2008 |
10 | EE | Tyler Moore,
Maxim Raya,
Jolyon Clulow,
Panagiotis Papadimitratos,
Ross Anderson,
Jean-Pierre Hubaux:
Fast Exclusion of Errant Devices from Vehicular Networks.
SECON 2008: 135-143 |
2007 |
9 | EE | Tyler Moore,
Jolyon Clulow,
Shishir Nagaraja,
Ross Anderson:
New Strategies for Revocation in Ad-Hoc Networks.
ESAS 2007: 232-246 |
8 | EE | Tyler Moore,
Jolyon Clulow:
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks.
SEC 2007: 157-168 |
2006 |
7 | EE | Jolyon Clulow,
Gerhard P. Hancke,
Markus G. Kuhn,
Tyler Moore:
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
ESAS 2006: 83-97 |
6 | EE | Jolyon Clulow,
Tyler Moore:
Suicide for the common good: a new strategy for credential revocation in self-organizing systems.
Operating Systems Review 40(3): 18-21 (2006) |
2005 |
5 | EE | George Danezis,
Jolyon Clulow:
Compulsion Resistant Anonymous Communications.
Information Hiding 2005: 11-25 |
4 | EE | Ford-Long Wong,
Frank Stajano,
Jolyon Clulow:
Repairing the Bluetooth Pairing Protocol.
Security Protocols Workshop 2005: 31-45 |
3 | EE | Mike Bond,
Jolyon Clulow:
Extending Security Protocol Analysis: New Challenges.
Electr. Notes Theor. Comput. Sci. 125(1): 13-24 (2005) |
2004 |
2 | | Mike Bond,
Jolyon Clulow:
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Cryptographic Algorithms and their Uses 2004: 140-151 |
2003 |
1 | EE | Jolyon Clulow:
On the Security of PKCS#11.
CHES 2003: 411-425 |