Search the dblp DataBase
James A. Malcolm :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jill Hewitt , Sarah A. Jones , James A. Malcolm , Robert J. Ollenbuttel Experiences With Web Content Creation From a Database. [Citation Graph (0, 0)][DBLP ] Digital Content Creation, 2001, pp:316-331 [Conf ] Mohammed S. Zahrani , Martin J. Loomes , James A. Malcolm , Andreas Alexander Albrecht Genetic local search for multicast routing. [Citation Graph (0, 0)][DBLP ] GECCO, 2006, pp:615-616 [Conf ] Bruce Christianson , Partha Das Chowdhury , James A. Malcolm Auditable Anonymous Delegation. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:66-76 [Conf ] James A. Malcolm Blind Publication: A Copyright Library without Publication or Trust. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:336-340 [Conf ] James A. Malcolm Blind Publication: A Copyright Library Without Publication or Trust (Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2003, pp:341-349 [Conf ] Bruce Christianson , Bruno Crispo , James A. Malcolm Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:182-183 [Conf ] Bruce Christianson , James A. Malcolm Binding Bit Patterns to Real World Entities. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1997, pp:105-113 [Conf ] Bruce Christianson , James A. Malcolm , Brian L. Robinson Pictures Can't Lie under Oath. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:208-218 [Conf ] Bruce Christianson , James A. Malcolm Delegation and Not-So Smart Cards (Position Paper). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:154-157 [Conf ] James A. Malcolm Lightweight Authentication in a Mobile Network (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:217-220 [Conf ] Partha Das Chowdhury , Bruce Christianson , James A. Malcolm Anonymous Authentication. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:299-305 [Conf ] Caroline Lyon , Bob Dickerson , James A. Malcolm Incremental Retrieval of Documents Relevant to a Topic. [Citation Graph (0, 0)][DBLP ] TREC, 2002, pp:- [Conf ] Marie Rose Low , James A. Malcolm A Joint Authorisation Scheme. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1997, v:31, n:1, pp:88-96 [Journal ] Mohammed S. Zahrani , Martin J. Loomes , James A. Malcolm , Andreas Alexander Albrecht Landscape analysis for multicast routing. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:30, n:1, pp:101-116 [Journal ] Using n-grams to rapidly characterise the evolution of software code. [Citation Graph (, )][DBLP ] Hierarchical Trustworthy Authentication for Pervasive Computing. [Citation Graph (, )][DBLP ] Anonymous Context Based Role Activation Mechanism. [Citation Graph (, )][DBLP ] A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. [Citation Graph (, )][DBLP ] Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs