The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bruce Christianson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Hicks 0002, Colin Egan, Bruce Christianson, Patrick Quick
    Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2006, pp:366-372 [Conf]
  2. Jason M. McGuiness, Colin Egan, Bruce Christianson, Guang Gao
    The Challenges of Efficient Code-Generation for Massively Parallel Architectures. [Citation Graph (0, 0)][DBLP]
    Asia-Pacific Computer Systems Architecture Conference, 2006, pp:416-422 [Conf]
  3. Bruce Christianson, Partha Das Chowdhury, James A. Malcolm
    Auditable Anonymous Delegation. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:66-76 [Conf]
  4. Jun Li, Bruce Christianson, Martin Loomes
    "Fair" Authentication in Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    MADNES, 2005, pp:132-143 [Conf]
  5. Bruce Christianson, David Wheeler
    Merkle Puzzles Revisited - Finding Matching Elements Between Lists. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:87-90 [Conf]
  6. Bruce Christianson
    Delegation and Not-So Smart Card (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:158-167 [Conf]
  7. Bruce Christianson
    Auditing against Impossible Abstractions. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:60-64 [Conf]
  8. Bruce Christianson, Bruno Crispo, James A. Malcolm
    Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:182-183 [Conf]
  9. Bruce Christianson, William S. Harbison
    Why Isn't Trust Transitive? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:171-176 [Conf]
  10. Bruce Christianson
    Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:184-193 [Conf]
  11. Bruce Christianson, James A. Malcolm
    Binding Bit Patterns to Real World Entities. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:105-113 [Conf]
  12. Bruce Christianson
    Merkle Puzzles Revisited (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:91-94 [Conf]
  13. Bruce Christianson, James A. Malcolm, Brian L. Robinson
    Pictures Can't Lie under Oath. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:208-218 [Conf]
  14. Bruce Christianson
    Concluding Discussion: When Does Confidentiality Harm Security? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:229-238 [Conf]
  15. Bruce Christianson, James A. Malcolm
    Delegation and Not-So Smart Cards (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:154-157 [Conf]
  16. Bruce Christianson
    Introduction (Transcript). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:1- [Conf]
  17. Bruce Christianson, Michael Roe, David Wheeler
    Secure Sessions from Weak Secrets. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:190-205 [Conf]
  18. Bruce Christianson
    Concluding Discussion: Accounting for Resources. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:235-241 [Conf]
  19. Bruce Christianson, Jean F. Snook
    Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:74-95 [Conf]
  20. Bruce Christianson
    Where Have All the Protocols Gone? [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:1-2 [Conf]
  21. Bruce Christianson
    Secure Sessions from Weak Secrets (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:206-212 [Conf]
  22. Partha Das Chowdhury, Bruce Christianson, James A. Malcolm
    Anonymous Authentication. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:299-305 [Conf]
  23. Roger M. Needham, E. Stewart Lee, Joan Feigenbaum, Virgil D. Gligor, Bruce Christianson
    Panel Session - Future Directions. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:227-239 [Conf]
  24. Bruce Christianson
    Anonymous Authentication (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:306-311 [Conf]
  25. Bruce Christianson
    Introduction: Authentic Privacy. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:1-3 [Conf]
  26. Martin Loomes, Bruce Christianson, Neil Davey
    Formal Systems, Not Methods. [Citation Graph (0, 0)][DBLP]
    TFM, 2004, pp:47-64 [Conf]
  27. Marie Rose Low, Bruce Christianson
    Self Authenticating Proxies. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1994, v:37, n:5, pp:422-428 [Journal]
  28. T. Mark A. Lomas, Bruce Christianson
    To Whom am I Speaking? Remote Booting in a Hostile World. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:1, pp:50-54 [Journal]
  29. Ping Hu, Bruce Christianson
    Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:4, pp:87-96 [Journal]
  30. Marie Rose Low, Bruce Christianson
    Fine Grained Object Protection in Unix. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1993, v:27, n:1, pp:33-50 [Journal]

  31. Extending Trust in Peer-to-Peer Networks. [Citation Graph (, )][DBLP]


  32. A Domain-Oriented Approach for Access Control in Pervasive Environments. [Citation Graph (, )][DBLP]


  33. Multichannel Protocols to Prevent Relay Attacks. [Citation Graph (, )][DBLP]


  34. Recognizing Facial Expressions: A Comparison of Computational Approaches. [Citation Graph (, )][DBLP]


  35. Hierarchical Trustworthy Authentication for Pervasive Computing. [Citation Graph (, )][DBLP]


  36. The System Likes You. [Citation Graph (, )][DBLP]


  37. Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]


  38. Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]


  39. Putting the Human Back in the Protocol. [Citation Graph (, )][DBLP]


  40. Vintage Bit Cryptography. [Citation Graph (, )][DBLP]


  41. Theatre as a Discussion Tool in Human-Robot Interaction Experiments - A Pilot Study. [Citation Graph (, )][DBLP]


  42. A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. [Citation Graph (, )][DBLP]


  43. A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.024secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002