Michael Roe

According to our database1, Michael Roe authored at least 53 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Randomized Testing of RISC-V CPUs Using Direct Instruction Injection.
IEEE Des. Test, February, 2024

2022
Drivers and challenges of internet of things diffusion in smart stores: A field exploration.
CoRR, 2022

2020
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020


2019
CHERI Concentrate: Practical Compressed Capabilities.
IEEE Trans. Computers, 2019

CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019

CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018

2017

CHERI JNI: Sinking the Java Security Model into the C.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
Fast Protection-Domain Crossing in the CHERI Capability-System Architecture.
IEEE Micro, 2016

2015
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine.
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015

2014
The CHERI capability model: Revisiting RISC in an age of risk.
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014

2011
The Metaplace Security Model (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

The Metaplace Security Model.
Proceedings of the Security Protocols XIX, 2011

Production and raw material ordering management for a manufacturing supply chain with uncertainties.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

2010
Weighting the competitiveness factors for container ports under conflicting interests.
J. Oper. Res. Soc., 2010

Censorship of eBooks (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Censorship of eBooks (Extended Abstract).
Proceedings of the Security Protocols XVIII, 2010

Generating Channel Ids in Virtual World Operating Systems (Extended Abstract).
Proceedings of the Security Protocols XVIII, 2010

2009
Privacy-preserving 802.11 access-point discovery.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
Problems of Provenance for Digital Libraries (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Problems of Provenance for Digital Libraries.
Proceedings of the Security Protocols XVI, 2008

Chattering Laptops.
Proceedings of the Privacy Enhancing Technologies, 2008

2007
Reconciling Multiple IPsec and Firewall Policies (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Instructions to Reviewers.
Proceedings of the Security Protocols, 2007

Reconciling Multiple IPsec and Firewall Policies.
Proceedings of the Security Protocols, 2007

Securing network location awareness with authenticated DHCP.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

2006
Designing the mobile IPv6 security protocol.
Ann. des Télécommunications, 2006

Scanning electronic documents for personally identifiable information.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

2005
Non-repudiation and the Metaphysics of Presence.
Proceedings of the Security Protocols, 2005

Experiences with Host-to-Host IPsec.
Proceedings of the Security Protocols, 2005

Reducing Reauthentication Delay in Wireless Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

2003
Panel Session: Is Protocol Modelling Finished?
Proceedings of the Security Protocols, 2003

Secure Sessions from Weak Secrets.
Proceedings of the Security Protocols, 2003

2002
Securing IPv6 neighbor and router discovery.
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002

Security of Internet Location Management.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Child-proof authentication for MIPv6 (CAM).
Comput. Commun. Rev., 2001

Experiences of Mobile IP Security.
Proceedings of the Security Protocols, 2001

2000
Government Access to Keys - Panel Discussion.
Proceedings of the Security Protocols, 2000

Authentication and Naming (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
Performance of Protocols.
Proceedings of the Security Protocols, 1999

Digital Copy Protection Scheme Using Recording Medium Identifier.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
Certification and Delegation (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

1997
Cryptography and evidence
PhD thesis, 1997

The GCHQ Protocol and Its Problems.
Proceedings of the Advances in Cryptology, 1997

1996
A Case Study of Secure ATM Switch Booting.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

1994
Performance of Block Ciphers and Hash Functions - One Year Later.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

How to Reverse Engineer an EES Device.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

1993
Performance of Symmetric Ciphers and One-Way Hash Functions.
Proceedings of the Fast Software Encryption, 1993

1990
Integrating cryptography in the trusted computing base.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
Secure automated document delivery.
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989


  Loading...