The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

David Gray: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Sinclair, David Gray, Geoff Hamilton
    Synthesising Attacks on Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ATVA, 2004, pp:49-63 [Conf]
  2. David Sinclair, James F. Power, J. Paul Gibson, David Gray, Geoff Hamilton
    Specifying and Verifying IP with Linear Logic. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Distributed System Validation and Verification, 2000, pp:0-0 [Conf]
  3. Benjamin Aziz, David Gray, Geoff W. Hamilton
    A Static Analysis of PKI-Based Systems. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2005, pp:51-65 [Conf]
  4. David Gray, Geoff Hamilton, David Sinclair, J. Paul Gibson, James F. Power
    Four Logics and a Protocol. [Citation Graph (0, 0)][DBLP]
    IWFM, 1999, pp:- [Conf]
  5. Benjamin Aziz, Geoff W. Hamilton, David Gray
    A Denotational Approach to the Static Analysis of Cryptographic Processes. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2005, v:118, n:, pp:19-36 [Journal]
  6. Thibault Candebat, David Gray
    Secure pseudonym management using mediated identity-based encryption. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:3, pp:249-267 [Journal]
  7. Benjamin Aziz, Geoff W. Hamilton, David Gray
    A static analysis of cryptographic processes: the denotational approach. [Citation Graph (0, 0)][DBLP]
    J. Log. Algebr. Program., 2005, v:64, n:2, pp:285-320 [Journal]
  8. David Gray
    The Formal Specification of a Small Bookshop Information System. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1988, v:14, n:2, pp:263-272 [Journal]

  9. A frequency based sighting blurring algorithm for use with location based services on the internet. [Citation Graph (, )][DBLP]


  10. An Access Control Model for Location based Services. [Citation Graph (, )][DBLP]


  11. Can You See Me? The Use of a Binary Visibility Metric in Distance Bounding. [Citation Graph (, )][DBLP]


  12. Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering Protocol. [Citation Graph (, )][DBLP]


  13. Adaptive pattern-based image compression for ultra-low bandwidth weapon seeker image communication. [Citation Graph (, )][DBLP]


  14. A formally verified proof of the prime number theorem [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.023secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002