| 2008 | 
|---|
| 10 | EE | Tyler Moore,
Maxim Raya,
Jolyon Clulow,
Panagiotis Papadimitratos,
Ross Anderson,
Jean-Pierre Hubaux:
Fast Exclusion of Errant Devices from Vehicular Networks.
SECON 2008: 135-143 | 
| 2007 | 
|---|
| 9 | EE | Tyler Moore,
Jolyon Clulow,
Shishir Nagaraja,
Ross Anderson:
New Strategies for Revocation in Ad-Hoc Networks.
ESAS 2007: 232-246 | 
| 8 | EE | Tyler Moore,
Jolyon Clulow:
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks.
SEC 2007: 157-168 | 
| 2006 | 
|---|
| 7 | EE | Jolyon Clulow,
Gerhard P. Hancke,
Markus G. Kuhn,
Tyler Moore:
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
ESAS 2006: 83-97 | 
| 6 | EE | Jolyon Clulow,
Tyler Moore:
Suicide for the common good: a new strategy for credential revocation in self-organizing systems.
Operating Systems Review 40(3): 18-21 (2006) | 
| 2005 | 
|---|
| 5 | EE | George Danezis,
Jolyon Clulow:
Compulsion Resistant Anonymous Communications.
Information Hiding 2005: 11-25 | 
| 4 | EE | Ford-Long Wong,
Frank Stajano,
Jolyon Clulow:
Repairing the Bluetooth Pairing Protocol.
Security Protocols Workshop 2005: 31-45 | 
| 3 | EE | Mike Bond,
Jolyon Clulow:
Extending Security Protocol Analysis: New Challenges.
Electr. Notes Theor. Comput. Sci. 125(1): 13-24 (2005) | 
| 2004 | 
|---|
| 2 |  | Mike Bond,
Jolyon Clulow:
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Cryptographic Algorithms and their Uses 2004: 140-151 | 
| 2003 | 
|---|
| 1 | EE | Jolyon Clulow:
On the Security of PKCS#11.
CHES 2003: 411-425 |