2001 |
18 | EE | Wai W. Fung,
Mordecai J. Golin,
James W. Gray III:
Protection of Keys against Modification Attack.
IEEE Symposium on Security and Privacy 2001: 26- |
1999 |
17 | EE | Wai W. Fung,
James W. Gray III:
On m-Permutation Protection Scheme Against Modification Attack.
ACISP 1999: 77-87 |
16 | | Patrick C. K. Hung,
Kamalakar Karlapalem,
James W. Gray III:
Least Privilege Security in CapBasED-AMS.
Int. J. Cooperative Inf. Syst. 8(2-3): 139-168 (1999) |
1998 |
15 | EE | Wai W. Fung,
James W. Gray III:
Protection Against EEPROM Modification Attacks.
ACISP 1998: 250-260 |
14 | EE | Patrick C. K. Hung,
Kamalakar Karlapalem,
James W. Gray III:
A Study of Least Privilege in CapBasED-AMS.
CoopIS 1998: 208-217 |
13 | EE | James W. Gray III,
Paul F. Syverson:
A Logical Approach to Multilevel Security of Probabilistic Systems.
Distributed Computing 11(2): 73-90 (1998) |
12 | | James W. Gray III,
Kin Fai Epsilon Ip,
King-Shan Lui:
Provable Security for Cryptographic Protocols - Exact Analysis and Engineering Applications.
Journal of Computer Security 6(1-2): 23-52 (1998) |
1997 |
11 | EE | James W. Gray III,
Kin Fai Epsilon Ip,
King-Shan Lui:
Provable Security for Cryptographic Protocols: Exact Analysis and Engineering Applications.
CSFW 1997: 45-58 |
10 | | James W. Gray III,
Kin Fai Epsilon Ip:
Protocols for issuing public-key certificates over the Internet.
ICICS 1997: 424-434 |
9 | EE | James W. Gray III:
On the Clark-Jacob Version of SPLICE/AS.
Inf. Process. Lett. 62(5): 251-254 (1997) |
1995 |
8 | EE | James W. Gray III,
John McLean:
Using temporal logic to specify and verify cryptographic protocols.
CSFW 1995: 108- |
7 | EE | Paul F. Syverson,
James W. Gray III:
The epistemic representation of information flow security in probabilistic systems.
CSFW 1995: 152-166 |
1993 |
6 | | James W. Gray III:
On Analyzing the Bus-Contention Channel Under Fuzzy Time.
CSFW 1993: 3-9 |
1992 |
5 | | James W. Gray III:
Toward a Mathematical Foundation for Information.
Journal of Computer Security 1(3-4): 255-294 (1992) |
1991 |
4 | | James W. Gray III:
On Information Flow Security Models.
CSFW 1991: 55-60 |
3 | | James W. Gray III:
Toward a Mathematical Foundation for Information Flow Security.
IEEE Symposium on Security and Privacy 1991: 21-35 |
1990 |
2 | | James W. Gray III:
Information Sharing in Secure Systems.
CSFW 1990: 128-138 |
1 | | James W. Gray III:
Probabilistic Interference.
IEEE Symposium on Security and Privacy 1990: 170-179 |