| 2008 |
| 8 | EE | Peter Williams,
Radu Sion,
Bogdan Carbunar:
Building castles out of mud: practical access pattern privacy and correctness on untrusted storage.
ACM Conference on Computer and Communications Security 2008: 139-148 |
| 7 | EE | Peter Williams:
Privacy Threats in Online Stock Quotes.
Financial Cryptography 2008: 316-317 |
| 2007 |
| 6 | EE | Peter Williams,
Sheng Li,
Jianfeng Feng,
Si Wu:
A Geometrical Method to Improve Performance of the Support Vector Machine.
IEEE Transactions on Neural Networks 18(3): 942-947 (2007) |
| 2005 |
| 5 | EE | Peter Williams,
Sheng Li,
Jianfeng Feng,
Si Wu:
Scaling the Kernel Function to Improve Performance of the Support Vector Machine.
ISNN (1) 2005: 831-836 |
| 2003 |
| 4 | EE | David Nicholas,
Paul Huntington,
Peter Williams:
Three years of digital consumer health information: a longitudinal study of the touch screen health kiosk.
Inf. Process. Manage. 39(3): 479-502 (2003) |
| 1994 |
| 3 | EE | Peter T. Kirstein,
Peter Williams:
Piloting authentication and security services in the 'PASSWORD' project.
Computer Communications 17(7): 519-531 (1994) |
| 1992 |
| 2 | | Peter T. Kirstein,
Peter Williams:
Piloting Authentication and Security Services within OSI Applications for RTD Information (PASSWORD).
Computer Networks and ISDN Systems 25(4-5): 483-489 (1992) |
| 1990 |
| 1 | EE | William Jones,
Peter Williams,
George G. Robertson,
Mike Conner:
In search for ideal operating system for user interfacing.
UIST 1990: 31-35 |