Security: Publications
Click here to download all publications in a single bibtex file
@inproceedings{Paverd2014a, title = "Privacy-Enhanced Bi-Directional Communication in the Smart Grid using Trusted Computing", author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian", year = "2014", booktitle = "Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014)", url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7007758", doi = "10.1109/SmartGridComm.2014.7007758", }
@incollection{Paverd2014, title = "Security and Privacy in Smart Grid Demand Response Systems", author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian", year = "2014", booktitle = "Smart Grid Security", editor = "Cuellar, Jorge", isbn = "978-3-319-10328-0", language = "English", pages = "1-15", publisher = "Springer International Publishing", series = "Lecture Notes in Computer Science", url = "http://link.springer.com/chapter/10.1007/978-3-319-10329-7_1", doi = "10.1007/978-3-319-10329-7_1", }
@inproceedings{murray10-infoflow, title = "Analysing the Information Flow Properties of Object-Capability Patterns", author = "Toby Murray and Gavin Lowe", year = "2010", booktitle = "Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009)", pages = "81-95", series = "Lecture Notes in Computer Science", volume = "5983", doi = "10.1007/978-3-642-12459-4_7", }
@phdthesis{murray10dphil, title = "Analysing the Security Properties of Object-Capability Patterns", author = "Toby Murray", year = "2010", school = "University of Oxford", }
@conference{murray09-avocs08, title = "On Refinement-Closed Security Properties and Nondeterministic Compositions", author = "Toby Murray and Gavin Lowe", year = "2009", booktitle = "Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08)", number = "2", pages = "49-68", series = "Electronic Notes in Theoretical Computer Science", volume = "250", doi = "10.1016/j.entcs.2009.08.017", }
@article{ShortDigests, title = "Authenticating ad hoc networks by comparison of short digests", author = "A. W. Roscoe and L. H. Nguyen", year = "2008", journal = "{Information and Computation}", pages = "250-271", url = "http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/120.pdf", volume = "206", }
@article{article/Murray08, title = "Non-Delegatable Authorities in Capability Systems", author = "Toby Murray and Duncan Grove", year = "2008", journal = "Journal of Computer Security", number = "6", pages = "743-759", publisher = "IOS Press", volume = "16", doi = "10.3233/JCS-2008-0314", }
@inproceedings{murray08-fcsarspawits, title = "Analysing Object-Capability Security", author = "Toby Murray", year = "2008", booktitle = "Proceedings of the Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08)", }
@inproceedings{biro122, title = "Separating two roles of hashing in one-way message authentication", author = "L.H. Nguyen and A.W. Roscoe", year = "2008", booktitle = "Proceedings of FCS-ARSPA-WITS", note = "(This version is extended by appendices not present in proceedings.)", }
@conference{chris08csf, title = "Specifying Secure Transport Layers", author = "Christopher Dilloway and Gavin Lowe", year = "2008", booktitle = "21st IEEE Computer Security Foundations Symposium (CSF 21)", }
@techreport{440, title = "Analysing TLS in the Strand Spaces Model", author = "Allaa Kamil and Gavin Lowe", year = "2008", }
@techreport{cdilloway08proxytr, title = "Chaining Secure Channels (Technical Report)", author = "Christopher Dilloway", year = "2008", }
@phdthesis{dilloway08thesis, title = "On the Specication and Analysis of Secure Transport Layers", author = "Christopher Dilloway", year = "2008", school = "Oxford University Computing Laboratory", url = "http://web.comlab.ox.ac.uk/activities/security/papers/dilloway_thesis.pdf", }
@inproceedings{inproc/Lowe2007, title = "On Information Flow and Refinement-Closure", author = "Gavin Lowe", year = "2007", booktitle = "{Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)}", url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/NDC.pdf", }
@conference{cdilloway2007spec, title = "On the Specification of Secure Channels", author = "Christopher Dilloway and Gavin Lowe", year = "2007", booktitle = "Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)", }
@inproceedings{inproc/Murray2007, title = "Authority Analysis for Least Privilege Environments", author = "Toby Murray and Gavin Lowe", year = "2007", booktitle = "{Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07)}", }
@techreport{RR-06-03, title = "Derivation of Error Distribution in Least Squares Steganalysis", author = "Andrew Ker", year = "2006", institution = "Oxford University Computing Laboratory", month = "July", number = "RR-06-03", }