The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

T. Mark A. Lomas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. T. Mark A. Lomas
    Encrypting Network Traffic. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:64-70 [Conf]
  2. T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, Roger M. Needham
    Reducing Risks from Poorly Chosen Keys. [Citation Graph (0, 0)][DBLP]
    SOSP, 1989, pp:14-18 [Conf]
  3. T. Mark A. Lomas
    Abuse of Process (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:131-136 [Conf]
  4. T. Mark A. Lomas
    Auditing against Multiple Policies. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:15-20 [Conf]
  5. Virgil D. Gligor, Peter Landrock, T. Mark A. Lomas, Raphael Yahalom, John P. Warne
    Discussion Session: Differences Between Academic and Commercial Security. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1998, pp:177-192 [Conf]
  6. Bruno Crispo, T. Mark A. Lomas
    A Certification Scheme for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1996, pp:19-32 [Conf]
  7. T. Mark A. Lomas
    I Cannot Tell a Lie (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:253-255 [Conf]
  8. T. Mark A. Lomas
    You Can't Take It with You. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:166-169 [Conf]
  9. T. Mark A. Lomas
    Why Are We Authenticating (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:291-298 [Conf]
  10. Michael Roe, Ross J. Anderson, William S. Harbison, T. Mark A. Lomas
    Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2000, pp:62-73 [Conf]
  11. T. Mark A. Lomas, Bruce Christianson
    To Whom am I Speaking? Remote Booting in a Hostile World. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1995, v:28, n:1, pp:50-54 [Journal]
  12. Francesco Bergadano, Bruno Crispo, T. Mark A. Lomas
    Strong Authentication and Privacy with Standard Browsers. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:191-212 [Journal]
  13. Li Gong, T. Mark A. Lomas, Roger M. Needham, Jerome H. Saltzer
    Protecting Poorly Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:648-656 [Journal]

  14. The System Likes You? [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002