dblp.uni-trier.dewww.uni-trier.de

T. Mark A. Lomas

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2005
16EET. Mark A. Lomas: The System Likes You? Security Protocols Workshop 2005: 180-186
2004
15EET. Mark A. Lomas: Why Are We Authenticating (Transcript of Discussion). Security Protocols Workshop 2004: 291-298
2001
14EET. Mark A. Lomas: You Can't Take It with You. Security Protocols Workshop 2001: 166-169
2000
13EET. Mark A. Lomas: I Cannot Tell a Lie (Transcript of Discussion). Security Protocols Workshop 2000: 253-255
12EEMichael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas: Government Access to Keys - Panel Discussion. Security Protocols Workshop 2000: 62-73
1999
11 T. Mark A. Lomas: Auditing against Multiple Policies. Security Protocols Workshop 1999: 15-20
1998
10 Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe: Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Springer 1998
9EET. Mark A. Lomas: Abuse of Process (Transcript of Discussion). Security Protocols Workshop 1998: 131-136
8EEVirgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne: Discussion Session: Differences Between Academic and Commercial Security. Security Protocols Workshop 1998: 177-192
1997
7 T. Mark A. Lomas: Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings Springer 1997
6 Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas: Strong Authentication and Privacy with Standard Browsers. Journal of Computer Security 5(3): 191-212 (1997)
1996
5 Bruno Crispo, T. Mark A. Lomas: A Certification Scheme for Electronic Commerce. Security Protocols Workshop 1996: 19-32
1995
4 T. Mark A. Lomas, Bruce Christianson: To Whom am I Speaking? Remote Booting in a Hostile World. IEEE Computer 28(1): 50-54 (1995)
1993
3 T. Mark A. Lomas: Encrypting Network Traffic. FSE 1993: 64-70
2 Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer: Protecting Poorly Chosen Secrets from Guessing Attacks. IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993)
1989
1 T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham: Reducing Risks from Poorly Chosen Keys. SOSP 1989: 14-18

Coauthor Index

1Ross J. Anderson [12]
2Francesco Bergadano [6]
3Bruce Christianson [4] [10]
4Bruno Crispo [5] [6] [10]
5Virgil D. Gligor [8]
6Li Gong [1] [2]
7William S. Harbison [12]
8Peter Landrock [8]
9Roger M. Needham [1] [2]
10Michael Roe [10] [12]
11Jerome H. Saltzer [1] [2]
12John P. Warne [8]
13Raphael Yahalom [8]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)