|
Search the dblp DataBase
Keith Harrison:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Keith Harrison
GAP: An Exercise in Model Oriented Programming. [Citation Graph (0, 0)][DBLP] ALPUK, 1990, pp:159-172 [Conf]
- Steven D. Galbraith, Keith Harrison, David Soldera
Implementing the Tate Pairing. [Citation Graph (0, 0)][DBLP] ANTS, 2002, pp:324-337 [Conf]
- Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components. [Citation Graph (0, 0)][DBLP] COMPSAC, 2002, pp:271-278 [Conf]
- Marco Casassa Mont, Pete Bramhall, Keith Harrison
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care. [Citation Graph (0, 0)][DBLP] DEXA Workshops, 2003, pp:432-437 [Conf]
- L. Chen, Keith Harrison, David Soldera, Nigel P. Smart
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. [Citation Graph (0, 0)][DBLP] InfraSec, 2002, pp:260-275 [Conf]
- L. Chen, Keith Harrison, A. Moss, David Soldera, Nigel P. Smart
Certification of Public Keys within an Identity Based System. [Citation Graph (0, 0)][DBLP] ISC, 2002, pp:322-333 [Conf]
- Marco Casassa Mont, Keith Harrison, Martin Sadler
The HP time vault service: exploiting IBE for timed release of confidential information. [Citation Graph (0, 0)][DBLP] WWW, 2003, pp:160-169 [Conf]
- Keith Harrison, Shouhuai Xu
Protecting Cryptographic Keys from Memory Disclosure Attacks. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:137-143 [Conf]
An Empirical Study on the Effectiveness of Common Security Measures. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|