2008 |
17 | EE | Christopher Hargreaves,
Howard Chivers:
Recovery of Encryption Keys from Memory Using a Linear Scan.
ARES 2008: 1369-1376 |
16 | EE | Christopher Hargreaves,
Howard Chivers,
Dave Titheridge:
Windows Vista and digital investigations.
Digital Investigation 5(1-2): 34-48 (2008) |
2007 |
15 | EE | Peter Laurens,
Richard F. Paige,
Phillip J. Brooke,
Howard Chivers:
A Novel Approach to the Detection of Cheating in Multiplayer Online Games.
ICECCS 2007: 97-106 |
2006 |
14 | EE | Howard Chivers:
Information Modeling for Automated Risk Analysis.
Communications and Multimedia Security 2006: 228-239 |
13 | EE | Xiaocheng Ge,
Richard F. Paige,
Fiona Polack,
Howard Chivers,
Phillip J. Brooke:
Agile development of secure web applications.
ICWE 2006: 305-312 |
12 | EE | Howard Chivers:
Trust Without Identification.
SPC 2006: 1-2 |
11 | EE | Emine G. Aydal,
Richard F. Paige,
Howard Chivers,
Phillip J. Brooke:
Security Planning and Refactoring in Extreme Programming.
XP 2006: 154-163 |
10 | EE | Howard Chivers,
John A. McDermid:
Refactoring service-based systems: how to avoid trusting a workflow service.
Concurrency and Computation: Practice and Experience 18(10): 1255-1275 (2006) |
2005 |
9 | EE | Howard Chivers,
Richard F. Paige:
XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language.
ECMDA-FA 2005: 205-219 |
8 | EE | Howard Chivers,
Jeremy Jacob:
Specifying Information-Flow Controls.
ICDCS Workshops 2005: 114-120 |
7 | EE | Richard F. Paige,
Howard Chivers,
John A. McDermid,
Zoë R. Stephenson:
High-integrity extreme programming.
SAC 2005: 1518-1523 |
6 | EE | Howard Chivers,
Richard F. Paige,
Xiaocheng Ge:
Agile Security Using an Incremental Security Architecture.
XP 2005: 57-65 |
5 | EE | John A. Clark,
Susan Stepney,
Howard Chivers:
Breaking the Model: Finalisation and a Taxonomy of Security Attacks.
Electr. Notes Theor. Comput. Sci. 137(2): 225-242 (2005) |
4 | EE | Howard Chivers,
Andrew Martin:
Editorial.
Softw., Pract. Exper. 35(9): 799-800 (2005) |
3 | EE | Howard Chivers,
Martyn Fletcher:
Applying Security Design Analysis to a service-based system.
Softw., Pract. Exper. 35(9): 873-897 (2005) |
2004 |
2 | EE | Howard Chivers,
John A. Clark:
Smart dust, friend or foe?--Replacing identity with configuration trust.
Computer Networks 46(5): 723-740 (2004) |
2003 |
1 | EE | Howard Chivers,
John A. Clark,
Susan Stepney:
Smart Devices and Software Agents: The Basics of Good Behaviour.
SPC 2003: 39-52 |