Howard Chivers

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

17EEChristopher Hargreaves, Howard Chivers: Recovery of Encryption Keys from Memory Using a Linear Scan. ARES 2008: 1369-1376
16EEChristopher Hargreaves, Howard Chivers, Dave Titheridge: Windows Vista and digital investigations. Digital Investigation 5(1-2): 34-48 (2008)
15EEPeter Laurens, Richard F. Paige, Phillip J. Brooke, Howard Chivers: A Novel Approach to the Detection of Cheating in Multiplayer Online Games. ICECCS 2007: 97-106
14EEHoward Chivers: Information Modeling for Automated Risk Analysis. Communications and Multimedia Security 2006: 228-239
13EEXiaocheng Ge, Richard F. Paige, Fiona Polack, Howard Chivers, Phillip J. Brooke: Agile development of secure web applications. ICWE 2006: 305-312
12EEHoward Chivers: Trust Without Identification. SPC 2006: 1-2
11EEEmine G. Aydal, Richard F. Paige, Howard Chivers, Phillip J. Brooke: Security Planning and Refactoring in Extreme Programming. XP 2006: 154-163
10EEHoward Chivers, John A. McDermid: Refactoring service-based systems: how to avoid trusting a workflow service. Concurrency and Computation: Practice and Experience 18(10): 1255-1275 (2006)
9EEHoward Chivers, Richard F. Paige: XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language. ECMDA-FA 2005: 205-219
8EEHoward Chivers, Jeremy Jacob: Specifying Information-Flow Controls. ICDCS Workshops 2005: 114-120
7EERichard F. Paige, Howard Chivers, John A. McDermid, Zoë R. Stephenson: High-integrity extreme programming. SAC 2005: 1518-1523
6EEHoward Chivers, Richard F. Paige, Xiaocheng Ge: Agile Security Using an Incremental Security Architecture. XP 2005: 57-65
5EEJohn A. Clark, Susan Stepney, Howard Chivers: Breaking the Model: Finalisation and a Taxonomy of Security Attacks. Electr. Notes Theor. Comput. Sci. 137(2): 225-242 (2005)
4EEHoward Chivers, Andrew Martin: Editorial. Softw., Pract. Exper. 35(9): 799-800 (2005)
3EEHoward Chivers, Martyn Fletcher: Applying Security Design Analysis to a service-based system. Softw., Pract. Exper. 35(9): 873-897 (2005)
2EEHoward Chivers, John A. Clark: Smart dust, friend or foe?--Replacing identity with configuration trust. Computer Networks 46(5): 723-740 (2004)
1EEHoward Chivers, John A. Clark, Susan Stepney: Smart Devices and Software Agents: The Basics of Good Behaviour. SPC 2003: 39-52

Coauthor Index

1Emine G. Aydal [11]
2Phillip J. Brooke [11] [13] [15]
3John A. Clark (John Andrew Clark) [1] [2] [5]
4Martyn Fletcher [3]
5Xiaocheng Ge [6] [13]
6Christopher Hargreaves [16] [17]
7Jeremy L. Jacob (Jeremy Jacob) [8]
8Peter Laurens [15]
9Andrew Martin [4]
10John A. McDermid [7] [10]
11Richard F. Paige [6] [7] [9] [11] [13] [15]
12Fiona Polack [13]
13Zoë R. Stephenson [7]
14Susan Stepney [1] [5]
15Dave Titheridge [16]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)