关注
Jeremy Jacob
Jeremy Jacob
Lecturer in Computer Science, University of York
在 cs.york.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
A survey of authentication protocol literature: Version 1.0
JA Clark, JL Jacob
Citeseer, 1997
3321997
The role-based access control system of a European bank: a case study and discussion
A Schaad, J Moffett, J Jacob
Proceedings of the sixth ACM symposium on Access control models and …, 2001
2352001
A survey of authentication protocol literature
J Clark, J Jacob
2311997
The design of S-boxes by simulated annealing
JA Clark, JL Jacob, S Stepney
New Generation Computing 23, 219-231, 2005
2082005
Evolving Boolean functions satisfying multiple criteria
JA Clark, JL Jacob, S Stepney, S Maitra, W Millan
Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002
1182002
Almost Boolean functions: The design of Boolean functions by spectral inversion
JA Clark, JL Jacob, S Maitra, P Stănică
Computational intelligence 20 (3), 450-462, 2004
1132004
On the derivation of secure components
J Jacob
Proceedings. 1989 IEEE Symposium on Security and Privacy, 242-242, 1989
1101989
Two-stage optimisation in the design of Boolean functions
JA Clark, JL Jacob
Australasian conference on information security and privacy, 242-254, 2000
882000
Protocols are programs too: the meta-heuristic search for security protocols
JA Clark, JL Jacob
Information and Software Technology 43 (14), 891-904, 2001
862001
Security specifications
J Jacob
Proceedings. 1988 IEEE Symposium on Security and Privacy, 14-14, 1988
751988
The certification of the Mondex electronic purse to ITSEC Level E6
J Woodcock, S Stepney, D Cooper, J Clark, J Jacob
Formal Aspects of Computing 20, 5-19, 2008
662008
Searching for resource-efficient programs: Low-power pseudorandom number generators
DR White, J Clark, J Jacob, SM Poulding
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
642008
On the Security of Recent Protocols.
JA Clark, J Jacob
Inf. Process. Lett. 56 (3), 151-155, 1995
561995
A survey of authentication protocol literature, 1997
J Clark, J Jacob
54
Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
JA Clark, JL Jacob
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 82-95, 2000
532000
Basic theorems about security
J Jacob
Journal of Computer Security 1 (3-4), 385-411, 1992
521992
Attacking authentication protocols
J Clark, J Jacob
High Integrity Systems 1, 465-474, 1996
461996
User behaviour based phishing websites detection
X Dong, JA Clark, JL Jacob
2008 International Multiconference on Computer Science and Information …, 2008
412008
Defending the weakest link: phishing websites detection by analysing user behaviours
X Dong, JA Clark, JL Jacob
Telecommunication Systems 45, 215-226, 2010
402010
Modelling user-phishing interaction
X Dong, JA Clark, J Jacob
2008 conference on human system interactions, 627-632, 2008
402008
系统目前无法执行此操作,请稍后再试。
文章 1–20