| 2007 |
| 10 | EE | P. M. Rodwell,
Steven Furnell,
Paul L. Reynolds:
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head.
Computers & Security 26(7-8): 468-478 (2007) |
| 2005 |
| 9 | EE | Aruna Thakur,
Benn Lines,
Paul L. Reynolds:
Dynamically Adapted Streaming of Video for a Real-Time Multimedia Application.
ICAS/ICNS 2005: 50 |
| 2003 |
| 8 | EE | Maria Papadaki,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Operational Characteristics of an Automated Intrusion Response System.
Communications and Multimedia Security 2003: 65-75 |
| 7 | | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
SEC 2003: 97-108 |
| 6 | EE | Nathan L. Clarke,
Steven Furnell,
Benn Lines,
Paul L. Reynolds:
Keystroke dynamics on a mobile handset: a feasibility study.
Inf. Manag. Comput. Security 11(4): 161-166 (2003) |
| 2002 |
| 5 | | Nathan L. Clarke,
Steven Furnell,
P. M. Rodwell,
Paul L. Reynolds:
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Computers & Security 21(3): 220-228 (2002) |
| 2000 |
| 4 | | Steven Furnell,
Paul Dowland,
H. M. Illingworth,
Paul L. Reynolds:
Authentication and Supervision: A Survey of User Attitudes.
Computers & Security 19(6): 529-539 (2000) |
| 1999 |
| 3 | EE | Paul Dowland,
Steven Furnell,
H. M. Illingworth,
Paul L. Reynolds:
Computer crime and abuse: A survey of public attitudes and awareness.
Computers & Security 18(8): 715-726 (1999) |
| 1997 |
| 2 | | Michael P. Evans,
Kimmo T. Kettunen,
Grahame K. Blackwell,
Steven Furnell,
Andrew D. Phippen,
Stephen Hope,
Paul L. Reynolds:
Network Resource Adaptation in the DOLMEN Service Machine.
IS&N 1997: 25-34 |
| 1 | | Sergio Palazzo,
Miltiades E. Anagnostou,
Didoe Prevedourou,
Marina Samarotto,
Paul L. Reynolds:
Integration of Mobility Functions into an Open Service Architecture: The DOLMEN Approach.
IS&N 1997: 391-402 |