The SCEAS System
Navigation Menu

Search the dblp DataBase


Selwyn Russell: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, John Hynd
    An Improved Execution Integrity Solution for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:170-183 [Conf]
  2. Selwyn Russell
    Fast Checking of Individual Certificate Revocation on Small Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:249-255 [Conf]
  3. Vicky Liu, William J. Caelli, Ernest Foo, Selwyn Russell
    Visually Sealed and Digitally Signed Documents. [Citation Graph (0, 0)][DBLP]
    ACSC, 2004, pp:287-294 [Conf]
  4. Selwyn Russell
    Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:301-312 [Conf]
  5. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    A Security Architecture for Reputation Systems. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:176-185 [Conf]
  6. Selwyn Russell
    Recursive Certificate Structures for X.509 Systems. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:135-148 [Conf]
  7. Michelangelo Giansiracusa, Selwyn Russell, Andrew Clark, Volker Roth
    Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:343-357 [Conf]
  8. Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell
    A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:15-32 [Conf]
  9. Selwyn Russell
    Issues in Merging Internet Autonomous Systems for Emergency Communications. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:704-705 [Conf]
  10. Jason Smith, Selwyn Russell, Mark Looi
    Security as a Safety Issue in Rail Communications. [Citation Graph (0, 0)][DBLP]
    SCS, 2003, pp:79-88 [Conf]
  11. Selwyn Russell
    Planning for the EDI of Tomorrow Using Electronic Document Authorization. [Citation Graph (0, 0)][DBLP]
    SEC, 1993, pp:243-251 [Conf]
  12. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:53-62 [Conf]
  13. Roslan Ismail, Colin Boyd, Audun Jøsang, Selwyn Russell
    Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:196-206 [Conf]
  14. Selwyn Russell, Ed Dawson, Eiji Okamoto, Javier Lopez
    Virtual certificates and synthetic certificates: new paradigms for improving public key validation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2003, v:26, n:16, pp:1826-1838 [Journal]
  15. Selwyn Russell
    Paradigms for verification of authorization at source of electronic documents in an integrated environment. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1993, v:12, n:6, pp:542-549 [Journal]
  16. Selwyn Russell
    Audit-by-receiver paradigms for verification of authorization at source of electronic documents. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:1, pp:59-67 [Journal]
  17. Selwyn Russell
    Theory and benefits of recursive certificate structures. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2004, v:2, n:2, pp:78-90 [Journal]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002