dblp.uni-trier.dewww.uni-trier.de

Selwyn Russell

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
17EESelwyn Russell: Issues in Merging Internet Autonomous Systems for Emergency Communications. ISI 2006: 704-705
2005
16EEMichelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd: An Improved Execution Integrity Solution for Mobile Agents. ACISP 2005: 170-183
2004
15EEVicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell: Visually Sealed and Digitally Signed Documents. ACSC 2004: 287-294
14EESelwyn Russell: Recursive Certificate Structures for X.509 Systems. EuroPKI 2004: 135-148
13EEMichelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth: Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. ICICS 2004: 343-357
12 Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: Private Reputation Schemes for P2P systems. WOSIS 2004: 196-206
11 Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: An Efficient Off-Line Reputation Scheme Using Articulated Certificates. WOSIS 2004: 53-62
10EESelwyn Russell: Theory and benefits of recursive certificate structures. Int. J. Inf. Sec. 2(2): 78-90 (2004)
2003
9EERoslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell: A Security Architecture for Reputation Systems. EC-Web 2003: 176-185
8EEJason Smith, Selwyn Russell, Mark Looi: Security as a Safety Issue in Rail Communications. SCS 2003: 79-88
7EESelwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez: Virtual certificates and synthetic certificates: new paradigms for improving public key validation. Computer Communications 26(16): 1826-1838 (2003)
1999
6EESelwyn Russell: Fast Checking of Individual Certificate Revocation on Small Systems. ACSAC 1999: 249-255
1998
5 Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell: A security architecture for third generation wireless systems. ICISC 1998: 15-32
1995
4 Selwyn Russell: Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider. Cryptography: Policy and Algorithms 1995: 301-312
1994
3EESelwyn Russell: Audit-by-receiver paradigms for verification of authorization at source of electronic documents. Computers & Security 13(1): 59-67 (1994)
1993
2 Selwyn Russell: Planning for the EDI of Tomorrow Using Electronic Document Authorization. SEC 1993: 243-251
1EESelwyn Russell: Paradigms for verification of authorization at source of electronic documents in an integrated environment. Computers & Security 12(6): 542-549 (1993)

Coauthor Index

1Colin Boyd [5] [9] [11] [12]
2William J. Caelli [15]
3Andrew Clark [13] [16]
4Ed Dawson [5] [7]
5Ernest Foo [15]
6Gary Gaskell [5]
7Michelangelo Giansiracusa [13] [16]
8John Hynd [16]
9Roslan Ismail [9] [11] [12]
10Audun Jøsang [9] [11] [12]
11Vicky Liu [15]
12Mark Looi [5] [8]
13Javier Lopez [7]
14Eiji Okamoto [7]
15Volker Roth [13]
16Jason Smith [8]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)