Jeremy Jacob
List of publications from the DBLP Bibliography Server - FAQ
2008 | ||
---|---|---|
30 | EE | David Robert White, John Clark, Jeremy Jacob, Simon M. Poulding: Searching for resource-efficient programs: low-power pseudorandom number generators. GECCO 2008: 1775-1782 |
29 | EE | Xun Dong, John A. Clark, Jeremy L. Jacob: Threat Modelling in User Performed Authentication. ICICS 2008: 49-64 |
28 | EE | Jim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob: The certification of the Mondex electronic purse to ITSEC Level E6. Formal Asp. Comput. 20(1): 5-19 (2008) |
2007 | ||
27 | EE | Phillip J. Brooke, Richard F. Paige, Jeremy L. Jacob: A CSP model of Eiffel's SCOOP. Formal Asp. Comput. 19(4): 487-512 (2007) |
26 | EE | Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob: Coordination with multicapabilities. Sci. Comput. Program. 64(2): 205-222 (2007) |
2006 | ||
25 | EE | Hao Chen, John A. Clark, Jeremy Jacob: Human competitive security protocols synthesis. GECCO 2006: 1855-1856 |
2005 | ||
24 | EE | Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob: Coordination with Multicapabilities. COORDINATION 2005: 79-93 |
23 | EE | Howard Chivers, Jeremy Jacob: Specifying Information-Flow Controls. ICDCS Workshops 2005: 114-120 |
22 | EE | Hao Chen, John A. Clark, Jeremy L. Jacob: Synthesising Efficient and Effective Security Protocols. Electr. Notes Theor. Comput. Sci. 125(1): 25-41 (2005) |
21 | EE | John A. Clark, Jeremy L. Jacob, Susan Stepney: The Design of S-Boxes by Simulated Annealing. New Generation Comput. 23(3): (2005) |
2003 | ||
20 | EE | John A. Clark, Jeremy L. Jacob, Susan Stepney: Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. GECCO 2003: 2022-2033 |
2002 | ||
19 | EE | John A. Clark, Jeremy L. Jacob: Fault Injection and a Timing Channel on an Analysis Technique. EUROCRYPT 2002: 181-196 |
18 | EE | John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan: Evolving Boolean Functions Satisfying Multiple Criteria. INDOCRYPT 2002: 246-259 |
2001 | ||
17 | Nathalie Foster, Jeremy Jacob: Hazard Analysis for Security Protocol Requirements. Network Security 2001: 75-92 | |
16 | EE | Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob: The role-based access control system of a European bank: a case study and discussion. SACMAT 2001: 3-9 |
15 | John A. Clark, Jeremy L. Jacob: Protocols are programs too: the meta-heuristic search for security protocols. Information & Software Technology 43(14): 891-904 (2001) | |
2000 | ||
14 | John A. Clark, Jeremy Jacob: Two-Stage Optimisation in the Design of Boolean Functions. ACISP 2000: 242-254 | |
13 | EE | Jeremy L. Jacob, Alan Wood: A Principled Semantics for inp. COORDINATION 2000: 51-65 |
12 | EE | John A. Clark, Jeremy L. Jacob: Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. IEEE Symposium on Security and Privacy 2000: 82-95 |
1998 | ||
11 | EE | Ian Toyn, David M. Cattrall, John A. McDermid, Jeremy L. Jacob: A practical language and toolkit for high-integrity tools. Journal of Systems and Software 41(3): 161-173 (1998) |
1995 | ||
10 | EE | Simon N. Foley, Jeremy Jacob: Specifying security for CSCW systems. CSFW 1995: 136- |
9 | EE | John A. Clark, Jeremy Jacob: On the Security of Recent Protocols. Inf. Process. Lett. 56(3): 151-155 (1995) |
8 | Simon N. Foley, Jeremy Jacob: Specifying Security for Computer Supported Collaborative Working. Journal of Computer Security 3(4): 233-254 (1995) | |
1992 | ||
7 | Jeremy Jacob: A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions. Inf. Process. Lett. 41(1): 9-12 (1992) | |
1991 | ||
6 | Jeremy Jacob: The Basic Integrity Theorem. CSFW 1991: 89-97 | |
5 | EE | Jeremy Jacob: A Uniform Presentation of Confidentiality Properties. IEEE Trans. Software Eng. 17(11): 1186-1194 (1991) |
1990 | ||
4 | Jeremy Jacob: Categorizing non-interference. CSFW 1990: 44-50 | |
3 | Jeremy Jacob: Separability and the Detection of Hidden Channels. Inf. Process. Lett. 34(1): 27-29 (1990) | |
2 | Jeremy Jacob: A Model of Reconfiguration in Communicating Sequential Processes. Inf. Process. Lett. 35(1): 19-22 (1990) | |
1988 | ||
1 | Jeremy Jacob: A Security Framework. CSFW 1988: 98-111 |
1 | Phillip J. Brooke | [27] |
2 | David M. Cattrall | [11] |
3 | Hao Chen | [22] [25] |
4 | Howard Chivers | [23] |
5 | John Clark | [30] |
6 | John A. Clark (John Andrew Clark) | [9] [12] [14] [15] [18] [19] [20] [21] [22] [25] [28] [29] |
7 | David Cooper | [28] |
8 | Xun Dong | [29] |
9 | Simon N. Foley | [8] [10] |
10 | Nathalie Foster | [17] |
11 | Subhamoy Maitra | [18] |
12 | John A. McDermid | [11] |
13 | William Millan | [18] |
14 | Jonathan D. Moffett | [16] |
15 | Richard F. Paige | [27] |
16 | Simon M. Poulding | [30] |
17 | Andreas Schaad | [16] |
18 | Susan Stepney | [18] [20] [21] [28] |
19 | Ian Toyn | [11] |
20 | Nur Izura Udzir | [24] [26] |
21 | David Robert White | [30] |
22 | Alan Wood | [13] |
23 | Alan M. Wood | [24] [26] |
24 | Jim Woodcock (J. C. P. Woodcock) | [28] |