Security: Publications
-
[1]
Analysing Object−Capability Security
Toby Murray
In Proceedings of the Joint Workshop on Foundations of Computer Security‚ Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS−ARSPA−WITS'08). 2008.
Details about Analysing Object−Capability Security | BibTeX data for Analysing Object−Capability Security | Download (pdf) of Analysing Object−Capability Security
-
[2]
Analysing TLS in the Strand Spaces Model
Allaa Kamil and Gavin Lowe
2008.
Details about Analysing TLS in the Strand Spaces Model | BibTeX data for Analysing TLS in the Strand Spaces Model | Download (pdf) of Analysing TLS in the Strand Spaces Model
-
[3]
Analysing the Information Flow Properties of Object−Capability Patterns
Toby Murray and Gavin Lowe
In Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009). Vol. 5983 of Lecture Notes in Computer Science. Pages 81−95. 2010.
Details about Analysing the Information Flow Properties of Object−Capability Patterns | BibTeX data for Analysing the Information Flow Properties of Object−Capability Patterns | Download (pdf) of Analysing the Information Flow Properties of Object−Capability Patterns | DOI (10.1007/978-3-642-12459-4_7)
-
[4]
Analysing the Security Properties of Object−Capability Patterns
Toby Murray
PhD Thesis University of Oxford. 2010.
Details about Analysing the Security Properties of Object−Capability Patterns | BibTeX data for Analysing the Security Properties of Object−Capability Patterns | Download (pdf) of Analysing the Security Properties of Object−Capability Patterns
-
[5]
Authenticating ad hoc networks by comparison of short digests
A. W. Roscoe and L. H. Nguyen
In Information and Computation. Vol. 206. Pages 250−271. 2008.
Details about Authenticating ad hoc networks by comparison of short digests | BibTeX data for Authenticating ad hoc networks by comparison of short digests | Download (pdf) of Authenticating ad hoc networks by comparison of short digests
-
[6]
Authority Analysis for Least Privilege Environments
Toby Murray and Gavin Lowe
In Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS−ARSPA'07). 2007.
Details about Authority Analysis for Least Privilege Environments | BibTeX data for Authority Analysis for Least Privilege Environments | Download (pdf) of Authority Analysis for Least Privilege Environments
-
[7]
Chaining Secure Channels (Technical Report)
Christopher Dilloway
2008.
Details about Chaining Secure Channels (Technical Report) | BibTeX data for Chaining Secure Channels (Technical Report) | Download (pdf) of Chaining Secure Channels (Technical Report)
-
[8]
Derivation of Error Distribution in Least Squares Steganalysis
Andrew Ker
No. RR−06−03. Oxford University Computing Laboratory. July, 2006.
Details about Derivation of Error Distribution in Least Squares Steganalysis | BibTeX data for Derivation of Error Distribution in Least Squares Steganalysis | Download (pdf) of Derivation of Error Distribution in Least Squares Steganalysis
-
[9]
Non−Delegatable Authorities in Capability Systems
Toby Murray and Duncan Grove
In Journal of Computer Security. Vol. 16. No. 6. Pages 743−759. 2008.
Details about Non−Delegatable Authorities in Capability Systems | BibTeX data for Non−Delegatable Authorities in Capability Systems | Download (pdf) of Non−Delegatable Authorities in Capability Systems | DOI (10.3233/JCS-2008-0314)
-
[10]
On Information Flow and Refinement−Closure
Gavin Lowe
In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.
Details about On Information Flow and Refinement−Closure | BibTeX data for On Information Flow and Refinement−Closure | Download (pdf) of On Information Flow and Refinement−Closure
-
[11]
On Refinement−Closed Security Properties and Nondeterministic Compositions
Toby Murray and Gavin Lowe
In Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08). Vol. 250 of Electronic Notes in Theoretical Computer Science. No. 2. Pages 49−68. 2009.
Details about On Refinement−Closed Security Properties and Nondeterministic Compositions | BibTeX data for On Refinement−Closed Security Properties and Nondeterministic Compositions | Download (pdf) of On Refinement−Closed Security Properties and Nondeterministic Compositions | DOI (10.1016/j.entcs.2009.08.017)
-
[12]
On the Specication and Analysis of Secure Transport Layers
Christopher Dilloway
PhD Thesis Oxford University Computing Laboratory. 2008.
Details about On the Specication and Analysis of Secure Transport Layers | BibTeX data for On the Specication and Analysis of Secure Transport Layers | Download (pdf) of On the Specication and Analysis of Secure Transport Layers
-
[13]
On the Specification of Secure Channels
Christopher Dilloway and Gavin Lowe
In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.
Details about On the Specification of Secure Channels | BibTeX data for On the Specification of Secure Channels | Download (pdf) of On the Specification of Secure Channels
-
[14]
Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing
Andrew J Paverd‚ Andrew P Martin and Ian Brown
In Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014). 2014.
Details about Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | BibTeX data for Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | Download Paverd-SmartGridComm-2014.pdf of Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | Download Paverd-SmartGridComm-2014-slides.pdf of Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing | DOI (10.1109/SmartGridComm.2014.7007758) | Link to Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing
-
[15]
Security and Privacy in Smart Grid Demand Response Systems
Andrew J Paverd‚ Andrew P Martin and Ian Brown
In Jorge Cuellar, editor, Smart Grid Security. Pages 1−15. Springer International Publishing. 2014.
Details about Security and Privacy in Smart Grid Demand Response Systems | BibTeX data for Security and Privacy in Smart Grid Demand Response Systems | Download (pdf) of Security and Privacy in Smart Grid Demand Response Systems | DOI (10.1007/978-3-319-10329-7_1) | Link to Security and Privacy in Smart Grid Demand Response Systems
-
[16]
Separating two roles of hashing in one−way message authentication
L.H. Nguyen and A.W. Roscoe
In Proceedings of FCS−ARSPA−WITS. 2008.
(This version is extended by appendices not present in proceedings.)
Details about Separating two roles of hashing in one−way message authentication | BibTeX data for Separating two roles of hashing in one−way message authentication | Download (pdf) of Separating two roles of hashing in one−way message authentication
-
[17]
Specifying Secure Transport Layers
Christopher Dilloway and Gavin Lowe
In 21st IEEE Computer Security Foundations Symposium (CSF 21). 2008.
Details about Specifying Secure Transport Layers | BibTeX data for Specifying Secure Transport Layers | Download (pdf) of Specifying Secure Transport Layers