2007 |
10 | EE | P. M. Rodwell,
Steven Furnell,
Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head.
Computers & Security 26(7-8): 468-478 (2007) |
2005 |
9 | EE | Aruna Thakur,
Benn Lines,
Paul L. Reynolds:
Dynamically Adapted Streaming of Video for a Real-Time Multimedia Application.
ICAS/ICNS 2005: 50 |
2003 |
8 | EE | Maria Papadaki,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System.
Communications and Multimedia Security 2003: 65-75 |
7 | | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
SEC 2003: 97-108 |
6 | EE | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study.
Inf. Manag. Comput. Security 11(4): 161-166 (2003) |
2002 |
5 | | Nathan L. Clarke,
Steven Furnell,
P. M. Rodwell,
Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Computers & Security 21(3): 220-228 (2002) |
2000 |
4 | | Steven Furnell,
Paul Dowland,
H. M. Illingworth,
Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes.
Computers & Security 19(6): 529-539 (2000) |
1999 |
3 | EE | Paul Dowland,
Steven Furnell,
H. M. Illingworth,
Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness.
Computers & Security 18(8): 715-726 (1999) |
1997 |
2 | | Michael P. Evans,
Kimmo T. Kettunen,
Grahame K. Blackwell,
Steven Furnell,
Andrew D. Phippen,
Stephen Hope,
Paul L. Reynolds:
Network Resource Adaptation in the DOLMEN Service Machine.
IS&N 1997: 25-34 |
1 | | Sergio Palazzo,
Miltiades E. Anagnostou,
Didoe Prevedourou,
Marina Samarotto,
Paul L. Reynolds:
Integration of Mobility Functions into an Open Service Architecture: The DOLMEN Approach.
IS&N 1997: 391-402 |