The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeremy L. Jacob: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jeremy L. Jacob, Alan Wood
    A Principled Semantics for inp. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 2000, pp:51-65 [Conf]
  2. Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob
    Coordination with Multicapabilities. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 2005, pp:79-93 [Conf]
  3. John A. Clark, Jeremy L. Jacob
    Fault Injection and a Timing Channel on an Analysis Technique. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:181-196 [Conf]
  4. John A. Clark, Jeremy L. Jacob, Susan Stepney
    Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. [Citation Graph (0, 0)][DBLP]
    GECCO, 2003, pp:2022-2033 [Conf]
  5. John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan
    Evolving Boolean Functions Satisfying Multiple Criteria. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:246-259 [Conf]
  6. John A. Clark, Jeremy L. Jacob
    Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:82-95 [Conf]
  7. Chen Hao, John A. Clark, Jeremy L. Jacob
    Synthesising Efficient and Effective Security Protocols. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:125, n:1, pp:25-41 [Journal]
  8. John A. Clark, Jeremy L. Jacob
    Protocols are programs too: the meta-heuristic search for security protocols. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2001, v:43, n:14, pp:891-904 [Journal]
  9. Ian Toyn, David M. Cattrall, John A. McDermid, Jeremy L. Jacob
    A practical language and toolkit for high-integrity tools. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:41, n:3, pp:161-173 [Journal]
  10. Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob
    Coordination with multicapabilities. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:64, n:2, pp:205-222 [Journal]

  11. Trace Specifications in Alloy. [Citation Graph (, )][DBLP]


  12. Threat Modelling in User Performed Authentication. [Citation Graph (, )][DBLP]


  13. User behaviour based phishing websites detection. [Citation Graph (, )][DBLP]


  14. Automated Design of Security Protocols. [Citation Graph (, )][DBLP]


  15. Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002