Allan Tomlinson

According to our database1, Allan Tomlinson authored at least 30 papers between 1991 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 




Intrusion Detection in Robotic Swarms.
Proceedings of the Intelligent Systems and Applications, 2019

Analysis Of Electronic Voting Schemes In The Real World.
Proceedings of the Social Transformation, 2018

Mutual Authentication in Electronic Voting Schemes.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Time Pattern Analysis of Malware by Circular Statistics.
Proceedings of the ACM/IEEE Symposium on Architectures for Networking and Communications Systems, 2017

Security for Video Broadcasting.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Introduction to the TPM.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

Review of Potential Attacks on Robotic Swarms.
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016, 2016

Provenance-Based Attestation for Trustworthy Computing.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Causality-Based Model for Describing the Trustworthiness of a Computing Device.
Proceedings of the Trusted Systems - 7th International Conference, 2015

SMM Revolutions.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

SMM-Based Hypervisor Integrity Measurement.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Understanding threats in a cloud infrastructure with no hypervisor.
Proceedings of the 2013 World Congress on Internet Security, 2013

Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification.
Proceedings of the Workshop on Web Applications and Secure Hardware (WASH'13), 2013

Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification.
Proceedings of the Trusted Systems - 5th International Conference, 2013

A Distinguishing Attack with a Neural Network.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

Towards Privacy in a Context-Aware Social Network Based Recommendation System.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Privacy threats in a mobile enterprise social network.
Inf. Secur. Tech. Rep., 2010

Separating hypervisor trusted computing base supported by hardware.
Proceedings of the fifth ACM workshop on Scalable trusted computing, 2010

Privacy and consent in pervasive networks.
Inf. Secur. Tech. Rep., 2009

Survey on Security Challenges for Swarm Robotics.
Proceedings of the Fifth International Conference on Autonomic and Autonomous Systems, 2009

Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation.
Proceedings of the 2009 International Conference on Grid Computing & Applications, 2009

Developments in mobile communications security.
Inf. Secur. Tech. Rep., 2008

Securing Grid Workflows with Trusted Computing.
Proceedings of the Computational Science, 2008

Securing Grid Workflows with Trusted Computing (Extended Abstract).
Proceedings of the 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 2008

Inf. Secur. Tech. Rep., 2007

Designing & verifying secure protocols of the digital marketplace.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

Conditional Access in Mobile Systems: Securing the Application.
Proceedings of the 1st International Conference on Distributed Frameworks for Multimedia Applications (DFMA 2005), 2005

Regional Blackouts: Protection of Broadcast Content on 3G Networks.
IACR Cryptol. ePrint Arch., 2004

Application of Grid Security to Personal Distributed Environments.
Proceedings of the On the Move to Meaningful Internet Systems 2004: OTM 2004 Workshops: OTM Confederated International Workshops and Posters, 2004

VLSI architectures for public key cryptology.
PhD thesis, 1991