Geraint Price

According to our database1, Geraint Price authored at least 21 papers between 1999 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
An adaptive threat model for security ceremonies.
Int. J. Inf. Sec., 2015

2013
An updated threat model for security ceremonies.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

2012
A Proposed Framework for Analysing Security Ceremonies.
Proceedings of the SECRYPT 2012, 2012

Understanding the Weaknesses of Human-Protocol Interaction.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
User-friendly and certificate-free grid security infrastructure.
Int. J. Inf. Sec., 2011

2008
The benefits and drawbacks of using electronic identities.
Inf. Secur. Tech. Rep., 2008

2006
Public Key Infrastructures: A research agenda.
J. Comput. Secur., 2006

Editorial for v.11 n.4 of the Information Security Technical Report: "Windows Security Revisited".
Inf. Secur. Tech. Rep., 2006

2005
Editorial: "The security perimeter".
Inf. Secur. Tech. Rep., 2005

PKI Challenges: An Industry Analysis.
Proceedings of the Applied Public Key Infrastructure, 2005

Interoperation Between a Conventional PKI and an ID-Based Infrastructure.
Proceedings of the Public Key Infrastructure, 2005

2003
Introduction.
Inf. Secur. Tech. Rep., 2003

A comparison between traditional public key infrastructures and identity-based cryptography.
Inf. Secur. Tech. Rep., 2003

Client v. Server Side Protocols, Interfaces and Storage (Discussion).
Proceedings of the Security Protocols, 2003

Client v. Server Side Protocols, Interfaces and Storage.
Proceedings of the Security Protocols, 2003

A General Attack Model on Hash-Based Client Puzzles.
Proceedings of the Cryptography and Coding, 2003

2001
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Thwarting Timing Attacks Using ATM Networks.
Proceedings of the Security Protocols, 2001

2000
Broadening the Scope of Fault Tolerance within Secure Services (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

Broadening the Scope of Fault Tolerance within Secure Services.
Proceedings of the Security Protocols, 2000

1999
The interaction between fault tolerance and security
PhD thesis, 1999


  Loading...