dblp.uni-trier.dewww.uni-trier.de

Michael Roe

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
31EEJanne Lindqvist, Tuomas Aura, George Danezis, Teemu Koponen, Annu Myllyniemi, Jussi Mäki, Michael Roe: Privacy-preserving 802.11 access-point discovery. WISEC 2009: 123-130
2008
30EETuomas Aura, Janne Lindqvist, Michael Roe, Anish Mohammed: Chattering Laptops. Privacy Enhancing Technologies 2008: 167-186
2007
29 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers Springer 2007
2006
28 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers Springer 2006
27EETuomas Aura, Thomas A. Kuhn, Michael Roe: Scanning electronic documents for personally identifiable information. WPES 2006: 41-50
26 Tuomas Aura, Michael Roe: Designing the mobile IPv6 security protocol. Annales des Télécommunications 61(3-4): 332-356 (2006)
2005
25 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers Springer 2005
24EEMichael Roe: Non-repudiation and the Metaphysics of Presence. Security Protocols Workshop 2005: 204-206
23EEMichael Roe: Non-repudiation and the Metaphysics of Presence. Security Protocols Workshop 2005: 207-214
22EETuomas Aura, Michael Roe, Anish Mohammed: Experiences with Host-to-Host IPsec. Security Protocols Workshop 2005: 3-22
2004
21 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Springer 2004
2003
20EEBruce Christianson, Michael Roe, David Wheeler: Secure Sessions from Weak Secrets. Security Protocols Workshop 2003: 190-205
19EEMichael Roe: Panel Session: Is Protocol Modelling Finished? Security Protocols Workshop 2003: 213-217
2002
18 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers Springer 2002
17EETuomas Aura, Michael Roe, Jari Arkko: Security of Internet Location Management. ACSAC 2002: 78-90
16EEJari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe: Securing IPv6 neighbor and router discovery. Workshop on Wireless Security 2002: 77-86
2001
15 Bruce Christianson, Bruno Crispo, Michael Roe: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers Springer 2001
14EEMichael Roe: Experiences of Mobile IP Security. Security Protocols Workshop 2001: 4-11
13EEGreg O'Shea, Michael Roe: Child-proof authentication for MIPv6 (CAM). Computer Communication Review 31(2): 4-8 (2001)
2000
12 Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe: Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings Springer 2000
11EEMichael Roe: Authentication and Naming (Transcript of Discussion). Security Protocols Workshop 2000: 20-23
10EEMichael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas: Government Access to Keys - Panel Discussion. Security Protocols Workshop 2000: 62-73
1999
9 Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe: Security Protocols, 6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings Springer 1999
8EEHajime Morito, Michael Roe, E. Stewart Lee: Digital Copy Protection Scheme Using Recording Medium Identifier. ICPP Workshops 1999: 174-178
7 Michael Roe: Performance of Protocols. Security Protocols Workshop 1999: 140-152
1998
6 Bruce Christianson, Bruno Crispo, T. Mark A. Lomas, Michael Roe: Security Protocols, 5th International Workshop, Paris, France, April 7-9, 1997, Proceedings Springer 1998
5EEMichael Roe: Certification and Delegation (Transcript of Discussion). Security Protocols Workshop 1998: 168-176
1997
4EERoss J. Anderson, Michael Roe: The GCHQ Protocol and Its Problems. EUROCRYPT 1997: 134-148
1994
3 Michael Roe: How to Reverse Engineer an EES Device. FSE 1994: 305-328
2 Michael Roe: Performance of Block Ciphers and Hash Functions - One Year Later. FSE 1994: 359-362
1993
1 Michael Roe: Performance of Symmetric Ciphers and One-Way Hash Functions. FSE 1993: 83-89

Coauthor Index

1Ross J. Anderson [4] [10]
2Jari Arkko [16] [17]
3Tuomas Aura [16] [17] [22] [26] [27] [30] [31]
4Bruce Christianson [6] [9] [12] [15] [18] [20] [21] [25] [28] [29]
5Bruno Crispo [6] [9] [12] [15] [18] [21] [25] [28] [29]
6George Danezis [31]
7William S. Harbison [9] [10]
8James Kempf [16]
9Teemu Koponen [31]
10Thomas A. Kuhn [27]
11E. Stewart Lee [8]
12Janne Lindqvist [30] [31]
13T. Mark A. Lomas [6] [10]
14Jussi Mäki [31]
15James A. Malcolm [12] [18] [21] [25] [28] [29]
16Vesa-Matti Mäntylä [16]
17Anish Mohammed [22] [30]
18Hajime Morito [8]
19Annu Myllyniemi [31]
20Pekka Nikander [16]
21Greg O'Shea [13]
22David Wheeler [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)