T. Paul Parker

According to our database1, T. Paul Parker authored at least 11 papers between 2006 and 2012.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2012
Enhancing Data Trustworthiness via Assured Digital Signing.
IEEE Trans. Dependable Secur. Comput., 2012

2011
Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data.
IEEE Trans. Inf. Forensics Secur., 2011

A Stochastic Model for Quantitative Security Analyses of Networked Systems.
IEEE Trans. Dependable Secur. Comput., 2011

2009
A probabilistic characterization of a fault-tolerant gossiping algorithm.
J. Syst. Sci. Complex., 2009

A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks.
Proceedings of the Trusted Systems, First International Conference, 2009

2008
Exploiting social networks for threshold signing: attack-resilience vs. availability.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Towards an analytic model of epidemic spreading in heterogeneous systems.
Proceedings of the 4th International ICST Conference on Heterogeneous Networking for Quality, 2007

A Stochastic Characterization of a Fault-Tolerant Gossip Algorithm.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

How to Secure Your Email Address Book and Beyond.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Towards Quantifying the (In)Security of Networked Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006


  Loading...