Jolyon Clulow

Affiliations:
  • University of Cambridge, UK


According to our database1, Jolyon Clulow authored at least 20 papers between 2003 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2008
Fast Exclusion of Errant Devices from Vehicular Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

2007
On the security of real-world devices.
PhD thesis, 2007

Robbing the Bank with a Theorem Prover - (Abstract).
Proceedings of the Security Protocols, 2007

Modeling Partial Attacks with Alloy.
Proceedings of the Security Protocols, 2007

Robbing the Bank with a Theorem Prover - (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

On the Security of the EMV Secure Messaging API (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

On the Security of the EMV Secure Messaging API (Extended Abstract).
Proceedings of the Security Protocols, 2007

Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks.
Proceedings of the New Approaches for Security, 2007

New Strategies for Revocation in Ad-Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
Suicide for the common good: a new strategy for credential revocation in self-organizing systems.
ACM SIGOPS Oper. Syst. Rev., 2006

Cryptographic Processors-A Survey.
Proc. IEEE, 2006

Integrity of intention (a theory of types for security APIs).
Inf. Secur. Tech. Rep., 2006

Cryptanalysis of the Secure Sessions from Weak Secrets Protocols.
Int. J. Netw. Secur., 2006

Phish and Chips.
Proceedings of the Security Protocols, 2006

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
Repairing the Bluetooth Pairing Protocol.
Proceedings of the Security Protocols, 2005

Compulsion Resistant Anonymous Communications.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
Extending Security Protocol Analysis: New Challenges.
Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, 2004

Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure).
Proceedings of the Cryptographic Algorithms and their Uses, 2004

2003
On the Security of PKCS#11.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003


  Loading...