2006 |
17 | EE | Selwyn Russell:
Issues in Merging Internet Autonomous Systems for Emergency Communications.
ISI 2006: 704-705 |
2005 |
16 | EE | Michelangelo Giansiracusa,
Selwyn Russell,
Andrew Clark,
John Hynd:
An Improved Execution Integrity Solution for Mobile Agents.
ACISP 2005: 170-183 |
2004 |
15 | EE | Vicky Liu,
William J. Caelli,
Ernest Foo,
Selwyn Russell:
Visually Sealed and Digitally Signed Documents.
ACSC 2004: 287-294 |
14 | EE | Selwyn Russell:
Recursive Certificate Structures for X.509 Systems.
EuroPKI 2004: 135-148 |
13 | EE | Michelangelo Giansiracusa,
Selwyn Russell,
Andrew Clark,
Volker Roth:
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
ICICS 2004: 343-357 |
12 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
Private Reputation Schemes for P2P systems.
WOSIS 2004: 196-206 |
11 | | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
WOSIS 2004: 53-62 |
10 | EE | Selwyn Russell:
Theory and benefits of recursive certificate structures.
Int. J. Inf. Sec. 2(2): 78-90 (2004) |
2003 |
9 | EE | Roslan Ismail,
Colin Boyd,
Audun Jøsang,
Selwyn Russell:
A Security Architecture for Reputation Systems.
EC-Web 2003: 176-185 |
8 | EE | Jason Smith,
Selwyn Russell,
Mark Looi:
Security as a Safety Issue in Rail Communications.
SCS 2003: 79-88 |
7 | EE | Selwyn Russell,
Ed Dawson,
Eiji Okamoto,
Javier Lopez:
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Computer Communications 26(16): 1826-1838 (2003) |
1999 |
6 | EE | Selwyn Russell:
Fast Checking of Individual Certificate Revocation on Small Systems.
ACSAC 1999: 249-255 |
1998 |
5 | | Gary Gaskell,
Mark Looi,
Ed Dawson,
Colin Boyd,
Selwyn Russell:
A security architecture for third generation wireless systems.
ICISC 1998: 15-32 |
1995 |
4 | | Selwyn Russell:
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider.
Cryptography: Policy and Algorithms 1995: 301-312 |
1994 |
3 | EE | Selwyn Russell:
Audit-by-receiver paradigms for verification of authorization at source of electronic documents.
Computers & Security 13(1): 59-67 (1994) |
1993 |
2 | | Selwyn Russell:
Planning for the EDI of Tomorrow Using Electronic Document Authorization.
SEC 1993: 243-251 |
1 | EE | Selwyn Russell:
Paradigms for verification of authorization at source of electronic documents in an integrated environment.
Computers & Security 12(6): 542-549 (1993) |