2008 |
30 | EE | David Robert White,
John Clark,
Jeremy Jacob,
Simon M. Poulding:
Searching for resource-efficient programs: low-power pseudorandom number generators.
GECCO 2008: 1775-1782 |
29 | EE | Xun Dong,
John A. Clark,
Jeremy L. Jacob:
Threat Modelling in User Performed Authentication.
ICICS 2008: 49-64 |
28 | EE | Jim Woodcock,
Susan Stepney,
David Cooper,
John A. Clark,
Jeremy Jacob:
The certification of the Mondex electronic purse to ITSEC Level E6.
Formal Asp. Comput. 20(1): 5-19 (2008) |
2007 |
27 | EE | Phillip J. Brooke,
Richard F. Paige,
Jeremy L. Jacob:
A CSP model of Eiffel's SCOOP.
Formal Asp. Comput. 19(4): 487-512 (2007) |
26 | EE | Nur Izura Udzir,
Alan M. Wood,
Jeremy L. Jacob:
Coordination with multicapabilities.
Sci. Comput. Program. 64(2): 205-222 (2007) |
2006 |
25 | EE | Hao Chen,
John A. Clark,
Jeremy Jacob:
Human competitive security protocols synthesis.
GECCO 2006: 1855-1856 |
2005 |
24 | EE | Nur Izura Udzir,
Alan M. Wood,
Jeremy L. Jacob:
Coordination with Multicapabilities.
COORDINATION 2005: 79-93 |
23 | EE | Howard Chivers,
Jeremy Jacob:
Specifying Information-Flow Controls.
ICDCS Workshops 2005: 114-120 |
22 | EE | Hao Chen,
John A. Clark,
Jeremy L. Jacob:
Synthesising Efficient and Effective Security Protocols.
Electr. Notes Theor. Comput. Sci. 125(1): 25-41 (2005) |
21 | EE | John A. Clark,
Jeremy L. Jacob,
Susan Stepney:
The Design of S-Boxes by Simulated Annealing.
New Generation Comput. 23(3): (2005) |
2003 |
20 | EE | John A. Clark,
Jeremy L. Jacob,
Susan Stepney:
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It.
GECCO 2003: 2022-2033 |
2002 |
19 | EE | John A. Clark,
Jeremy L. Jacob:
Fault Injection and a Timing Channel on an Analysis Technique.
EUROCRYPT 2002: 181-196 |
18 | EE | John A. Clark,
Jeremy L. Jacob,
Susan Stepney,
Subhamoy Maitra,
William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria.
INDOCRYPT 2002: 246-259 |
2001 |
17 | | Nathalie Foster,
Jeremy Jacob:
Hazard Analysis for Security Protocol Requirements.
Network Security 2001: 75-92 |
16 | EE | Andreas Schaad,
Jonathan D. Moffett,
Jeremy Jacob:
The role-based access control system of a European bank: a case study and discussion.
SACMAT 2001: 3-9 |
15 | | John A. Clark,
Jeremy L. Jacob:
Protocols are programs too: the meta-heuristic search for security protocols.
Information & Software Technology 43(14): 891-904 (2001) |
2000 |
14 | | John A. Clark,
Jeremy Jacob:
Two-Stage Optimisation in the Design of Boolean Functions.
ACISP 2000: 242-254 |
13 | EE | Jeremy L. Jacob,
Alan Wood:
A Principled Semantics for inp.
COORDINATION 2000: 51-65 |
12 | EE | John A. Clark,
Jeremy L. Jacob:
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols.
IEEE Symposium on Security and Privacy 2000: 82-95 |
1998 |
11 | EE | Ian Toyn,
David M. Cattrall,
John A. McDermid,
Jeremy L. Jacob:
A practical language and toolkit for high-integrity tools.
Journal of Systems and Software 41(3): 161-173 (1998) |
1995 |
10 | EE | Simon N. Foley,
Jeremy Jacob:
Specifying security for CSCW systems.
CSFW 1995: 136- |
9 | EE | John A. Clark,
Jeremy Jacob:
On the Security of Recent Protocols.
Inf. Process. Lett. 56(3): 151-155 (1995) |
8 | | Simon N. Foley,
Jeremy Jacob:
Specifying Security for Computer Supported Collaborative Working.
Journal of Computer Security 3(4): 233-254 (1995) |
1992 |
7 | | Jeremy Jacob:
A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions.
Inf. Process. Lett. 41(1): 9-12 (1992) |
1991 |
6 | | Jeremy Jacob:
The Basic Integrity Theorem.
CSFW 1991: 89-97 |
5 | EE | Jeremy Jacob:
A Uniform Presentation of Confidentiality Properties.
IEEE Trans. Software Eng. 17(11): 1186-1194 (1991) |
1990 |
4 | | Jeremy Jacob:
Categorizing non-interference.
CSFW 1990: 44-50 |
3 | | Jeremy Jacob:
Separability and the Detection of Hidden Channels.
Inf. Process. Lett. 34(1): 27-29 (1990) |
2 | | Jeremy Jacob:
A Model of Reconfiguration in Communicating Sequential Processes.
Inf. Process. Lett. 35(1): 19-22 (1990) |
1988 |
1 | | Jeremy Jacob:
A Security Framework.
CSFW 1988: 98-111 |