Search the dblp DataBase
Selwyn Russell :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michelangelo Giansiracusa , Selwyn Russell , Andrew Clark , John Hynd An Improved Execution Integrity Solution for Mobile Agents. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:170-183 [Conf ] Selwyn Russell Fast Checking of Individual Certificate Revocation on Small Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:249-255 [Conf ] Vicky Liu , William J. Caelli , Ernest Foo , Selwyn Russell Visually Sealed and Digitally Signed Documents. [Citation Graph (0, 0)][DBLP ] ACSC, 2004, pp:287-294 [Conf ] Selwyn Russell Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider. [Citation Graph (0, 0)][DBLP ] Cryptography: Policy and Algorithms, 1995, pp:301-312 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell A Security Architecture for Reputation Systems. [Citation Graph (0, 0)][DBLP ] EC-Web, 2003, pp:176-185 [Conf ] Selwyn Russell Recursive Certificate Structures for X.509 Systems. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2004, pp:135-148 [Conf ] Michelangelo Giansiracusa , Selwyn Russell , Andrew Clark , Volker Roth Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:343-357 [Conf ] Gary Gaskell , Mark Looi , Ed Dawson , Colin Boyd , Selwyn Russell A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:15-32 [Conf ] Selwyn Russell Issues in Merging Internet Autonomous Systems for Emergency Communications. [Citation Graph (0, 0)][DBLP ] ISI, 2006, pp:704-705 [Conf ] Jason Smith , Selwyn Russell , Mark Looi Security as a Safety Issue in Rail Communications. [Citation Graph (0, 0)][DBLP ] SCS, 2003, pp:79-88 [Conf ] Selwyn Russell Planning for the EDI of Tomorrow Using Electronic Document Authorization. [Citation Graph (0, 0)][DBLP ] SEC, 1993, pp:243-251 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell An Efficient Off-Line Reputation Scheme Using Articulated Certificates. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:53-62 [Conf ] Roslan Ismail , Colin Boyd , Audun Jøsang , Selwyn Russell Private Reputation Schemes for P2P systems. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:196-206 [Conf ] Selwyn Russell , Ed Dawson , Eiji Okamoto , Javier Lopez Virtual certificates and synthetic certificates: new paradigms for improving public key validation. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2003, v:26, n:16, pp:1826-1838 [Journal ] Selwyn Russell Paradigms for verification of authorization at source of electronic documents in an integrated environment. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1993, v:12, n:6, pp:542-549 [Journal ] Selwyn Russell Audit-by-receiver paradigms for verification of authorization at source of electronic documents. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1994, v:13, n:1, pp:59-67 [Journal ] Selwyn Russell Theory and benefits of recursive certificate structures. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2004, v:2, n:2, pp:78-90 [Journal ] Search in 0.002secs, Finished in 0.003secs