Selwyn Russell

According to our database1, Selwyn Russell authored at least 18 papers between 1993 and 2006.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2006
Issues in Merging Internet Autonomous Systems for Emergency Communications.
Proceedings of the Intelligence and Security Informatics, 2006

2005
An Improved Execution Integrity Solution for Mobile Agents.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Theory and benefits of recursive certificate structures.
Int. J. Inf. Sec., 2004

Private Reputation Schemes for P2P systems.
Proceedings of the Security In Information Systems, 2004

An Efficient Off-Line Reputation Scheme Using Articulated Certificates.
Proceedings of the Security In Information Systems, 2004

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Recursive Certificate Structures for X.509 Systems.
Proceedings of the Public Key Infrastructure, 2004

Visually Sealed and Digitally Signed Documents.
Proceedings of the Computer Science 2004, 2004

2003
Virtual certificates and synthetic certificates: new paradigms for improving public key validation.
Comput. Commun., 2003

Security as a Safety Issue in Rail Communications.
Proceedings of the Safety Critical Systems and Software 2003, 2003

A Security Architecture for Reputation Systems.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

1999
Fast Checking of Individual Certificate Revocation on Small Systems.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
A security architecture for third generation wireless systems.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1995
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Audit-by-receiver paradigms for verification of authorization at source of electronic documents.
Comput. Secur., 1994

1993
Paradigms for verification of authorization at source of electronic documents in an integrated environment.
Comput. Secur., 1993

Planning for the EDI of Tomorrow Using Electronic Document Authorization.
Proceedings of the Computer Security, 1993

Transparent cosignatures for electronic documents.
Proceedings of the Ninth Annual Computer Security Applications Conference, 1993


  Loading...