 - [c34]Michael Roe:
The Metaplace Security Model (Transcript of Discussion). Security Protocols Workshop 2011: 327-335 - [e12]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Lecture Notes in Computer Science 6615, Springer 2011, ISBN 978-3-642-22136-1 [contents] - 2010
- [j3]Gi-Tae Yeo, Dong-Wook Song, John Dinwoodie, Michael Roe:
Weighting the competitiveness factors for container ports under conflicting interests. J. Oper. Res. Soc. 61(8): 1249-1257 (2010) - [c33]Michael Roe:
Generating Channel Ids in Virtual World Operating Systems (Extended Abstract). Security Protocols Workshop 2010: 71-73 - [c32]Michael Roe:
Censorship of eBooks (Extended Abstract). Security Protocols Workshop 2010: 191-199 - [c31]Michael Roe:
Censorship of eBooks (Transcript of Discussion). Security Protocols Workshop 2010: 200-206 - [e11]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 [contents]
2000 – 2009
- 2009
- [c30]Janne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe:
Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130 - [e10]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 [contents] - 2008
- [c29]Tuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed:
Chattering Laptops. Privacy Enhancing Technologies 2008: 167-186 - [c28]Michael Roe:
Problems of Provenance for Digital Libraries. Security Protocols Workshop 2008: 126-133 - [c27]Michael Roe:
Problems of Provenance for Digital Libraries (Transcript of Discussion). Security Protocols Workshop 2008: 134-143 - 2007
- [c26]Tuomas Aura, Michael Roe, Steven J. Murdoch:
Securing network location awareness with authenticated DHCP. SecureComm 2007: 391-402 - [c25]Tuomas Aura, Moritz Becker, Michael Roe, Piotr Zielinski:
Reconciling Multiple IPsec and Firewall Policies. Security Protocols Workshop 2007: 81-97 - [c24]Michael Roe:
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion). Security Protocols Workshop 2007: 98-103 - [c23]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. Security Protocols Workshop 2007: 256 - [e9]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4631, Springer 2007, ISBN 978-3-540-77155-5 [contents] - 2006
- [j2]Tuomas Aura, Michael Roe:
Designing the mobile IPv6 security protocol. Ann. des Télécommunications 61(3-4): 332-356 (2006) - [c22]Tuomas Aura, Thomas A. Kuhn, Michael Roe:
Scanning electronic documents for personally identifiable information. WPES 2006: 41-50 - [e8]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 [contents] - 2005
- [c21]Tuomas Aura, Michael Roe:
Reducing Reauthentication Delay in Wireless Networks. SecureComm 2005: 139-148 - [c20]Tuomas Aura, Michael Roe, Anish Mohammed:
Experiences with Host-to-Host IPsec. Security Protocols Workshop 2005: 3-22 - [c19]Michael Roe:
Non-repudiation and the Metaphysics of Presence. Security Protocols Workshop 2005: 204-206 - [c18]Michael Roe:
Non-repudiation and the Metaphysics of Presence. Security Protocols Workshop 2005: 207-214 - [e7]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers. Lecture Notes in Computer Science 3364, Springer 2005, ISBN 3-540-28389-7 [contents] - 2004
- [e6]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers. Lecture Notes in Computer Science 2845, Springer 2004, ISBN 3-540-20830-5 [contents] - 2003
- [c17]Bruce Christianson, Michael Roe, David Wheeler:
Secure Sessions from Weak Secrets. Security Protocols Workshop 2003: 190-205 - [c16]Michael Roe:
Panel Session: Is Protocol Modelling Finished? Security Protocols Workshop 2003: 213-217 - 2002
- [c15]Tuomas Aura, Michael Roe, Jari Arkko:
Security of Internet Location Management. ACSAC 2002: 78-87 - [c14]Jari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe:
Securing IPv6 neighbor and router discovery. Workshop on Wireless Security 2002: 77-86 - [e5]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers. Lecture Notes in Computer Science 2467, Springer 2002, ISBN 3-540-44263-4 [contents] - 2001
- [j1]Greg O'Shea, Michael Roe:
Child-proof authentication for MIPv6 (CAM). Comput. Commun. Rev. 31(2): 4-8 (2001) - [c13]Michael Roe:
Experiences of Mobile IP Security. Security Protocols Workshop 2001: 4-11 - [e4]Bruce Christianson, Bruno Crispo, Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers. Lecture Notes in Computer Science 2133, Springer 2001, ISBN 3-540-42566-7 [contents] - 2000
- [c12]Michael Roe:
Authentication and Naming (Transcript of Discussion). Security Protocols Workshop 2000: 20-23 - [c11]Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas:
Government Access to Keys - Panel Discussion. Security Protocols Workshop 2000: 62-73 - [e3]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings. Lecture Notes in Computer Science 1796, Springer 2000, ISBN 3-540-67381-4 [contents]
1990 – 1999
- 1999
- [c10]Hajime Morito, Michael Roe, E. Stewart Lee:
Digital Copy Protection Scheme Using Recording Medium Identifier. ICPP Workshops 1999: 174-178 - [c9]Michael Roe:
Performance of Protocols. Security Protocols Workshop 1999: 140-152 - [e2]Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings. Lecture Notes in Computer Science 1550, Springer 1999, ISBN 3-540-65663-4 [contents] - 1998
- [c8]Michael Roe:
Certification and Delegation (Transcript of Discussion). Security Protocols Workshop 1998: 168-176 - [e1]Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1361, Springer 1998, ISBN 3-540-64040-1 [contents] - 1997
- [b1]Michael Roe:
Cryptography and evidence. University of Cambridge, UK, 1997 - [c7]Ross J. Anderson, Michael Roe:
The GCHQ Protocol and Its Problems. EUROCRYPT 1997: 134-148 - 1996
- [c6]Shaw-Cheng Chuang, Michael Roe:
A Case Study of Secure ATM Switch Booting. NDSS 1996: 103-113 - 1994
- [c5]Michael Roe:
How to Reverse Engineer an EES Device. FSE 1994: 305-328 - [c4]Michael Roe:
Performance of Block Ciphers and Hash Functions - One Year Later. FSE 1994: 359-362 - 1993
- [c3]Michael Roe:
Performance of Symmetric Ciphers and One-Way Hash Functions. FSE 1993: 83-89 - 1990
- [c2]Michael Roe, Tom Casey:
Integrating cryptography in the trusted computing base. ACSAC 1990: 50-56
1980 – 1989
- 1989
- [c1]Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur:
Secure automated document delivery. ACSAC 1989: 348-356
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-24 20:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint