2008 |
11 | EE | Mudhakar Srivatsa,
Shane Balfe,
Kenneth G. Paterson,
Pankaj Rohatgi:
Trust management for secure information flows.
ACM Conference on Computer and Communications Security 2008: 175-188 |
10 | EE | Frederic Stumpf,
Claudia Eckert,
Shane Balfe:
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques.
ARES 2008: 376-382 |
9 | EE | Po-Wah Yau,
Allan Tomlinson,
Shane Balfe,
Eimear Gallery:
Securing Grid Workflows with Trusted Computing (Extended Abstract).
CCGRID 2008: 700 |
8 | EE | Shane Balfe,
Kenneth G. Paterson:
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract).
Financial Cryptography 2008: 171-175 |
7 | EE | Po-Wah Yau,
Allan Tomlinson,
Shane Balfe,
Eimear Gallery:
Securing Grid Workflows with Trusted Computing.
ICCS (3) 2008: 510-519 |
6 | EE | Shane Balfe,
Kenneth G. Paterson:
e-EMV: emulating EMV for internet payments with trusted computing technologies.
STC 2008: 81-92 |
2007 |
5 | EE | Shane Balfe,
Eimear Gallery:
Mobile Agents and the Deus Ex Machina.
AINA Workshops (2) 2007: 486-492 |
4 | EE | Shane Balfe,
Anish Mohammed:
Final Fantasy - Securing On-Line Gaming with Trusted Computing.
ATC 2007: 123-134 |
2006 |
3 | EE | Shiqun Li,
Shane Balfe,
Jianying Zhou,
Kefei Chen:
Enforcing Trust in Pervasive Computing with Trusted Computing Technology.
CRITIS 2006: 195-209 |
2 | EE | Shane Balfe,
Shiqun Li,
Jianying Zhou:
Pervasive Trusted Computing.
SecPerU 2006: 88-94 |
2005 |
1 | EE | Shane Balfe,
Amit D. Lakhani,
Kenneth G. Paterson:
Trusted Computing: Providing Security for Peer-to-Peer Networks.
Peer-to-Peer Computing 2005: 117-124 |