![]() |
| 2006 | ||
|---|---|---|
| 9 | EE | Geraint Price: Public Key Infrastructures: A research agenda. Journal of Computer Security 14(5): 391-417 (2006) |
| 2005 | ||
| 8 | EE | Geraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85 |
| 2003 | ||
| 7 | EE | Geraint Price: A General Attack Model on Hash-Based Client Puzzles. IMA Int. Conf. 2003: 319-331 |
| 6 | EE | Geraint Price: Client v. Server Side Protocols, Interfaces and Storage. Security Protocols Workshop 2003: 63-73 |
| 5 | EE | Geraint Price: Client v. Server Side Protocols, Interfaces and Storage (Discussion). Security Protocols Workshop 2003: 74-79 |
| 2001 | ||
| 4 | EE | Geraint Price: Thwarting Timing Attacks Using ATM Networks. Security Protocols Workshop 2001: 49-58 |
| 3 | EE | Geraint Price: Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion). Security Protocols Workshop 2001: 59-62 |
| 2000 | ||
| 2 | EE | Geraint Price: Broadening the Scope of Fault Tolerance within Secure Services. Security Protocols Workshop 2000: 155-164 |
| 1 | EE | Geraint Price: Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion). Security Protocols Workshop 2000: 165-169 |
| 1 | Chris J. Mitchell | [8] |