default search action
Bruce Christianson
Person information
- affiliation: University of Hertfordshire, Hatfield, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Michael Bartholomew-Biggs, Salah Beddiaf, Bruce Christianson:
Global convergence of a curvilinear search for non-convex optimization. Numer. Algorithms 92(4): 2025-2043 (2023) - [c90]Bruce Christianson, Alex Shafarenko:
Transporting a Secret Using Destructively-Read Memory. Security Protocols Workshop 2023: 32-37 - [e24]Frank Stajano, Vashek Matyás, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers. Lecture Notes in Computer Science 14186, Springer 2023, ISBN 978-3-031-43032-9 [contents] - [i1]Jan Hückelheim, Harshitha Menon, William S. Moses, Bruce Christianson, Paul D. Hovland, Laurent Hascoët:
Understanding Automatic Differentiation Pitfalls. CoRR abs/2305.07546 (2023) - 2022
- [j21]Aldo Febro, Hannan Xiao, Joseph Spring, Bruce Christianson:
Edge security for SIP-enabled IoT devices with P4. Comput. Networks 203: 108698 (2022) - [j20]Aldo Febro, Hannan Xiao, Joseph Spring, Bruce Christianson:
Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain. Comput. Networks 216: 109267 (2022) - [j19]Eric Chiejina, Hannan Xiao, Bruce Christianson, Alexios Mylonas, Chidinma Chiejina:
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. Sensors 22(2): 571 (2022) - 2020
- [j18]Michael Bartholomew-Biggs, Salah Beddiaf, Bruce Christianson:
A comparison of methods for traversing regions of non-convexity in optimization problems. Numer. Algorithms 85(1): 231-253 (2020) - [e23]Jonathan Anderson, Frank Stajano, Bruce Christianson, Vashek Matyás:
Security Protocols XXVII - 27th International Workshop, Cambridge, UK, April 10-12, 2019, Revised Selected Papers. Lecture Notes in Computer Science 12287, Springer 2020, ISBN 978-3-030-57042-2 [contents]
2010 – 2019
- 2018
- [j17]Bruce Christianson, Shaun A. Forth, Andreas Griewank:
Preface. Optim. Methods Softw. 33(4-6): 671 (2018) - [j16]Bruce Christianson:
Differentiating through conjugate gradient. Optim. Methods Softw. 33(4-6): 988-994 (2018) - [c89]Tamsanqa Ngalo, Hannan Xiao, Bruce Christianson, Ying Zhang:
Threat Analysis of Software Agents in Online Banking and Payments. DASC/PiCom/DataCom/CyberSciTech 2018: 716-723 - [e22]Vashek Matyás, Petr Svenda, Frank Stajano, Bruce Christianson, Jonathan Anderson:
Security Protocols XXVI - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11286, Springer 2018, ISBN 978-3-030-03250-0 [contents] - 2017
- [c88]Paul Wernick, Bruce Christianson, Joseph Spring:
Simulating Perceptions of Security. Security Protocols Workshop 2017: 60-68 - [c87]Partha Das Chowdhury, Bruce Christianson:
Self Attestation of Things. Security Protocols Workshop 2017: 76-84 - [e21]Jonathan Anderson, Vashek Matyás, Bruce Christianson, Frank Stajano:
Security Protocols XXIV - 24th International Workshop, Brno, Czech Republic, April 7-8, 2016, Revised Selected Papers. Lecture Notes in Computer Science 10368, Springer 2017, ISBN 978-3-319-62032-9 [contents] - [e20]Frank Stajano, Jonathan Anderson, Bruce Christianson, Vashek Matyás:
Security Protocols XXV - 25th International Workshop, Cambridge, UK, March 20-22, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10476, Springer 2017, ISBN 978-3-319-71074-7 [contents] - 2016
- [j15]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks. IEEE J. Biomed. Health Informatics 20(3): 763-774 (2016) - [c86]Jean Petric, David Bowes, Tracy Hall, Bruce Christianson, Nathan Baddoo:
The jinx on the NASA software defect data sets. EASE 2016: 13:1-13:5 - [c85]Jean Petric, David Bowes, Tracy Hall, Bruce Christianson, Nathan Baddoo:
Building an Ensemble for Software Defect Prediction Based on Diversity Selection. ESEM 2016: 46:1-46:10 - [c84]Giampaolo Bella, Bruce Christianson, Luca Viganò:
Invisible Security. Security Protocols Workshop 2016: 1-9 - [c83]Paul Wernick, Bruce Christianson:
The Price of Belief: Insuring Credible Trust? Security Protocols Workshop 2016: 35-38 - [c82]Bruce Christianson:
The Price of Belief: Insuring Credible Trust? (Transcript of Discussion). Security Protocols Workshop 2016: 39-46 - [c81]Hannan Xiao, Awatif Ali Alshehri, Bruce Christianson:
A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels. Trustcom/BigDataSE/ISPA 2016: 332-339 - [c80]Chaminda Alocious, Hannan Xiao, Bruce Christianson:
Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks. WCNC 2016: 1-6 - 2015
- [j14]Eric Chiejina, Hannan Xiao, Bruce Christianson:
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. Comput. 4(2): 87-112 (2015) - [c79]Chaminda Alocious, Hannan Xiao, Bruce Christianson, James A. Malcolm:
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. CIT/IUCC/DASC/PICom 2015: 1853-1860 - [c78]Hannan Xiao, Nitin Sidhu, Bruce Christianson:
Guarantor and reputation based trust model for Social Internet of Things. IWCMC 2015: 600-605 - [c77]Chaminda Alocious, Hannan Xiao, Bruce Christianson:
Analysis of DoS attacks at MAC Layer in mobile adhoc networks. IWCMC 2015: 811-816 - [c76]Frank Stajano, Bruce Christianson, T. Mark A. Lomas, Graeme Jenkinson, Jeunese A. Payne, Max Spencer, Quentin Stafford-Fraser:
Pico Without Public Keys. Security Protocols Workshop 2015: 195-211 - [c75]Paul Wernick, Bruce Christianson:
Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past". Security Protocols Workshop 2015: 307-313 - [e19]Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 [contents] - 2014
- [j13]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
A Survey of Access Control Models in Wireless Sensor Networks. J. Sens. Actuator Networks 3(2): 150-180 (2014) - [c74]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. Healthcom 2014: 130-135 - [c73]Partha Das Chowdhury, Bruce Christianson:
Beyond Trust. Security Protocols Workshop 2014: 340-344 - [c72]Hannan Xiao, Dashti M. Ibrahim, Bruce Christianson:
Energy consumption in Mobile Ad Hoc Networks. WCNC 2014: 2599-2604 - [e18]Bruce Christianson, James A. Malcolm:
Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7061, Springer 2014, ISBN 978-3-662-45920-1 [contents] - [e17]Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson:
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers. Lecture Notes in Computer Science 8809, Springer 2014, ISBN 978-3-319-12399-8 [contents] - 2013
- [j12]Santanu Kumar Dash, Sven-Bodo Scholz, Stephan Herhut, Bruce Christianson:
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. Theor. Comput. Sci. 513: 25-37 (2013) - [c71]Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model for medical data in Wireless Sensor Networks. Healthcom 2013: 303-309 - [c70]Santanu Kumar Dash, Sven-Bodo Scholz, Bruce Christianson:
Modular design of data-parallel graph algorithms. HPCS 2013: 398-404 - [c69]Ismael Duque-Garcia, Kerstin Dautenhahn, Kheng Lee Koay, Ian Willcock, Bruce Christianson:
A different approach of using Personas in human-robot interaction: Integrating Personas as computational models to modify robot companions' behaviour. RO-MAN 2013: 424-429 - [c68]Kheng Lee Koay, Michael L. Walters, Alex May, Anna Dumitriu, Bruce Christianson, Nathan Burke, Kerstin Dautenhahn:
Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House. ICSR 2013: 290-300 - [c67]Hagen Lehmann, Michael L. Walters, Anna Dumitriu, Alex May, Kheng Lee Koay, Joan Saez-Pons, Dag Sverre Syrdal, Luke Jai Wood, Joe Saunders, Nathan Burke, Ismael Duque-Garcia, Bruce Christianson, Kerstin Dautenhahn:
Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots. ICSR 2013: 402-411 - [c66]Bruce Christianson:
Introduction: What's Happening on the Other Channel? (Transcript of Discussion). Security Protocols Workshop 2013: 1-2 - [c65]Peter Y. A. Ryan, Bruce Christianson:
Enhancements to Prepare-and-Measure Based QKD Protocols. Security Protocols Workshop 2013: 123-133 - [e16]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Lecture Notes in Computer Science 7028, Springer 2013, ISBN 978-3-642-36212-5 [contents] - [e15]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 [contents] - 2012
- [j11]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Reflections on the NASA MDP data sets. IET Softw. 6(6): 549-558 (2012) - [j10]Bruce Christianson, Uwe Naumann, Jean Utke, Andrea Walther:
Preface. Optim. Methods Softw. 27(2): 175 (2012) - [c64]Thomas Shippey, David Bowes, Bruce Christianson, Tracy Hall:
A mapping study of software code cloning. EASE 2012: 274-278 - [c63]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Trustworthiness and authentication in ubiquitous computing. MOBIWAC 2012: 135-138 - [c62]Htoo Aung Maw, Hannan Xiao, Bruce Christianson:
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. Q2SWinet 2012: 81-84 - [c61]Bruce Christianson:
Introduction: Bringing Protocols to Life (Transcript of Discussion). Security Protocols Workshop 2012: 1-2 - [c60]Michael L. Walters, Dag Sverre Syrdal, Kerstin Dautenhahn, Anna Dumitriu, Alex May, Bruce Christianson, Kheng Lee Koay:
My Familiar Robot Companion: Preferences and Perceptions of CHARLY, a Companion Humanoid Autonomous Robot for Living with You. TAROS 2012: 300-312 - [e14]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7622, Springer 2012, ISBN 978-3-642-35693-3 [contents] - 2011
- [j9]Nasser Abouzakhar, Huankai Chen, Bruce Christianson:
An Enhanced Fuzzy ARM Approach for Intrusion Detection. Int. J. Digit. Crime Forensics 3(2): 41-61 (2011) - [c59]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
The misuse of the NASA metrics data program data sets for automated software defect prediction. EASE 2011: 96-103 - [c58]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Further thoughts on precision. EASE 2011: 129-133 - [c57]Bruce Christianson:
Introduction: Alice Doesn't Live Here Anymore (Transcript). Security Protocols Workshop 2011: 1-3 - [c56]Alexander V. Shafarenko, Bruce Christianson:
Gearing Up: How to Eat Your Cryptocake and Still Have It. Security Protocols Workshop 2011: 258-259 - [e13]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Lecture Notes in Computer Science 6615, Springer 2011, ISBN 978-3-642-22136-1 [contents] - [e12]Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano:
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7114, Springer 2011, ISBN 978-3-642-25866-4 [contents] - 2010
- [j8]Hannan Xiao, Ying Zhang, James A. Malcolm, Bruce Christianson, Kee Chaing Chua:
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. Wirel. Sens. Netw. 2(7): 493-503 (2010) - [c55]Amiy R. Chatley, Kerstin Dautenhahn, Mick L. Walters, Dag Sverre Syrdal, Bruce Christianson:
Theatre as a Discussion Tool in Human-Robot Interaction Experiments - A Pilot Study. ACHI 2010: 73-78 - [c54]Frank Stajano, Ford-Long Wong, Bruce Christianson:
Multichannel Protocols to Prevent Relay Attacks. Financial Cryptography 2010: 4-19 - [c53]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Software defect prediction using static code metrics underestimates defect-proneness. IJCNN 2010: 1-7 - [c52]Bruce Christianson:
Introduction: Virtually Perfect Security (Transcript of Discussion). Security Protocols Workshop 2010: 1-2 - [c51]Bruce Christianson, Alex Shafarenko, Frank Stajano, Ford-Long Wong:
Relay-Proof Channels Using UWB Lasers. Security Protocols Workshop 2010: 45-46 - [c50]Partha Das Chowdhury, Bruce Christianson:
More Security or Less Insecurity. Security Protocols Workshop 2010: 115-119 - [c49]Bruce Christianson:
More Security or Less Insecurity (Transcript of Discussion). Security Protocols Workshop 2010: 120-126 - [c48]Bruce Christianson:
Recapitulation. Security Protocols Workshop 2010: 266 - [e11]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 [contents]
2000 – 2009
- 2009
- [c47]Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Extending Trust in Peer-to-Peer Networks. ADBIS (Workshops) 2009: 145-152 - [c46]David Gray, David Bowes, Neil Davey, Yi Sun, Bruce Christianson:
Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics. EANN 2009: 223-234 - [c45]Bruce Christianson:
Introduction: Brief Encounters. Security Protocols Workshop 2009: 1-2 - [c44]Stephen William Clarke, Bruce Christianson, Hannan Xiao:
Trust*: Using Local Guarantees to Extend the Reach of Trust. Security Protocols Workshop 2009: 171-178 - [c43]Bruce Christianson:
Trust*: Using Local Guarantees to Extend the Reach of Trust. Security Protocols Workshop 2009: 179-188 - [e10]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 [contents] - 2008
- [c42]Hannan Xiao, Bruce Christianson, Ying Zhang:
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. IAS 2008: 15-20 - [c41]Jun Li, Bruce Christianson:
A Domain-Oriented Approach for Access Control in Pervasive Environments. EUC (2) 2008: 278-284 - [c40]Aruna Shenoy, Tim M. Gale, Neil Davey, Bruce Christianson, Ray J. Frank:
Recognizing Facial Expressions: A Comparison of Computational Approaches. ICANN (1) 2008: 1001-1010 - [c39]Bruce Christianson:
Remodelling the Attacker (Transcript of Discussion). Security Protocols Workshop 2008: 1-2 - [c38]Bruce Christianson:
Security Protocol Deployment Risk (Transcript of Discussion). Security Protocols Workshop 2008: 21-24 - 2007
- [c37]Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. IAS 2007: 50-55 - [c36]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing. MobiQuitous 2007: 1-3 - [c35]Bruce Christianson:
When Is a Protocol Broken? (Transcript of Discussion). Security Protocols Workshop 2007: 1-2 - [c34]Bruce Christianson, Jun Li:
Multi-Channel Key Agreement Using Encrypted Public Key Exchange. Security Protocols Workshop 2007: 133-138 - [c33]Bruce Christianson:
Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion). Security Protocols Workshop 2007: 139-146 - [c32]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. Security Protocols Workshop 2007: 256 - [e9]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4631, Springer 2007, ISBN 978-3-540-77155-5 [contents] - 2006
- [j7]Michael Bartholomew-Biggs, Bruce Christianson, Ming Jian Zuo:
Optimizing Preventive Maintenance Models. Comput. Optim. Appl. 35(2): 261-279 (2006) - [c31]Michael Hicks, Colin Egan, Bruce Christianson, Patrick Quick:
Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. Asia-Pacific Computer Systems Architecture Conference 2006: 366-372 - [c30]Jason M. McGuiness, Colin Egan, Bruce Christianson, Guang Gao:
The Challenges of Efficient Code-Generation for Massively Parallel Architectures. Asia-Pacific Computer Systems Architecture Conference 2006: 416-422 - [c29]Bruce Christianson:
Putting the Human Back in the Protocol. Security Protocols Workshop 2006: 1-2 - [c28]Bruce Christianson, Alexander V. Shafarenko:
Vintage Bit Cryptography. Security Protocols Workshop 2006: 261-265 - [e8]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 [contents] - 2005
- [c27]Bruce Christianson, Partha Das Chowdhury, James A. Malcolm:
Auditable Anonymous Delegation. ICISS 2005: 66-76 - [c26]Jun Li, Bruce Christianson, Martin J. Loomes:
"Fair" Authentication in Pervasive Computing. MADNES 2005: 132-143 - [c25]Bruce Christianson:
The System Likes You. Security Protocols Workshop 2005: 1-2 - [c24]Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 315-321 - [c23]Bruce Christianson:
Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 322-328 - [e7]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers. Lecture Notes in Computer Science 3364, Springer 2005, ISBN 3-540-28389-7 [contents] - 2004
- [c22]Bruce Christianson:
Introduction: Authentic Privacy. Security Protocols Workshop 2004: 1-3 - [c21]Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Authentication. Security Protocols Workshop 2004: 299-305 - [c20]Bruce Christianson:
Anonymous Authentication (Transcript of Discussion). Security Protocols Workshop 2004: 306-311 - [c19]Martin J. Loomes, Bruce Christianson, Neil Davey:
Formal Systems, Not Methods. TFM 2004: 47-64 - [e6]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers. Lecture Notes in Computer Science 2845, Springer 2004, ISBN 3-540-20830-5 [contents] - 2003
- [c18]Bruce Christianson:
Where Have All the Protocols Gone? Security Protocols Workshop 2003: 1-2 - [c17]Bruce Christianson, Michael Roe, David Wheeler:
Secure Sessions from Weak Secrets. Security Protocols Workshop 2003: 190-205 - [c16]Bruce Christianson:
Secure Sessions from Weak Secrets (Discussion). Security Protocols Workshop 2003: 206-212 - 2002
- [c15]Bruce Christianson:
Introduction (Transcript). Security Protocols Workshop 2002: 1 - [c14]Bruce Christianson, Jean Fiona Snook:
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. Security Protocols Workshop 2002: 74-95 - [c13]Bruce Christianson:
Concluding Discussion: Accounting for Resources. Security Protocols Workshop 2002: 235-241 - [e5]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers. Lecture Notes in Computer Science 2467, Springer 2002, ISBN 3-540-44263-4 [contents] - 2001
- [c12]Bruce Christianson, David Wheeler:
Merkle Puzzles Revisited - Finding Matching Elements Between Lists. Security Protocols Workshop 2001: 87-90 - [c11]Bruce Christianson:
Merkle Puzzles Revisited (Transcript of Discussion). Security Protocols Workshop 2001: 91-94 - [c10]Bruce Christianson:
Concluding Discussion: When Does Confidentiality Harm Security? Security Protocols Workshop 2001: 229-238 - [e4]Bruce Christianson, Bruno Crispo, Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers. Lecture Notes in Computer Science 2133, Springer 2001, ISBN 3-540-42566-7 [contents] - 2000
- [c9]Bruce Christianson, Bruno Crispo, James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183 - [c8]Bruce Christianson:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). Security Protocols Workshop 2000: 184-193 - [e3]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings. Lecture Notes in Computer Science 1796, Springer 2000, ISBN 3-540-67381-4 [contents]
1990 – 1999
- 1999
- [c7]Bruce Christianson:
Auditing against Impossible Abstractions. Security Protocols Workshop 1999: 60-64 - [c6]Bruce Christianson, James A. Malcolm, Brian L. Robinson:
Pictures Can't Lie under Oath. Security Protocols Workshop 1999: 208-218 - [e2]Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings. Lecture Notes in Computer Science 1550, Springer 1999, ISBN 3-540-65663-4 [contents] - 1998
- [c5]Bruce Christianson, James A. Malcolm:
Delegation and Not-So Smart Cards (Position Paper). Security Protocols Workshop 1998: 154-157 - [c4]Bruce Christianson:
Delegation and Not-So Smart Card (Transcript of Discussion). Security Protocols Workshop 1998: 158-167 - [c3]Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson:
Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239 - [e1]Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings. Lecture Notes in Computer Science 1361, Springer 1998, ISBN 3-540-64040-1 [contents] - 1997
- [j6]Gordon B. Steven, Bruce Christianson, Roger Collins, Richard D. Potter, Fleur L. Steven:
A superscalar architecture to exploit instruction level parallelism. Microprocess. Microsystems 20(7): 391-400 (1997) - [j5]Bruce Christianson:
Practical parallel processing: An introduction to problem solving in parallel : by Alan Chalmers and Jonathan Tidmus. 1996, 400 pp, ISBN 1-85032-135-3, £23.95. Microprocess. Microsystems 21(4): 267 (1997) - [c2]Bruce Christianson, James A. Malcolm:
Binding Bit Patterns to Real World Entities. Security Protocols Workshop 1997: 105-113 - 1996
- [c1]Bruce Christianson, William S. Harbison:
Why Isn't Trust Transitive? Security Protocols Workshop 1996: 171-176 - 1995
- [j4]T. Mark A. Lomas, Bruce Christianson:
To Whom am I Speaking? Remote Booting in a Hostile World. Computer 28(1): 50-54 (1995) - [j3]Ping Hu, Bruce Christianson:
Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms. ACM SIGOPS Oper. Syst. Rev. 29(4): 87-96 (1995) - 1994
- [j2]Marie Rose Low, Bruce Christianson:
Self Authenticating Proxies. Comput. J. 37(5): 422-428 (1994) - 1993
- [j1]Marie Rose Low, Bruce Christianson:
Fine Grained Object Protection in Unix. ACM SIGOPS Oper. Syst. Rev. 27(1): 33-50 (1993)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:46 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint