|
Search the dblp DataBase
Bruce Christianson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael Hicks 0002, Colin Egan, Bruce Christianson, Patrick Quick
Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. [Citation Graph (0, 0)][DBLP] Asia-Pacific Computer Systems Architecture Conference, 2006, pp:366-372 [Conf]
- Jason M. McGuiness, Colin Egan, Bruce Christianson, Guang Gao
The Challenges of Efficient Code-Generation for Massively Parallel Architectures. [Citation Graph (0, 0)][DBLP] Asia-Pacific Computer Systems Architecture Conference, 2006, pp:416-422 [Conf]
- Bruce Christianson, Partha Das Chowdhury, James A. Malcolm
Auditable Anonymous Delegation. [Citation Graph (0, 0)][DBLP] ICISS, 2005, pp:66-76 [Conf]
- Jun Li, Bruce Christianson, Martin Loomes
"Fair" Authentication in Pervasive Computing. [Citation Graph (0, 0)][DBLP] MADNES, 2005, pp:132-143 [Conf]
- Bruce Christianson, David Wheeler
Merkle Puzzles Revisited - Finding Matching Elements Between Lists. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:87-90 [Conf]
- Bruce Christianson
Delegation and Not-So Smart Card (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1998, pp:158-167 [Conf]
- Bruce Christianson
Auditing against Impossible Abstractions. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:60-64 [Conf]
- Bruce Christianson, Bruno Crispo, James A. Malcolm
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:182-183 [Conf]
- Bruce Christianson, William S. Harbison
Why Isn't Trust Transitive? [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1996, pp:171-176 [Conf]
- Bruce Christianson
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2000, pp:184-193 [Conf]
- Bruce Christianson, James A. Malcolm
Binding Bit Patterns to Real World Entities. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1997, pp:105-113 [Conf]
- Bruce Christianson
Merkle Puzzles Revisited (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:91-94 [Conf]
- Bruce Christianson, James A. Malcolm, Brian L. Robinson
Pictures Can't Lie under Oath. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1999, pp:208-218 [Conf]
- Bruce Christianson
Concluding Discussion: When Does Confidentiality Harm Security? [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2001, pp:229-238 [Conf]
- Bruce Christianson, James A. Malcolm
Delegation and Not-So Smart Cards (Position Paper). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1998, pp:154-157 [Conf]
- Bruce Christianson
Introduction (Transcript). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:1- [Conf]
- Bruce Christianson, Michael Roe, David Wheeler
Secure Sessions from Weak Secrets. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:190-205 [Conf]
- Bruce Christianson
Concluding Discussion: Accounting for Resources. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:235-241 [Conf]
- Bruce Christianson, Jean F. Snook
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2002, pp:74-95 [Conf]
- Bruce Christianson
Where Have All the Protocols Gone? [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:1-2 [Conf]
- Bruce Christianson
Secure Sessions from Weak Secrets (Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2003, pp:206-212 [Conf]
- Partha Das Chowdhury, Bruce Christianson, James A. Malcolm
Anonymous Authentication. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2004, pp:299-305 [Conf]
- Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson
Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 1998, pp:227-239 [Conf]
- Bruce Christianson
Anonymous Authentication (Transcript of Discussion). [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2004, pp:306-311 [Conf]
- Bruce Christianson
Introduction: Authentic Privacy. [Citation Graph (0, 0)][DBLP] Security Protocols Workshop, 2004, pp:1-3 [Conf]
- Martin Loomes, Bruce Christianson, Neil Davey
Formal Systems, Not Methods. [Citation Graph (0, 0)][DBLP] TFM, 2004, pp:47-64 [Conf]
- Marie Rose Low, Bruce Christianson
Self Authenticating Proxies. [Citation Graph (0, 0)][DBLP] Comput. J., 1994, v:37, n:5, pp:422-428 [Journal]
- T. Mark A. Lomas, Bruce Christianson
To Whom am I Speaking? Remote Booting in a Hostile World. [Citation Graph (0, 0)][DBLP] IEEE Computer, 1995, v:28, n:1, pp:50-54 [Journal]
- Ping Hu, Bruce Christianson
Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1995, v:29, n:4, pp:87-96 [Journal]
- Marie Rose Low, Bruce Christianson
Fine Grained Object Protection in Unix. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1993, v:27, n:1, pp:33-50 [Journal]
Extending Trust in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]
A Domain-Oriented Approach for Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]
Multichannel Protocols to Prevent Relay Attacks. [Citation Graph (, )][DBLP]
Recognizing Facial Expressions: A Comparison of Computational Approaches. [Citation Graph (, )][DBLP]
Hierarchical Trustworthy Authentication for Pervasive Computing. [Citation Graph (, )][DBLP]
The System Likes You. [Citation Graph (, )][DBLP]
Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]
Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]
Putting the Human Back in the Protocol. [Citation Graph (, )][DBLP]
Vintage Bit Cryptography. [Citation Graph (, )][DBLP]
Theatre as a Discussion Tool in Human-Robot Interaction Experiments - A Pilot Study. [Citation Graph (, )][DBLP]
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. [Citation Graph (, )][DBLP]
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.024secs
|