Selwyn Russell
  According to our database1,
  Selwyn Russell
  authored at least 18 papers
  between 1993 and 2006.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2006
    Proceedings of the Intelligence and Security Informatics, 2006
    
  
  2005
    Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
    
  
  2004
Private Reputation Schemes for P2P systems.
  
    Proceedings of the Security In Information Systems, 2004
    
  
An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
  
    Proceedings of the Security In Information Systems, 2004
    
  
Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
    
  
    Proceedings of the Information and Communications Security, 6th International Conference, 2004
    
  
    Proceedings of the Public Key Infrastructure, 2004
    
  
    Proceedings of the Computer Science 2004, 2004
    
  
  2003
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
    
  
    Comput. Commun., 2003
    
  
    Proceedings of the Safety Critical Systems and Software 2003, 2003
    
  
    Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
    
  
  1999
    Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
    
  
  1998
A security architecture for third generation wireless systems.
  
    Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
    
  
  1995
    Proceedings of the Cryptography: Policy and Algorithms, 1995
    
  
  1994
Audit-by-receiver paradigms for verification of authorization at source of electronic documents.
    
  
    Comput. Secur., 1994
    
  
  1993
Paradigms for verification of authorization at source of electronic documents in an integrated environment.
    
  
    Comput. Secur., 1993
    
  
Planning for the EDI of Tomorrow Using Electronic Document Authorization.
  
    Proceedings of the Computer Security, 1993
    
  
    Proceedings of the Ninth Annual Computer Security Applications Conference, 1993