dblp.uni-trier.dewww.uni-trier.de

Jeremy L. Jacob

Jeremy Jacob

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
30EEDavid Robert White, John Clark, Jeremy Jacob, Simon M. Poulding: Searching for resource-efficient programs: low-power pseudorandom number generators. GECCO 2008: 1775-1782
29EEXun Dong, John A. Clark, Jeremy L. Jacob: Threat Modelling in User Performed Authentication. ICICS 2008: 49-64
28EEJim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob: The certification of the Mondex electronic purse to ITSEC Level E6. Formal Asp. Comput. 20(1): 5-19 (2008)
2007
27EEPhillip J. Brooke, Richard F. Paige, Jeremy L. Jacob: A CSP model of Eiffel's SCOOP. Formal Asp. Comput. 19(4): 487-512 (2007)
26EENur Izura Udzir, Alan M. Wood, Jeremy L. Jacob: Coordination with multicapabilities. Sci. Comput. Program. 64(2): 205-222 (2007)
2006
25EEHao Chen, John A. Clark, Jeremy Jacob: Human competitive security protocols synthesis. GECCO 2006: 1855-1856
2005
24EENur Izura Udzir, Alan M. Wood, Jeremy L. Jacob: Coordination with Multicapabilities. COORDINATION 2005: 79-93
23EEHoward Chivers, Jeremy Jacob: Specifying Information-Flow Controls. ICDCS Workshops 2005: 114-120
22EEHao Chen, John A. Clark, Jeremy L. Jacob: Synthesising Efficient and Effective Security Protocols. Electr. Notes Theor. Comput. Sci. 125(1): 25-41 (2005)
21EEJohn A. Clark, Jeremy L. Jacob, Susan Stepney: The Design of S-Boxes by Simulated Annealing. New Generation Comput. 23(3): (2005)
2003
20EEJohn A. Clark, Jeremy L. Jacob, Susan Stepney: Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. GECCO 2003: 2022-2033
2002
19EEJohn A. Clark, Jeremy L. Jacob: Fault Injection and a Timing Channel on an Analysis Technique. EUROCRYPT 2002: 181-196
18EEJohn A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan: Evolving Boolean Functions Satisfying Multiple Criteria. INDOCRYPT 2002: 246-259
2001
17 Nathalie Foster, Jeremy Jacob: Hazard Analysis for Security Protocol Requirements. Network Security 2001: 75-92
16EEAndreas Schaad, Jonathan D. Moffett, Jeremy Jacob: The role-based access control system of a European bank: a case study and discussion. SACMAT 2001: 3-9
15 John A. Clark, Jeremy L. Jacob: Protocols are programs too: the meta-heuristic search for security protocols. Information & Software Technology 43(14): 891-904 (2001)
2000
14 John A. Clark, Jeremy Jacob: Two-Stage Optimisation in the Design of Boolean Functions. ACISP 2000: 242-254
13EEJeremy L. Jacob, Alan Wood: A Principled Semantics for inp. COORDINATION 2000: 51-65
12EEJohn A. Clark, Jeremy L. Jacob: Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. IEEE Symposium on Security and Privacy 2000: 82-95
1998
11EEIan Toyn, David M. Cattrall, John A. McDermid, Jeremy L. Jacob: A practical language and toolkit for high-integrity tools. Journal of Systems and Software 41(3): 161-173 (1998)
1995
10EESimon N. Foley, Jeremy Jacob: Specifying security for CSCW systems. CSFW 1995: 136-
9EEJohn A. Clark, Jeremy Jacob: On the Security of Recent Protocols. Inf. Process. Lett. 56(3): 151-155 (1995)
8 Simon N. Foley, Jeremy Jacob: Specifying Security for Computer Supported Collaborative Working. Journal of Computer Security 3(4): 233-254 (1995)
1992
7 Jeremy Jacob: A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions. Inf. Process. Lett. 41(1): 9-12 (1992)
1991
6 Jeremy Jacob: The Basic Integrity Theorem. CSFW 1991: 89-97
5EEJeremy Jacob: A Uniform Presentation of Confidentiality Properties. IEEE Trans. Software Eng. 17(11): 1186-1194 (1991)
1990
4 Jeremy Jacob: Categorizing non-interference. CSFW 1990: 44-50
3 Jeremy Jacob: Separability and the Detection of Hidden Channels. Inf. Process. Lett. 34(1): 27-29 (1990)
2 Jeremy Jacob: A Model of Reconfiguration in Communicating Sequential Processes. Inf. Process. Lett. 35(1): 19-22 (1990)
1988
1 Jeremy Jacob: A Security Framework. CSFW 1988: 98-111

Coauthor Index

1Phillip J. Brooke [27]
2David M. Cattrall [11]
3Hao Chen [22] [25]
4Howard Chivers [23]
5John Clark [30]
6John A. Clark (John Andrew Clark) [9] [12] [14] [15] [18] [19] [20] [21] [22] [25] [28] [29]
7David Cooper [28]
8Xun Dong [29]
9Simon N. Foley [8] [10]
10Nathalie Foster [17]
11Subhamoy Maitra [18]
12John A. McDermid [11]
13William Millan [18]
14Jonathan D. Moffett [16]
15Richard F. Paige [27]
16Simon M. Poulding [30]
17Andreas Schaad [16]
18Susan Stepney [18] [20] [21] [28]
19Ian Toyn [11]
20Nur Izura Udzir [24] [26]
21David Robert White [30]
22Alan Wood [13]
23Alan M. Wood [24] [26]
24Jim Woodcock (J. C. P. Woodcock) [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)