Seguir
Jeremy Jacob
Jeremy Jacob
Lecturer in Computer Science, University of York
Dirección de correo verificada de cs.york.ac.uk
Título
Citado por
Citado por
Año
A survey of authentication protocol literature: Version 1.0
JA Clark, JL Jacob
Citeseer, 1997
3301997
The role-based access control system of a European bank: a case study and discussion
A Schaad, J Moffett, J Jacob
Proceedings of the sixth ACM symposium on Access control models and …, 2001
2352001
A survey of authentication protocol literature
J Clark, J Jacob
2311997
The design of S-boxes by simulated annealing
JA Clark, JL Jacob, S Stepney
New Generation Computing 23, 219-231, 2005
2032005
Evolving Boolean functions satisfying multiple criteria
JA Clark, JL Jacob, S Stepney, S Maitra, W Millan
Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002
1222002
Almost Boolean functions: The design of Boolean functions by spectral inversion
JA Clark, JL Jacob, S Maitra, P Stănică
Computational intelligence 20 (3), 450-462, 2004
1122004
On the derivation of secure components
J Jacob
Proceedings. 1989 IEEE Symposium on Security and Privacy, 242-242, 1989
1091989
Two-stage optimisation in the design of Boolean functions
JA Clark, JL Jacob
Australasian conference on information security and privacy, 242-254, 2000
882000
Protocols are programs too: the meta-heuristic search for security protocols
JA Clark, JL Jacob
Information and Software Technology 43 (14), 891-904, 2001
872001
Security specifications
J Jacob
Proceedings. 1988 IEEE Symposium on Security and Privacy, 14-14, 1988
741988
The certification of the Mondex electronic purse to ITSEC Level E6
J Woodcock, S Stepney, D Cooper, J Clark, J Jacob
Formal Aspects of Computing 20, 5-19, 2008
672008
Searching for resource-efficient programs: Low-power pseudorandom number generators
DR White, J Clark, J Jacob, SM Poulding
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
642008
On the Security of Recent Protocols.
JA Clark, J Jacob
Inf. Process. Lett. 56 (3), 151-155, 1995
571995
Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
JA Clark, JL Jacob
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 82-95, 2000
542000
A survey of authentication protocol literature, 1997
J Clark, J Jacob
502003
Basic theorems about security
J Jacob
Journal of Computer Security 1 (3-4), 385-411, 1992
501992
Attacking authentication protocols
J Clark, J Jacob
High Integrity Systems 1, 465-474, 1996
451996
User behaviour based phishing websites detection
X Dong, JA Clark, JL Jacob
2008 International Multiconference on Computer Science and Information …, 2008
412008
Modelling user-phishing interaction
X Dong, JA Clark, J Jacob
2008 conference on human system interactions, 627-632, 2008
412008
Searching for cost functions
JA Clark, JL Jacob, S Stepney
Proceedings of the 2004 Congress on evolutionary computation (IEEE Cat. No …, 2004
412004
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20