A survey of authentication protocol literature: Version 1.0 JA Clark, JL Jacob Citeseer, 1997 | 332 | 1997 |
The role-based access control system of a European bank: a case study and discussion A Schaad, J Moffett, J Jacob Proceedings of the sixth ACM symposium on Access control models and …, 2001 | 235 | 2001 |
A survey of authentication protocol literature J Clark, J Jacob | 231 | 1997 |
The design of S-boxes by simulated annealing JA Clark, JL Jacob, S Stepney New Generation Computing 23, 219-231, 2005 | 208 | 2005 |
Evolving Boolean functions satisfying multiple criteria JA Clark, JL Jacob, S Stepney, S Maitra, W Millan Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002 | 118 | 2002 |
Almost Boolean functions: The design of Boolean functions by spectral inversion JA Clark, JL Jacob, S Maitra, P Stănică Computational intelligence 20 (3), 450-462, 2004 | 113 | 2004 |
On the derivation of secure components J Jacob Proceedings. 1989 IEEE Symposium on Security and Privacy, 242-242, 1989 | 110 | 1989 |
Two-stage optimisation in the design of Boolean functions JA Clark, JL Jacob Australasian conference on information security and privacy, 242-254, 2000 | 88 | 2000 |
Protocols are programs too: the meta-heuristic search for security protocols JA Clark, JL Jacob Information and Software Technology 43 (14), 891-904, 2001 | 86 | 2001 |
Security specifications J Jacob Proceedings. 1988 IEEE Symposium on Security and Privacy, 14-14, 1988 | 75 | 1988 |
The certification of the Mondex electronic purse to ITSEC Level E6 J Woodcock, S Stepney, D Cooper, J Clark, J Jacob Formal Aspects of Computing 20, 5-19, 2008 | 66 | 2008 |
Searching for resource-efficient programs: Low-power pseudorandom number generators DR White, J Clark, J Jacob, SM Poulding Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008 | 64 | 2008 |
On the Security of Recent Protocols. JA Clark, J Jacob Inf. Process. Lett. 56 (3), 151-155, 1995 | 56 | 1995 |
A survey of authentication protocol literature, 1997 J Clark, J Jacob | 54 | |
Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols JA Clark, JL Jacob Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 82-95, 2000 | 53 | 2000 |
Basic theorems about security J Jacob Journal of Computer Security 1 (3-4), 385-411, 1992 | 52 | 1992 |
Attacking authentication protocols J Clark, J Jacob High Integrity Systems 1, 465-474, 1996 | 46 | 1996 |
User behaviour based phishing websites detection X Dong, JA Clark, JL Jacob 2008 International Multiconference on Computer Science and Information …, 2008 | 41 | 2008 |
Defending the weakest link: phishing websites detection by analysing user behaviours X Dong, JA Clark, JL Jacob Telecommunication Systems 45, 215-226, 2010 | 40 | 2010 |
Modelling user-phishing interaction X Dong, JA Clark, J Jacob 2008 conference on human system interactions, 627-632, 2008 | 40 | 2008 |