The SCEAS System
Navigation Menu

Search the dblp DataBase


Tyler Moore: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jolyon Clulow, Gerhard P. Hancke, Markus G. Kuhn, Tyler Moore
    So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2006, pp:83-97 [Conf]
  2. Tyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi
    Using Signaling Information in Telecom Network Forensics. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:177-188 [Conf]
  3. Tyler Moore
    A Collusion Attack on Pairwise Key Predistribution Schemes for Distributed Sensor Networks. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:251-255 [Conf]
  4. Jolyon Clulow, Tyler Moore
    Suicide for the common good: a new strategy for credential revocation in self-organizing systems. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2006, v:40, n:3, pp:18-21 [Journal]
  5. Ross Anderson, Tyler Moore
    Information Security Economics - and Beyond. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2007, pp:68-91 [Conf]
  6. Tyler Moore, Jolyon Clulow, Shishir Nagaraja, Ross Anderson
    New Strategies for Revocation in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ESAS, 2007, pp:232-246 [Conf]

  7. Evaluating the Wisdom of Crowds in Assessing Phishing Websites. [Citation Graph (, )][DBLP]

  8. Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. [Citation Graph (, )][DBLP]

  9. Measuring the Perpetrators and Funders of Typosquatting. [Citation Graph (, )][DBLP]

  10. The Phish-Market Protocol: Securely Sharing Attack Data between Competitors. [Citation Graph (, )][DBLP]

  11. GSM Cell Site Forensics. [Citation Graph (, )][DBLP]

  12. Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. [Citation Graph (, )][DBLP]

  13. Examining the impact of website take-down on phishing. [Citation Graph (, )][DBLP]

  14. Fast Exclusion of Errant Devices from Vehicular Networks. [Citation Graph (, )][DBLP]

  15. Security Economics and European Policy. [Citation Graph (, )][DBLP]

Search in 0.024secs, Finished in 0.026secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002