2009 |
31 | EE | Janne Lindqvist,
Tuomas Aura,
George Danezis,
Teemu Koponen,
Annu Myllyniemi,
Jussi Mäki,
Michael Roe:
Privacy-preserving 802.11 access-point discovery.
WISEC 2009: 123-130 |
2008 |
30 | EE | Tuomas Aura,
Janne Lindqvist,
Michael Roe,
Anish Mohammed:
Chattering Laptops.
Privacy Enhancing Technologies 2008: 167-186 |
2007 |
29 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers
Springer 2007 |
2006 |
28 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers
Springer 2006 |
27 | EE | Tuomas Aura,
Thomas A. Kuhn,
Michael Roe:
Scanning electronic documents for personally identifiable information.
WPES 2006: 41-50 |
26 | | Tuomas Aura,
Michael Roe:
Designing the mobile IPv6 security protocol.
Annales des Télécommunications 61(3-4): 332-356 (2006) |
2005 |
25 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers
Springer 2005 |
24 | EE | Michael Roe:
Non-repudiation and the Metaphysics of Presence.
Security Protocols Workshop 2005: 204-206 |
23 | EE | Michael Roe:
Non-repudiation and the Metaphysics of Presence.
Security Protocols Workshop 2005: 207-214 |
22 | EE | Tuomas Aura,
Michael Roe,
Anish Mohammed:
Experiences with Host-to-Host IPsec.
Security Protocols Workshop 2005: 3-22 |
2004 |
21 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers
Springer 2004 |
2003 |
20 | EE | Bruce Christianson,
Michael Roe,
David Wheeler:
Secure Sessions from Weak Secrets.
Security Protocols Workshop 2003: 190-205 |
19 | EE | Michael Roe:
Panel Session: Is Protocol Modelling Finished?
Security Protocols Workshop 2003: 213-217 |
2002 |
18 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers
Springer 2002 |
17 | EE | Tuomas Aura,
Michael Roe,
Jari Arkko:
Security of Internet Location Management.
ACSAC 2002: 78-90 |
16 | EE | Jari Arkko,
Tuomas Aura,
James Kempf,
Vesa-Matti Mäntylä,
Pekka Nikander,
Michael Roe:
Securing IPv6 neighbor and router discovery.
Workshop on Wireless Security 2002: 77-86 |
2001 |
15 | | Bruce Christianson,
Bruno Crispo,
Michael Roe:
Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers
Springer 2001 |
14 | EE | Michael Roe:
Experiences of Mobile IP Security.
Security Protocols Workshop 2001: 4-11 |
13 | EE | Greg O'Shea,
Michael Roe:
Child-proof authentication for MIPv6 (CAM).
Computer Communication Review 31(2): 4-8 (2001) |
2000 |
12 | | Bruce Christianson,
Bruno Crispo,
James A. Malcolm,
Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings
Springer 2000 |
11 | EE | Michael Roe:
Authentication and Naming (Transcript of Discussion).
Security Protocols Workshop 2000: 20-23 |
10 | EE | Michael Roe,
Ross J. Anderson,
William S. Harbison,
T. Mark A. Lomas:
Government Access to Keys - Panel Discussion.
Security Protocols Workshop 2000: 62-73 |
1999 |
9 | | Bruce Christianson,
Bruno Crispo,
William S. Harbison,
Michael Roe:
Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
Springer 1999 |
8 | EE | Hajime Morito,
Michael Roe,
E. Stewart Lee:
Digital Copy Protection Scheme Using Recording Medium Identifier.
ICPP Workshops 1999: 174-178 |
7 | | Michael Roe:
Performance of Protocols.
Security Protocols Workshop 1999: 140-152 |
1998 |
6 | | Bruce Christianson,
Bruno Crispo,
T. Mark A. Lomas,
Michael Roe:
Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings
Springer 1998 |
5 | EE | Michael Roe:
Certification and Delegation (Transcript of Discussion).
Security Protocols Workshop 1998: 168-176 |
1997 |
4 | EE | Ross J. Anderson,
Michael Roe:
The GCHQ Protocol and Its Problems.
EUROCRYPT 1997: 134-148 |
1994 |
3 | | Michael Roe:
How to Reverse Engineer an EES Device.
FSE 1994: 305-328 |
2 | | Michael Roe:
Performance of Block Ciphers and Hash Functions - One Year Later.
FSE 1994: 359-362 |
1993 |
1 | | Michael Roe:
Performance of Symmetric Ciphers and One-Way Hash Functions.
FSE 1993: 83-89 |