Segui
Jeremy Jacob
Jeremy Jacob
Lecturer in Computer Science, University of York
Email verificata su cs.york.ac.uk
Titolo
Citata da
Citata da
Anno
A survey of authentication protocol literature: Version 1.0
JA Clark, JL Jacob
Citeseer, 1997
3301997
The role-based access control system of a European bank: a case study and discussion
A Schaad, J Moffett, J Jacob
Proceedings of the sixth ACM symposium on Access control models and …, 2001
2352001
A survey of authentication protocol literature
J Clark, J Jacob
2311997
The design of S-boxes by simulated annealing
JA Clark, JL Jacob, S Stepney
New Generation Computing 23, 219-231, 2005
2022005
Evolving Boolean functions satisfying multiple criteria
JA Clark, JL Jacob, S Stepney, S Maitra, W Millan
Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002
1222002
Almost Boolean functions: The design of Boolean functions by spectral inversion
JA Clark, JL Jacob, S Maitra, P Stănică
Computational intelligence 20 (3), 450-462, 2004
1102004
On the derivation of secure components
J Jacob
Proceedings. 1989 IEEE Symposium on Security and Privacy, 242-242, 1989
1091989
Two-stage optimisation in the design of Boolean functions
JA Clark, JL Jacob
Australasian conference on information security and privacy, 242-254, 2000
882000
Protocols are programs too: the meta-heuristic search for security protocols
JA Clark, JL Jacob
Information and Software Technology 43 (14), 891-904, 2001
872001
Security specifications
J Jacob
Proceedings. 1988 IEEE Symposium on Security and Privacy, 14-14, 1988
741988
The certification of the Mondex electronic purse to ITSEC Level E6
J Woodcock, S Stepney, D Cooper, J Clark, J Jacob
Formal Aspects of Computing 20, 5-19, 2008
672008
Searching for resource-efficient programs: Low-power pseudorandom number generators
DR White, J Clark, J Jacob, SM Poulding
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
642008
On the Security of Recent Protocols.
JA Clark, J Jacob
Inf. Process. Lett. 56 (3), 151-155, 1995
571995
Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
JA Clark, JL Jacob
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 82-95, 2000
542000
A survey of authentication protocol literature, 1997
J Clark, J Jacob
502003
Basic theorems about security
J Jacob
Journal of Computer Security 1 (3-4), 385-411, 1992
501992
Attacking authentication protocols
J Clark, J Jacob
High Integrity Systems 1, 465-474, 1996
451996
Modelling user-phishing interaction
X Dong, JA Clark, J Jacob
2008 conference on human system interactions, 627-632, 2008
412008
Searching for cost functions
JA Clark, JL Jacob, S Stepney
Proceedings of the 2004 Congress on evolutionary computation (IEEE Cat. No …, 2004
412004
User behaviour based phishing websites detection
X Dong, JA Clark, JL Jacob
2008 International Multiconference on Computer Science and Information …, 2008
402008
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20