dblp.uni-trier.dewww.uni-trier.de

Bruce Christianson

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
45EEAruna Shenoy, Tim M. Gale, Neil Davey, Bruce Christianson, Ray J. Frank: Recognizing Facial Expressions: A Comparison of Computational Approaches. ICANN (1) 2008: 1001-1010
2007
44 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers Springer 2007
43EESu Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson: A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. IAS 2007: 50-55
42EEHannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang: Hierarchical Trustworthy Authentication for Pervasive Computing. MobiQuitous 2007: 1-3
2006
41 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers Springer 2006
40EEMichael Hicks, Colin Egan, Bruce Christianson, Patrick Quick: Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. Asia-Pacific Computer Systems Architecture Conference 2006: 366-372
39EEJason M. McGuiness, Colin Egan, Bruce Christianson, Guang Gao: The Challenges of Efficient Code-Generation for Massively Parallel Architectures. Asia-Pacific Computer Systems Architecture Conference 2006: 416-422
2005
38 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers Springer 2005
37EEBruce Christianson, Partha Das Chowdhury, James A. Malcolm: Auditable Anonymous Delegation. ICISS 2005: 66-76
36EEJun Li, Bruce Christianson, Martin Loomes: "Fair" Authentication in Pervasive Computing. MADNES 2005: 132-143
35EEBruce Christianson: The System Likes You. Security Protocols Workshop 2005: 1-2
34EEPartha Das Chowdhury, Bruce Christianson, James A. Malcolm: Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 315-321
33EEBruce Christianson: Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 322-328
2004
32 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Springer 2004
31EEBruce Christianson: Introduction: Authentic Privacy. Security Protocols Workshop 2004: 1-3
30EEPartha Das Chowdhury, Bruce Christianson, James A. Malcolm: Anonymous Authentication. Security Protocols Workshop 2004: 299-305
29EEBruce Christianson: Anonymous Authentication (Transcript of Discussion). Security Protocols Workshop 2004: 306-311
28EEMartin Loomes, Bruce Christianson, Neil Davey: Formal Systems, Not Methods. TFM 2004: 47-64
2003
27EEBruce Christianson: Where Have All the Protocols Gone? Security Protocols Workshop 2003: 1-2
26EEBruce Christianson, Michael Roe, David Wheeler: Secure Sessions from Weak Secrets. Security Protocols Workshop 2003: 190-205
25EEBruce Christianson: Secure Sessions from Weak Secrets (Discussion). Security Protocols Workshop 2003: 206-212
2002
24 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers Springer 2002
23EEBruce Christianson: Introduction (Transcript). Security Protocols Workshop 2002: 1
22EEBruce Christianson: Concluding Discussion: Accounting for Resources. Security Protocols Workshop 2002: 235-241
21EEBruce Christianson, Jean F. Snook: Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. Security Protocols Workshop 2002: 74-95
2001
20 Bruce Christianson, Bruno Crispo, Michael Roe: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers Springer 2001
19EEBruce Christianson: Concluding Discussion: When Does Confidentiality Harm Security? Security Protocols Workshop 2001: 229-238
18EEBruce Christianson, David Wheeler: Merkle Puzzles Revisited - Finding Matching Elements Between Lists. Security Protocols Workshop 2001: 87-90
17EEBruce Christianson: Merkle Puzzles Revisited (Transcript of Discussion). Security Protocols Workshop 2001: 91-94
2000
16 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings Springer 2000
15EEBruce Christianson, Bruno Crispo, James A. Malcolm: Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183
14EEBruce Christianson: Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). Security Protocols Workshop 2000: 184-193
1999
13 Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings Springer 1999
12 Bruce Christianson, James A. Malcolm, Brian L. Robinson: Pictures Can't Lie under Oath. Security Protocols Workshop 1999: 208-218
11 Bruce Christianson: Auditing against Impossible Abstractions. Security Protocols Workshop 1999: 60-64
1998
10 Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe: Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Springer 1998
9EEBruce Christianson, James A. Malcolm: Delegation and Not-So Smart Cards (Position Paper). Security Protocols Workshop 1998: 154-157
8EEBruce Christianson: Delegation and Not-So Smart Card (Transcript of Discussion). Security Protocols Workshop 1998: 158-167
7EERoger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson: Panel Session - Future Directions. Security Protocols Workshop 1998: 227-239
1997
6 Bruce Christianson, James A. Malcolm: Binding Bit Patterns to Real World Entities. Security Protocols Workshop 1997: 105-113
1996
5 Bruce Christianson, William S. Harbison: Why Isn't Trust Transitive? Security Protocols Workshop 1996: 171-176
1995
4 T. Mark A. Lomas, Bruce Christianson: To Whom am I Speaking? Remote Booting in a Hostile World. IEEE Computer 28(1): 50-54 (1995)
3 Ping Hu, Bruce Christianson: Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms. Operating Systems Review 29(4): 87-96 (1995)
1994
2 Marie Rose Low, Bruce Christianson: Self Authenticating Proxies. Comput. J. 37(5): 422-428 (1994)
1993
1 Marie Rose Low, Bruce Christianson: Fine Grained Object Protection in Unix. Operating Systems Review 27(1): 33-50 (1993)

Coauthor Index

1Aderemi Adereti [43]
2Su Mon Bo [43]
3Partha Das Chowdhury [30] [34] [37]
4Bruno Crispo [10] [13] [15] [16] [20] [24] [32] [38] [41] [44]
5Neil Davey [28] [45]
6Colin Egan [39] [40]
7Joan Feigenbaum [7]
8Ray J. Frank [45]
9Tim M. Gale [45]
10Guang Gao [39]
11Virgil D. Gligor [7]
12William S. Harbison [5] [13]
13Michael Hicks [40]
14Ping Hu [3]
15E. Stewart Lee [7]
16Jun Li [36]
17T. Mark A. Lomas [4] [10]
18Martin Loomes (Martin J. Loomes) [28] [36]
19Marie Rose Low [1] [2]
20James A. Malcolm [6] [9] [12] [15] [16] [24] [30] [32] [34] [37] [38] [41] [42] [43] [44]
21Jason M. McGuiness [39]
22Roger M. Needham [7]
23Patrick Quick [40]
24Brian L. Robinson [12]
25Michael Roe [10] [13] [16] [20] [24] [26] [32] [38] [41] [44]
26Aruna Shenoy [45]
27Jean F. Snook [21]
28David Wheeler [18] [26]
29Hannan Xiao [42] [43]
30Ying Zhang [42]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)