2008 |
45 | EE | Aruna Shenoy,
Tim M. Gale,
Neil Davey,
Bruce Christianson,
Ray J. Frank:
Recognizing Facial Expressions: A Comparison of Computational Approaches.
ICANN (1) 2008: 1001-1010 |
2007 |
44 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Springer 2007 |
43 | EE | Su Mon Bo,
Hannan Xiao,
Aderemi Adereti,
James A. Malcolm,
Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
IAS 2007: 50-55 |
42 | EE | Hannan Xiao,
James A. Malcolm,
Bruce Christianson,
Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing.
MobiQuitous 2007: 1-3 |
2006 |
41 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Springer 2006 |
40 | EE | Michael Hicks,
Colin Egan,
Bruce Christianson,
Patrick Quick:
Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation.
Asia-Pacific Computer Systems Architecture Conference 2006: 366-372 |
39 | EE | Jason M. McGuiness,
Colin Egan,
Bruce Christianson,
Guang Gao:
The Challenges of Efficient Code-Generation for Massively Parallel Architectures.
Asia-Pacific Computer Systems Architecture Conference 2006: 416-422 |
2005 |
38 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
Springer 2005 |
37 | EE | Bruce Christianson,
Partha Das Chowdhury,
James A. Malcolm:
Auditable Anonymous Delegation.
ICISS 2005: 66-76 |
36 | EE | Jun Li,
Bruce Christianson,
Martin Loomes:
"Fair" Authentication in Pervasive Computing.
MADNES 2005: 132-143 |
35 | EE | Bruce Christianson:
The System Likes You.
Security Protocols Workshop 2005: 1-2 |
34 | EE | Partha Das Chowdhury,
Bruce Christianson,
James A. Malcolm:
Anonymous Context Based Role Activation Mechanism.
Security Protocols Workshop 2005: 315-321 |
33 | EE | Bruce Christianson:
Anonymous Context Based Role Activation Mechanism.
Security Protocols Workshop 2005: 322-328 |
2004 |
32 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers
Springer 2004 |
31 | EE | Bruce Christianson:
Introduction: Authentic Privacy.
Security Protocols Workshop 2004: 1-3 |
30 | EE | Partha Das Chowdhury,
Bruce Christianson,
James A. Malcolm:
Anonymous Authentication.
Security Protocols Workshop 2004: 299-305 |
29 | EE | Bruce Christianson:
Anonymous Authentication (Transcript of Discussion).
Security Protocols Workshop 2004: 306-311 |
28 | EE | Martin Loomes,
Bruce Christianson,
Neil Davey:
Formal Systems, Not Methods.
TFM 2004: 47-64 |
2003 |
27 | EE | Bruce Christianson:
Where Have All the Protocols Gone?
Security Protocols Workshop 2003: 1-2 |
26 | EE | Bruce Christianson,
Michael Roe,
David Wheeler:
Secure Sessions from Weak Secrets.
Security Protocols Workshop 2003: 190-205 |
25 | EE | Bruce Christianson:
Secure Sessions from Weak Secrets (Discussion).
Security Protocols Workshop 2003: 206-212 |
2002 |
24 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers
Springer 2002 |
23 | EE | Bruce Christianson:
Introduction (Transcript).
Security Protocols Workshop 2002: 1 |
22 | EE | Bruce Christianson:
Concluding Discussion: Accounting for Resources.
Security Protocols Workshop 2002: 235-241 |
21 | EE | Bruce Christianson,
Jean F. Snook:
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing.
Security Protocols Workshop 2002: 74-95 |
2001 |
20 | | Bruce Christianson,
Bruno Crispo,
Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers
Springer 2001 |
19 | EE | Bruce Christianson:
Concluding Discussion: When Does Confidentiality Harm Security?
Security Protocols Workshop 2001: 229-238 |
18 | EE | Bruce Christianson,
David Wheeler:
Merkle Puzzles Revisited - Finding Matching Elements Between Lists.
Security Protocols Workshop 2001: 87-90 |
17 | EE | Bruce Christianson:
Merkle Puzzles Revisited (Transcript of Discussion).
Security Protocols Workshop 2001: 91-94 |
2000 |
16 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings
Springer 2000 |
15 | EE | Bruce Christianson,
Bruno Crispo,
James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Security Protocols Workshop 2000: 182-183 |
14 | EE | Bruce Christianson:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion).
Security Protocols Workshop 2000: 184-193 |
1999 |
13 | | Bruce Christianson,
Bruno Crispo,
William S. Harbison,
Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
Springer 1999 |
12 | | Bruce Christianson,
James A. Malcolm,
Brian L. Robinson:
Pictures Can't Lie under Oath.
Security Protocols Workshop 1999: 208-218 |
11 | | Bruce Christianson:
Auditing against Impossible Abstractions.
Security Protocols Workshop 1999: 60-64 |
1998 |
10 | | Bruce Christianson,
Bruno Crispo,
T. Mark A. Lomas,
Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Springer 1998 |
9 | EE | Bruce Christianson,
James A. Malcolm:
Delegation and Not-So Smart Cards (Position Paper).
Security Protocols Workshop 1998: 154-157 |
8 | EE | Bruce Christianson:
Delegation and Not-So Smart Card (Transcript of Discussion).
Security Protocols Workshop 1998: 158-167 |
7 | EE | Roger M. Needham,
E. Stewart Lee,
Joan Feigenbaum,
Virgil D. Gligor,
Bruce Christianson:
Panel Session - Future Directions.
Security Protocols Workshop 1998: 227-239 |
1997 |
6 | | Bruce Christianson,
James A. Malcolm:
Binding Bit Patterns to Real World Entities.
Security Protocols Workshop 1997: 105-113 |
1996 |
5 | | Bruce Christianson,
William S. Harbison:
Why Isn't Trust Transitive?
Security Protocols Workshop 1996: 171-176 |
1995 |
4 | | T. Mark A. Lomas,
Bruce Christianson:
To Whom am I Speaking? Remote Booting in a Hostile World.
IEEE Computer 28(1): 50-54 (1995) |
3 | | Ping Hu,
Bruce Christianson:
Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms.
Operating Systems Review 29(4): 87-96 (1995) |
1994 |
2 | | Marie Rose Low,
Bruce Christianson:
Self Authenticating Proxies.
Comput. J. 37(5): 422-428 (1994) |
1993 |
1 | | Marie Rose Low,
Bruce Christianson:
Fine Grained Object Protection in Unix.
Operating Systems Review 27(1): 33-50 (1993) |