The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Keith Harrison: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Keith Harrison
    GAP: An Exercise in Model Oriented Programming. [Citation Graph (0, 0)][DBLP]
    ALPUK, 1990, pp:159-172 [Conf]
  2. Steven D. Galbraith, Keith Harrison, David Soldera
    Implementing the Tate Pairing. [Citation Graph (0, 0)][DBLP]
    ANTS, 2002, pp:324-337 [Conf]
  3. Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu
    Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:271-278 [Conf]
  4. Marco Casassa Mont, Pete Bramhall, Keith Harrison
    A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:432-437 [Conf]
  5. L. Chen, Keith Harrison, David Soldera, Nigel P. Smart
    Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    InfraSec, 2002, pp:260-275 [Conf]
  6. L. Chen, Keith Harrison, A. Moss, David Soldera, Nigel P. Smart
    Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:322-333 [Conf]
  7. Marco Casassa Mont, Keith Harrison, Martin Sadler
    The HP time vault service: exploiting IBE for timed release of confidential information. [Citation Graph (0, 0)][DBLP]
    WWW, 2003, pp:160-169 [Conf]
  8. Keith Harrison, Shouhuai Xu
    Protecting Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2007, pp:137-143 [Conf]

  9. An Empirical Study on the Effectiveness of Common Security Measures. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002