2007 |
8 | EE | Keith Harrison,
Shouhuai Xu:
Protecting Cryptographic Keys from Memory Disclosure Attacks.
DSN 2007: 137-143 |
2003 |
7 | EE | Marco Casassa Mont,
Pete Bramhall,
Keith Harrison:
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care.
DEXA Workshops 2003: 432-437 |
6 | EE | Marco Casassa Mont,
Keith Harrison,
Martin Sadler:
The HP time vault service: exploiting IBE for timed release of confidential information.
WWW 2003: 160-169 |
2002 |
5 | EE | Steven D. Galbraith,
Keith Harrison,
David Soldera:
Implementing the Tate Pairing.
ANTS 2002: 324-337 |
4 | EE | Marco Casassa Mont,
Adrian Baldwin,
Yolanta Beres,
Keith Harrison,
Martin Sadler,
Simon Shiu:
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
COMPSAC 2002: 271-278 |
3 | EE | L. Chen,
Keith Harrison,
Andrew Moss,
David Soldera,
Nigel P. Smart:
Certification of Public Keys within an Identity Based System.
ISC 2002: 322-333 |
2 | EE | L. Chen,
Keith Harrison,
David Soldera,
Nigel P. Smart:
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.
InfraSec 2002: 260-275 |
1990 |
1 | | Keith Harrison:
GAP: An Exercise in Model Oriented Programming.
ALPUK 1990: 159-172 |