| 2006 |
| 17 | EE | Selwyn Russell:
Issues in Merging Internet Autonomous Systems for Emergency Communications.
ISI 2006: 704-705 |
| 2005 |
| 16 | EE | Michelangelo Giansiracusa,
Selwyn Russell,
Andrew Clark,
John Hynd:
An Improved Execution Integrity Solution for Mobile Agents.
ACISP 2005: 170-183 |
| 2004 |
| 15 | EE | Vicky Liu,
William J. Caelli,
Ernest Foo,
Selwyn Russell:
Visually Sealed and Digitally Signed Documents.
ACSC 2004: 287-294 |
| 14 | EE | Selwyn Russell:
Recursive Certificate Structures for X.509 Systems.
EuroPKI 2004: 135-148 |
| 13 | EE | Michelangelo Giansiracusa,
Selwyn Russell,
Andrew Clark,
Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
ICICS 2004: 343-357 |
| 12 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
Private Reputation Schemes for P2P systems.
WOSIS 2004: 196-206 |
| 11 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
WOSIS 2004: 53-62 |
| 10 | EE | Selwyn Russell:
Theory and benefits of recursive certificate structures.
Int. J. Inf. Sec. 2(2): 78-90 (2004) |
| 2003 |
| 9 | EE | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
A Security Architecture for Reputation Systems.
EC-Web 2003: 176-185 |
| 8 | EE | Jason Smith,
Selwyn Russell,
Mark Looi:
Security as a Safety Issue in Rail Communications.
SCS 2003: 79-88 |
| 7 | EE | Selwyn Russell,
Ed Dawson,
Eiji Okamoto,
Javier Lopez:
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Computer Communications 26(16): 1826-1838 (2003) |
| 1999 |
| 6 | EE | Selwyn Russell:
Fast Checking of Individual Certificate Revocation on Small Systems.
ACSAC 1999: 249-255 |
| 1998 |
| 5 | | Gary Gaskell,
Mark Looi,
Ed Dawson,
Colin Boyd,
Selwyn Russell:
A security architecture for third generation wireless systems.
ICISC 1998: 15-32 |
| 1995 |
| 4 | | Selwyn Russell:
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider.
Cryptography: Policy and Algorithms 1995: 301-312 |
| 1994 |
| 3 | EE | Selwyn Russell:
Audit-by-receiver paradigms for verification of authorization at source of electronic documents.
Computers & Security 13(1): 59-67 (1994) |
| 1993 |
| 2 | | Selwyn Russell:
Planning for the EDI of Tomorrow Using Electronic Document Authorization.
SEC 1993: 243-251 |
| 1 | EE | Selwyn Russell:
Paradigms for verification of authorization at source of electronic documents in an integrated environment.
Computers & Security 12(6): 542-549 (1993) |