David Llewellyn-Jones

Affiliations:
  • Liverpool John Moores University, UK


According to our database1, David Llewellyn-Jones authored at least 61 papers between 2002 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Structuring communities for sharing human digital memories in a social P2P network.
Peer-to-Peer Netw. Appl., 2020

A community-based social P2P network for sharing human life digital memories.
Trans. Emerg. Telecommun. Technol., 2020

Deploying authentication in the wild: towards greater ecological validity in security usability studies.
J. Cybersecur., 2020

2018
Raven Authentication Service - Attacks and Countermeasures.
Proceedings of the Security Protocols XXVI, 2018

Intentionality and Agency in Security.
Proceedings of the Security Protocols XXVI, 2018

2016
Optimizing runtime performance of hybrid dynamically and statically typed languages for the .Net platform.
J. Syst. Softw., 2016

Explicit Delegation Using Configurable Cookies (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

Explicit Delegation Using Configurable Cookies.
Proceedings of the Security Protocols XXIV, 2016

Red Button and Yellow Button: Usable Security for Lost Security Tokens.
Proceedings of the Security Protocols XXIV, 2016

Secure proximity-based identity pairing using an untrusted signalling service.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks.
Secur. Commun. Networks, 2015

Visualdrives Forensic Tool.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

VICTour 1.1: Introducing Virtual Learning Environments and Gamification.
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015

A Cyber Security Ontology for BPMN-Security Extensions.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Creating human digital memories with the aid of pervasive mobile devices.
Pervasive Mob. Comput., 2014

The Big Data Obstacle of Lifelogging.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

A Heuristic Approach for Secure Service Composition Adaptation.
Proceedings of the Cyberpatterns, 2014

Extending AOP Principles for the Description of Network Security Patterns.
Proceedings of the Cyberpatterns, 2014

Dynamic Monitoring of Composed Services.
Proceedings of the Cyberpatterns, 2014

2013
Lightweight Sybil Attack Detection in MANETs.
IEEE Syst. J., 2013

Exploiting linked data to create rich human digital memories.
Comput. Commun., 2013

Event Driven Monitoring of Composite Services.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Secure rendering process in cloud computing.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

Creating human digital memories for a richer recall of life experiences.
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013

An event processing approach for threats monitoring of service compositions.
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013

Prototype for design-time secure and trustworthy service composition.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Efficient autonomous signature exchange on ubiquitous networks.
J. Netw. Comput. Appl., 2012

Applying dynamic separation of aspects to distributed systems security: A case study.
IET Softw., 2012

A framework for measuring security of services in ubiquitous computing environments.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Augmenting human digital memories with physiological data.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories.
Proceedings of IEEE International Conference on Communications, 2012

A Compose Language-Based Framework for Secure Service Composition.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Monitoring and measuring sedentary behaviour with the aid of human digital memories.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
A Social Network Discovery Model for Digital Forensics Investigations.
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011

The challenges of secure and trustworthy service composition in the Future Internet.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

Identity management in System-of-Systems Crisis Management situation.
Proceedings of the 6th International Conference on System of Systems Engineering, 2011

The effect of direct interactions on reputation based schemes in mobile ad hoc networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011

2010
Security in Wireless Sensor Networks.
Proceedings of the Handbook of Information and Communication Security, 2010

Guest Editorial.
J. Multim., 2010

Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010

System-of-systems boundary check in a public event scenario.
Proceedings of the 5th International Conference on System of Systems Engineering, 2010

Analysis of Digital Image Watermark Attacks.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010

2009
Towards viable computer systems: a set theory interpretation of ecological dependence within Beer's self-organizing viable system model.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009

Monitoring connectivity in wireless sensor networks.
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009

2008
FORWEB: file fingerprinting for automated network forensics investigations.
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008

Networked Appliances: Manipulation of 3D Multimedia Streams.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Networked Appliances for Home Healthcare and Lifestyle Management.
Proceedings of the Home Networking, 2007

On Securing MANET Routing Protocol Against Control Packet Dropping.
Proceedings of the IEEE International Conference on Pervasive Services, 2007

Bridging the Gap between Networked Appliances and Virtual Worlds.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Ambient Interfaces for Elderly People at Home.
Proceedings of the Ambient Intelligence in Everyday Life - Foreword by Emile Aarts, 2006

Digital Rights Management in Ubiquitous Computing.
IEEE Multim., 2006

2005
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Buffer Overrun Prevention Through Component Composition Analysis.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Designing for all in the house.
Proceedings of the CLIHC '05, 2005

An Knowledge Model for Self-regenerative Service Activations Adaptation Across Standards.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

A security framework for executables in a ubiquitous computing environment.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2002
On the Earth's surface energy exchange determination from ERS satellite ATSR data - heat exchange of coastal zones.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002


  Loading...