The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James A. Malcolm: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jill Hewitt, Sarah A. Jones, James A. Malcolm, Robert J. Ollenbuttel
    Experiences With Web Content Creation From a Database. [Citation Graph (0, 0)][DBLP]
    Digital Content Creation, 2001, pp:316-331 [Conf]
  2. Mohammed S. Zahrani, Martin J. Loomes, James A. Malcolm, Andreas Alexander Albrecht
    Genetic local search for multicast routing. [Citation Graph (0, 0)][DBLP]
    GECCO, 2006, pp:615-616 [Conf]
  3. Bruce Christianson, Partha Das Chowdhury, James A. Malcolm
    Auditable Anonymous Delegation. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:66-76 [Conf]
  4. James A. Malcolm
    Blind Publication: A Copyright Library without Publication or Trust. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:336-340 [Conf]
  5. James A. Malcolm
    Blind Publication: A Copyright Library Without Publication or Trust (Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2003, pp:341-349 [Conf]
  6. Bruce Christianson, Bruno Crispo, James A. Malcolm
    Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:182-183 [Conf]
  7. Bruce Christianson, James A. Malcolm
    Binding Bit Patterns to Real World Entities. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1997, pp:105-113 [Conf]
  8. Bruce Christianson, James A. Malcolm, Brian L. Robinson
    Pictures Can't Lie under Oath. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:208-218 [Conf]
  9. Bruce Christianson, James A. Malcolm
    Delegation and Not-So Smart Cards (Position Paper). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:154-157 [Conf]
  10. James A. Malcolm
    Lightweight Authentication in a Mobile Network (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:217-220 [Conf]
  11. Partha Das Chowdhury, Bruce Christianson, James A. Malcolm
    Anonymous Authentication. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:299-305 [Conf]
  12. Caroline Lyon, Bob Dickerson, James A. Malcolm
    Incremental Retrieval of Documents Relevant to a Topic. [Citation Graph (0, 0)][DBLP]
    TREC, 2002, pp:- [Conf]
  13. Marie Rose Low, James A. Malcolm
    A Joint Authorisation Scheme. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:1, pp:88-96 [Journal]
  14. Mohammed S. Zahrani, Martin J. Loomes, James A. Malcolm, Andreas Alexander Albrecht
    Landscape analysis for multicast routing. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:30, n:1, pp:101-116 [Journal]

  15. Using n-grams to rapidly characterise the evolution of software code. [Citation Graph (, )][DBLP]


  16. Hierarchical Trustworthy Authentication for Pervasive Computing. [Citation Graph (, )][DBLP]


  17. Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP]


  18. A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. [Citation Graph (, )][DBLP]


  19. Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. [Citation Graph (, )][DBLP]


Search in 0.237secs, Finished in 0.238secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002