2005 |
16 | EE | T. Mark A. Lomas:
The System Likes You?
Security Protocols Workshop 2005: 180-186 |
2004 |
15 | EE | T. Mark A. Lomas:
Why Are We Authenticating (Transcript of Discussion).
Security Protocols Workshop 2004: 291-298 |
2001 |
14 | EE | T. Mark A. Lomas:
You Can't Take It with You.
Security Protocols Workshop 2001: 166-169 |
2000 |
13 | EE | T. Mark A. Lomas:
I Cannot Tell a Lie (Transcript of Discussion).
Security Protocols Workshop 2000: 253-255 |
12 | EE | Michael Roe,
Ross J. Anderson,
William S. Harbison,
T. Mark A. Lomas:
Government Access to Keys - Panel Discussion.
Security Protocols Workshop 2000: 62-73 |
1999 |
11 | | T. Mark A. Lomas:
Auditing against Multiple Policies.
Security Protocols Workshop 1999: 15-20 |
1998 |
10 | | Bruce Christianson,
Bruno Crispo,
T. Mark A. Lomas,
Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Springer 1998 |
9 | EE | T. Mark A. Lomas:
Abuse of Process (Transcript of Discussion).
Security Protocols Workshop 1998: 131-136 |
8 | EE | Virgil D. Gligor,
Peter Landrock,
T. Mark A. Lomas,
Raphael Yahalom,
John P. Warne:
Discussion Session: Differences Between Academic and Commercial Security.
Security Protocols Workshop 1998: 177-192 |
1997 |
7 | | T. Mark A. Lomas:
Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings
Springer 1997 |
6 | | Francesco Bergadano,
Bruno Crispo,
T. Mark A. Lomas:
Strong Authentication and Privacy with Standard Browsers.
Journal of Computer Security 5(3): 191-212 (1997) |
1996 |
5 | | Bruno Crispo,
T. Mark A. Lomas:
A Certification Scheme for Electronic Commerce.
Security Protocols Workshop 1996: 19-32 |
1995 |
4 | | T. Mark A. Lomas,
Bruce Christianson:
To Whom am I Speaking? Remote Booting in a Hostile World.
IEEE Computer 28(1): 50-54 (1995) |
1993 |
3 | | T. Mark A. Lomas:
Encrypting Network Traffic.
FSE 1993: 64-70 |
2 | | Li Gong,
T. Mark A. Lomas,
Roger M. Needham,
Jerome H. Saltzer:
Protecting Poorly Chosen Secrets from Guessing Attacks.
IEEE Journal on Selected Areas in Communications 11(5): 648-656 (1993) |
1989 |
1 | | T. Mark A. Lomas,
Li Gong,
Jerome H. Saltzer,
Roger M. Needham:
Reducing Risks from Poorly Chosen Keys.
SOSP 1989: 14-18 |