Allan Tomlinson

According to our database1, Allan Tomlinson authored at least 30 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Intrusion Detection in Robotic Swarms.
Proceedings of the Intelligent Systems and Applications, 2019

2018
Analysis Of Electronic Voting Schemes In The Real World.
Proceedings of the Social Transformation, 2018

Mutual Authentication in Electronic Voting Schemes.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
Time Pattern Analysis of Malware by Circular Statistics.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Security for Video Broadcasting.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Introduction to the TPM.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

2016
Review of Potential Attacks on Robotic Swarms.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

2015
Provenance-Based Attestation for Trustworthy Computing.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Causality-Based Model for Describing the Trustworthiness of a Computing Device.
Proceedings of the Trusted Systems - 7th International Conference, 2015

SMM Revolutions.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

SMM-Based Hypervisor Integrity Measurement.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Understanding threats in a cloud infrastructure with no hypervisor.
Proceedings of the 2013 World Congress on Internet Security, 2013

Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013

Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification.
Proceedings of the Trusted Systems - 5th International Conference, 2013

A Distinguishing Attack with a Neural Network.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

2011
Towards Privacy in a Context-Aware Social Network Based Recommendation System.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

2010
Privacy threats in a mobile enterprise social network.
Inf. Secur. Tech. Rep., 2010

Separating hypervisor trusted computing base supported by hardware.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

2009
Privacy and consent in pervasive networks.
Inf. Secur. Tech. Rep., 2009

Survey on Security Challenges for Swarm Robotics.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation.
Proceedings of the 2009 International Conference on Grid Computing & Applications, 2009

2008
Developments in mobile communications security.
Inf. Secur. Tech. Rep., 2008

Securing Grid Workflows with Trusted Computing.
Proceedings of the Computational Science, 2008

Securing Grid Workflows with Trusted Computing (Extended Abstract).
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

2007
Editorial.
Inf. Secur. Tech. Rep., 2007

2005
Designing & verifying secure protocols of the digital marketplace.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

Conditional Access in Mobile Systems: Securing the Application.
Proceedings of the 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 2005

2004
Regional Blackouts: Protection of Broadcast Content on 3G Networks.
IACR Cryptol. ePrint Arch., 2004

Application of Grid Security to Personal Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

1991
VLSI architectures for public key cryptology.
PhD thesis, 1991


  Loading...