| 2007 |
| 8 | EE | Keith Harrison,
Shouhuai Xu:
Protecting Cryptographic Keys from Memory Disclosure Attacks.
DSN 2007: 137-143 |
| 2003 |
| 7 | EE | Marco Casassa Mont,
Pete Bramhall,
Keith Harrison:
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care.
DEXA Workshops 2003: 432-437 |
| 6 | EE | Marco Casassa Mont,
Keith Harrison,
Martin Sadler:
The HP time vault service: exploiting IBE for timed release of confidential information.
WWW 2003: 160-169 |
| 2002 |
| 5 | EE | Steven D. Galbraith,
Keith Harrison,
David Soldera:
Implementing the Tate Pairing.
ANTS 2002: 324-337 |
| 4 | EE | Marco Casassa Mont,
Adrian Baldwin,
Yolanta Beres,
Keith Harrison,
Martin Sadler,
Simon Shiu:
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
COMPSAC 2002: 271-278 |
| 3 | EE | L. Chen,
Keith Harrison,
Andrew Moss,
David Soldera,
Nigel P. Smart:
Certification of Public Keys within an Identity Based System.
ISC 2002: 322-333 |
| 2 | EE | L. Chen,
Keith Harrison,
David Soldera,
Nigel P. Smart:
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.
InfraSec 2002: 260-275 |
| 1990 |
| 1 | | Keith Harrison:
GAP: An Exercise in Model Oriented Programming.
ALPUK 1990: 159-172 |