2006 | ||
---|---|---|
9 | EE | Geraint Price: Public Key Infrastructures: A research agenda. Journal of Computer Security 14(5): 391-417 (2006) |
2005 | ||
8 | EE | Geraint Price, Chris J. Mitchell: Interoperation Between a Conventional PKI and an ID-Based Infrastructure. EuroPKI 2005: 73-85 |
2003 | ||
7 | EE | Geraint Price: A General Attack Model on Hash-Based Client Puzzles. IMA Int. Conf. 2003: 319-331 |
6 | EE | Geraint Price: Client v. Server Side Protocols, Interfaces and Storage. Security Protocols Workshop 2003: 63-73 |
5 | EE | Geraint Price: Client v. Server Side Protocols, Interfaces and Storage (Discussion). Security Protocols Workshop 2003: 74-79 |
2001 | ||
4 | EE | Geraint Price: Thwarting Timing Attacks Using ATM Networks. Security Protocols Workshop 2001: 49-58 |
3 | EE | Geraint Price: Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion). Security Protocols Workshop 2001: 59-62 |
2000 | ||
2 | EE | Geraint Price: Broadening the Scope of Fault Tolerance within Secure Services. Security Protocols Workshop 2000: 155-164 |
1 | EE | Geraint Price: Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion). Security Protocols Workshop 2000: 165-169 |
1 | Chris J. Mitchell | [8] |