The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tom Chothia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tom Chothia, Dominic Duggan, Jan Vitek
    Type-Based Distributed Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2003, pp:170-0 [Conf]
  2. Tom Chothia, Konstantinos Chatzikokolakis
    A Survey of Anonymous Peer-to-Peer File-Sharing. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:744-755 [Conf]
  3. Tom Chothia
    Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus. [Citation Graph (0, 0)][DBLP]
    FORTE, 2006, pp:115-130 [Conf]
  4. Tom Chothia, Dominic Duggan
    Type-Based Distributed Access Control vs. Untyped Attackers. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2005, pp:203-216 [Conf]
  5. Tom Chothia, Dominic Duggan
    Capability-Passing Processes. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:154, n:1, pp:3-23 [Journal]
  6. Tom Chothia, Ian Stark
    A Distributed Pi-Calculus with Local Areas of Communication. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2000, v:41, n:2, pp:- [Journal]
  7. Tom Chothia, Ian Stark
    Encoding Distributed Areas and Local Communication into the pi-Calculus. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2001, v:52, n:1, pp:- [Journal]
  8. Yuxin Deng, Tom Chothia, Catuscia Palamidessi, Jun Pang
    Metrics for Action-labelled Quantitative Transition Systems. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:153, n:2, pp:79-96 [Journal]
  9. Tom Chothia, Dominic Duggan
    Abstractions for fault-tolerant global computing. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:322, n:3, pp:567-613 [Journal]
  10. Farhad Arbab, Tom Chothia, Sun Meng, Young-Joo Moon
    Component Connectors with QoS Guarantees. [Citation Graph (0, 0)][DBLP]
    COORDINATION, 2007, pp:286-304 [Conf]
  11. Tom Chothia, Jetty Kleijn
    Q-Automata: Modelling the Resource Usage of Concurrent Components. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:175, n:2, pp:153-167 [Journal]
  12. Tom Chothia, Dominic Duggan, Ye Wu
    An End-To-End Approach to Distributed Policy Language Implementation: (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:171, n:4, pp:3-21 [Journal]
  13. Tom Chothia, Jun Pang, Muhammad Torabi Dashti
    Keeping Secrets in Resource Aware Components. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:190, n:3, pp:79-94 [Journal]
  14. Tom Chothia, Dominic Duggan
    Capability passing processes. [Citation Graph (0, 0)][DBLP]
    Sci. Comput. Program., 2007, v:66, n:3, pp:184-204 [Journal]

  15. From Coordination to Stochastic Models of QoS. [Citation Graph (, )][DBLP]


  16. Analysing Unlinkability and Anonymity Using the Applied Pi Calculus. [Citation Graph (, )][DBLP]


  17. A Traceability Attack against e-Passports. [Citation Graph (, )][DBLP]


  18. A Trusted Infrastructure for P2P-based Marketplaces. [Citation Graph (, )][DBLP]


  19. Schedulability and Compatibility of Real Time Asynchronous Objects. [Citation Graph (, )][DBLP]


  20. Statistical Measurement of Information Leakage. [Citation Graph (, )][DBLP]


  21. A Framework for Automatically Checking Anonymity with mu CRL. [Citation Graph (, )][DBLP]


  22. Modular Schedulability Analysis of Concurrent Objects in Creol. [Citation Graph (, )][DBLP]


  23. Timed Automata Semantics for Analyzing Creol [Citation Graph (, )][DBLP]


Search in 0.024secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002