|
Search the dblp DataBase
Paul L. Reynolds:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Maria Papadaki, Steven Furnell, Benn Lines, Paul L. Reynolds
Operational Characteristics of an Automated Intrusion Response System. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 2003, pp:65-75 [Conf]
- Aruna Thakur, Benn Lines, Paul L. Reynolds
Dynamically Adapted Streaming of Video for a Real-Time Multimedia Application. [Citation Graph (0, 0)][DBLP] ICAS/ICNS, 2005, pp:50- [Conf]
- Michael P. Evans, Kimmo T. Kettunen, Grahame K. Blackwell, Steven Furnell, Andrew D. Phippen, Stephen Hope, Paul L. Reynolds
Network Resource Adaptation in the DOLMEN Service Machine. [Citation Graph (0, 0)][DBLP] IS&N, 1997, pp:25-34 [Conf]
- Sergio Palazzo, Miltiades E. Anagnostou, Didoe Prevedourou, Marina Samarotto, Paul L. Reynolds
Integration of Mobility Functions into an Open Service Architecture: The DOLMEN Approach. [Citation Graph (0, 0)][DBLP] IS&N, 1997, pp:391-402 [Conf]
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:97-108 [Conf]
- Nathan L. Clarke, Steven Furnell, P. M. Rodwell, Paul L. Reynolds
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices. [Citation Graph (0, 0)][DBLP] Computers & Security, 2002, v:21, n:3, pp:220-228 [Journal]
- Paul Dowland, Steven Furnell, H. M. Illingworth, Paul L. Reynolds
Computer crime and abuse: A survey of public attitudes and awareness. [Citation Graph (0, 0)][DBLP] Computers & Security, 1999, v:18, n:8, pp:715-726 [Journal]
- Steven Furnell, Paul Dowland, H. M. Illingworth, Paul L. Reynolds
Authentication and Supervision: A Survey of User Attitudes. [Citation Graph (0, 0)][DBLP] Computers & Security, 2000, v:19, n:6, pp:529-539 [Journal]
- Nathan L. Clarke, Steven Furnell, Benn Lines, Paul L. Reynolds
Keystroke dynamics on a mobile handset: a feasibility study. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:4, pp:161-166 [Journal]
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.006secs
|