2004 |
20 | EE | Sijing Zhang,
Alan Burns,
Jing Chen,
E. Stewart Lee:
Hard Real-Time Communication with the Timed Token Protocol: Current State and Challenging Problems.
Real-Time Systems 27(3): 271-295 (2004) |
2002 |
19 | | Sijing Zhang,
Alan Burns,
Ahmed Mehaoua,
E. Stewart Lee,
Hongji Yang:
Testing the Schedulability of Synchronous Traffic for the Timed Token Medium Access Control Protocol.
Real-Time Systems 22(3): 251-280 (2002) |
2001 |
18 | EE | Sijing Zhang,
E. Stewart Lee,
Alan Burns:
Determining the Worst-case Synchronous Message Response Time in FDDI Networks.
Comput. J. 44(1): 31-41 (2001) |
1999 |
17 | EE | Sijing Zhang,
E. Stewart Lee,
Alan Burns,
Hongji Yang:
Finding the minimum available transmission time for the timed token medium access control protocol.
ECRTS 1999: 185-194 |
16 | EE | Hajime Morito,
Michael Roe,
E. Stewart Lee:
Digital Copy Protection Scheme Using Recording Medium Identifier.
ICPP Workshops 1999: 174-178 |
15 | | Zhong Fan,
E. Stewart Lee:
Pricing for Differentiated Internet Services.
IDMS 1999: 365-370 |
14 | EE | Sijing Zhang,
E. Stewart Lee:
The Worst-Case Scenario for Transmission of Synchronous Traffic in an FDDI Network.
LCN 1999: 192- |
13 | EE | Sijing Zhang,
E. Stewart Lee:
Efficient Global Allocation of Synchronous Bandwidths for Hard Real-Time Communication with the Timed Token MAC Protocol.
RTCSA 1999: 120-127 |
12 | | E. Stewart Lee:
Composing Security Properties.
Security Protocols Workshop 1999: 6-14 |
1998 |
11 | EE | Aris Zakinthinos,
E. Stewart Lee:
Composing Secure Systems that have Emergent Properties.
CSFW 1998: 117-122 |
10 | EE | Roger M. Needham,
E. Stewart Lee,
Joan Feigenbaum,
Virgil D. Gligor,
Bruce Christianson:
Panel Session - Future Directions.
Security Protocols Workshop 1998: 227-239 |
1997 |
9 | EE | Aris Zakinthinos,
E. Stewart Lee:
A General Theory of Security Properties.
IEEE Symposium on Security and Privacy 1997: 94-102 |
1996 |
8 | EE | Aris Zakinthinos,
E. Stewart Lee:
How and why feedback composition fails [secure systems].
CSFW 1996: 95-101 |
1995 |
7 | EE | Aris Zakinthinos,
E. Stewart Lee:
The composability of non-interference [system security].
CSFW 1995: 2-8 |
6 | | Aris Zakinthinos,
E. Stewart Lee:
The Composability of Non-Interference.
Journal of Computer Security 3(4): 269-282 (1995) |
1994 |
5 | EE | Heather M. Hinton,
E. Stewart Lee:
The Compatibility of Policies.
ACM Conference on Computer and Communications Security 1994: 258-269 |
1992 |
4 | EE | Ralf C. Hauser,
E. Stewart Lee:
Verification and Modelling of Authentication Protocols.
ESORICS 1992: 141-154 |
3 | | Ralf C. Hauser,
E. Stewart Lee:
Reducing the Proliferation of Passwords in Distributed Systems.
IFIP Congress (2) 1992: 525-531 |
1990 |
2 | | E. Stewart Lee,
Brian W. Thomson,
Peter I. P. Boulton,
Michael Stumm:
An Architecture for a Trusted Network.
ESORICS 1990: 105-113 |
1 | | Brian W. Thomson,
E. Stewart Lee,
Peter I. P. Boulton,
Michael Stumm,
David M. Lewis:
Using Deducibility in Secure Network Modelling.
ESORICS 1990: 117-123 |