Search the dblp DataBase
T. Mark A. Lomas :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
T. Mark A. Lomas Encrypting Network Traffic. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:64-70 [Conf ] T. Mark A. Lomas , Li Gong , Jerome H. Saltzer , Roger M. Needham Reducing Risks from Poorly Chosen Keys. [Citation Graph (0, 0)][DBLP ] SOSP, 1989, pp:14-18 [Conf ] T. Mark A. Lomas Abuse of Process (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:131-136 [Conf ] T. Mark A. Lomas Auditing against Multiple Policies. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1999, pp:15-20 [Conf ] Virgil D. Gligor , Peter Landrock , T. Mark A. Lomas , Raphael Yahalom , John P. Warne Discussion Session: Differences Between Academic and Commercial Security. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1998, pp:177-192 [Conf ] Bruno Crispo , T. Mark A. Lomas A Certification Scheme for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 1996, pp:19-32 [Conf ] T. Mark A. Lomas I Cannot Tell a Lie (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:253-255 [Conf ] T. Mark A. Lomas You Can't Take It with You. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2001, pp:166-169 [Conf ] T. Mark A. Lomas Why Are We Authenticating (Transcript of Discussion). [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2004, pp:291-298 [Conf ] Michael Roe , Ross J. Anderson , William S. Harbison , T. Mark A. Lomas Government Access to Keys - Panel Discussion. [Citation Graph (0, 0)][DBLP ] Security Protocols Workshop, 2000, pp:62-73 [Conf ] T. Mark A. Lomas , Bruce Christianson To Whom am I Speaking? Remote Booting in a Hostile World. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1995, v:28, n:1, pp:50-54 [Journal ] Francesco Bergadano , Bruno Crispo , T. Mark A. Lomas Strong Authentication and Privacy with Standard Browsers. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:3, pp:191-212 [Journal ] Li Gong , T. Mark A. Lomas , Roger M. Needham , Jerome H. Saltzer Protecting Poorly Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:648-656 [Journal ] The System Likes You? [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.005secs