dblp.uni-trier.dewww.uni-trier.de

Jolyon Clulow

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
10EETyler Moore, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross Anderson, Jean-Pierre Hubaux: Fast Exclusion of Errant Devices from Vehicular Networks. SECON 2008: 135-143
2007
9EETyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson: New Strategies for Revocation in Ad-Hoc Networks. ESAS 2007: 232-246
8EETyler Moore, Jolyon Clulow: Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. SEC 2007: 157-168
2006
7EEJolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore: So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. ESAS 2006: 83-97
6EEJolyon Clulow, Tyler Moore: Suicide for the common good: a new strategy for credential revocation in self-organizing systems. Operating Systems Review 40(3): 18-21 (2006)
2005
5EEGeorge Danezis, Jolyon Clulow: Compulsion Resistant Anonymous Communications. Information Hiding 2005: 11-25
4EEFord-Long Wong, Frank Stajano, Jolyon Clulow: Repairing the Bluetooth Pairing Protocol. Security Protocols Workshop 2005: 31-45
3EEMike Bond, Jolyon Clulow: Extending Security Protocol Analysis: New Challenges. Electr. Notes Theor. Comput. Sci. 125(1): 13-24 (2005)
2004
2 Mike Bond, Jolyon Clulow: Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure). Cryptographic Algorithms and their Uses 2004: 140-151
2003
1EEJolyon Clulow: On the Security of PKCS#11. CHES 2003: 411-425

Coauthor Index

1Ross Anderson [9] [10]
2Mike Bond [2] [3]
3George Danezis [5]
4Gerhard P. Hancke [7]
5Jean-Pierre Hubaux [10]
6Markus G. Kuhn [7]
7Tyler Moore [6] [7] [8] [9] [10]
8Shishir Nagaraja [9]
9Panagiotis Papadimitratos (Panos Papadimitratos) [10]
10Maxim Raya [10]
11Frank Stajano [4]
12Ford-Long Wong [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)