Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Howard Chivers
@article{DBLP:journals/di/Chivers18, author = {Howard Chivers}, title = {Navigating the Windows Mail database}, journal = {Digit. Investig.}, volume = {26}, pages = {92--99}, year = {2018}, url = {https://doi.org/10.1016/j.diin.2018.02.001}, doi = {10.1016/J.DIIN.2018.02.001}, timestamp = {Mon, 15 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/di/Chivers18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/RashidDCLMLP18, author = {Awais Rashid and George Danezis and Howard Chivers and Emil Lupu and Andrew Martin and Makayla Lewis and Claudia Peersman}, title = {Scoping the Cyber Security Body of Knowledge}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {3}, pages = {96--102}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.2701150}, doi = {10.1109/MSP.2018.2701150}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/RashidDCLMLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/Chivers17, author = {Howard Chivers}, title = {Optimising unicode regular expression evaluation with previews}, journal = {Softw. Pract. Exp.}, volume = {47}, number = {5}, pages = {669--688}, year = {2017}, url = {https://doi.org/10.1002/spe.2436}, doi = {10.1002/SPE.2436}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/Chivers17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/Chivers16, author = {Howard Chivers}, title = {Control consistency as a management tool: the identification of systematic security control weaknesses in air traffic management}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {6}, number = {3}, pages = {229--245}, year = {2016}, url = {https://doi.org/10.1504/IJCCBS.2016.079079}, doi = {10.1504/IJCCBS.2016.079079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/Chivers16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/Chivers14, author = {Howard Chivers}, title = {Private browsing: {A} window of forensic opportunity}, journal = {Digit. Investig.}, volume = {11}, number = {1}, pages = {20--29}, year = {2014}, url = {https://doi.org/10.1016/j.diin.2013.11.002}, doi = {10.1016/J.DIIN.2013.11.002}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/Chivers14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ChiversCNSC13, author = {Howard Chivers and John A. Clark and Philip Nobles and Siraj A. Shaikh and Hao Chen}, title = {Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise}, journal = {Inf. Syst. Frontiers}, volume = {15}, number = {1}, pages = {17--34}, year = {2013}, url = {https://doi.org/10.1007/s10796-010-9268-7}, doi = {10.1007/S10796-010-9268-7}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/ChiversCNSC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChiversH13, author = {Howard Chivers and John Hird}, title = {Security Blind Spots in the {ATM} Safety Culture}, booktitle = {2013 International Conference on Availability, Reliability and Security, {ARES} 2013, Regensburg, Germany, September 2-6, 2013}, pages = {774--779}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ARES.2013.103}, doi = {10.1109/ARES.2013.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ChiversH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/ChiversH11, author = {Howard Chivers and Christopher James Hargreaves}, title = {Forensic data recovery from the Windows Search Database}, journal = {Digit. Investig.}, volume = {7}, number = {3-4}, pages = {114--126}, year = {2011}, url = {https://doi.org/10.1016/j.diin.2011.01.001}, doi = {10.1016/J.DIIN.2011.01.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/ChiversH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NoblesAC11, author = {Philip Nobles and Shahid Ali and Howard Chivers}, title = {Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {1}, pages = {93--102}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.03.31.093}, doi = {10.22667/JOWUA.2011.03.31.093}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NoblesAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ChenCSCN10, author = {Hao Chen and John A. Clark and Siraj A. Shaikh and Howard Chivers and Philip Nobles}, title = {Optimising {IDS} Sensor Placement}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {315--320}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.92}, doi = {10.1109/ARES.2010.92}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/ChenCSCN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/HargreavesC10, author = {Christopher James Hargreaves and Howard Chivers}, editor = {Bart De Decker and Ingrid Schaum{\"{u}}ller{-}Bichl}, title = {Detecting Hidden Encrypted Volumes}, booktitle = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6109}, pages = {233--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13241-4\_21}, doi = {10.1007/978-3-642-13241-4\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/HargreavesC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChiversCC09, author = {Howard Chivers and John A. Clark and Pau{-}Chen Cheng}, title = {Risk profiles and distributed risk assessment}, journal = {Comput. Secur.}, volume = {28}, number = {7}, pages = {521--535}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.04.005}, doi = {10.1016/J.COSE.2009.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChiversCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ChiversP09, author = {Howard Chivers and Richard F. Paige}, title = {XRound: {A} reversible template language and its application in model-based security analysis}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {876--893}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.006}, doi = {10.1016/J.INFSOF.2008.05.006}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/ChiversP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis-spain/ChenCTSCN09, author = {Hao Chen and John A. Clark and Juan E. Tapiador and Siraj A. Shaikh and Howard Chivers and Philip Nobles}, editor = {{\'{A}}lvaro Herrero and Paolo Gastaldo and Rodolfo Zunino and Emilio Corchado}, title = {A Multi-objective Optimisation Approach to {IDS} Sensor Placement}, booktitle = {Computational Intelligence in Security for Information Systems - CISIS'09, 2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings}, series = {Advances in Intelligent and Soft Computing}, volume = {63}, pages = {101--108}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04091-7\_13}, doi = {10.1007/978-3-642-04091-7\_13}, timestamp = {Fri, 12 Aug 2022 13:44:54 +0200}, biburl = {https://dblp.org/rec/conf/cisis-spain/ChenCTSCN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ShaikhCNCC09, author = {Siraj A. Shaikh and Howard Chivers and Philip Nobles and John A. Clark and Hao Chen}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {A Deployment Value Model for Intrusion Detection Sensors}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {250--259}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_26}, doi = {10.1007/978-3-642-02617-1\_26}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ShaikhCNCC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/di/HargreavesCT08, author = {Christopher James Hargreaves and Howard Chivers and Dave Titheridge}, title = {Windows Vista and digital investigations}, journal = {Digit. Investig.}, volume = {5}, number = {1-2}, pages = {34--48}, year = {2008}, url = {https://doi.org/10.1016/j.diin.2008.08.001}, doi = {10.1016/J.DIIN.2008.08.001}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/di/HargreavesCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/HargreavesC08, author = {Christopher James Hargreaves and Howard Chivers}, title = {Recovery of Encryption Keys from Memory Using a Linear Scan}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {1369--1376}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.109}, doi = {10.1109/ARES.2008.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/HargreavesC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/LaurensPBC07, author = {Peter Laurens and Richard F. Paige and Phillip J. Brooke and Howard Chivers}, title = {A Novel Approach to the Detection of Cheating in Multiplayer Online Games}, booktitle = {12th International Conference on Engineering of Complex Computer Systems {(ICECCS} 2007), 10-14 July 2007, Auckland, New Zealand}, pages = {97--106}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICECCS.2007.11}, doi = {10.1109/ICECCS.2007.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iceccs/LaurensPBC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Chivers06, author = {Howard Robert Chivers}, title = {Security design analysis}, school = {University of York, {UK}}, year = {2006}, url = {http://etheses.whiterose.ac.uk/9885/}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Chivers06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChiversM06, author = {Howard Chivers and John A. McDermid}, title = {Refactoring service-based systems: how to avoid trusting a workflow service}, journal = {Concurr. Comput. Pract. Exp.}, volume = {18}, number = {10}, pages = {1255--1275}, year = {2006}, url = {https://doi.org/10.1002/cpe.997}, doi = {10.1002/CPE.997}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChiversM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Chivers06, author = {Howard Chivers}, editor = {Herbert Leitold and Evangelos P. Markatos}, title = {Information Modeling for Automated Risk Analysis}, booktitle = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11} International Conference, {CMS} 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4237}, pages = {228--239}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11909033\_21}, doi = {10.1007/11909033\_21}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cms/Chivers06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwe/GePPCB06, author = {Xiaocheng Ge and Richard F. Paige and Fiona Polack and Howard Chivers and Phillip J. Brooke}, editor = {David Wolber and Neil Calder and Christopher H. Brooks and Athula Ginige}, title = {Agile development of secure web applications}, booktitle = {Proceedings of the 6th International Conference on Web Engineering, {ICWE} 2006, Palo Alto, California, USA, July 11-14, 2006}, pages = {305--312}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1145581.1145641}, doi = {10.1145/1145581.1145641}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwe/GePPCB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/Chivers06, author = {Howard Chivers}, editor = {John A. Clark and Richard F. Paige and Fiona Polack and Phillip J. Brooke}, title = {Trust Without Identification}, booktitle = {Security in Pervasive Computing, Third International Conference, {SPC} 2006, York, UK, April 18-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3934}, pages = {1--2}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734666\_1}, doi = {10.1007/11734666\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/Chivers06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xpu/AydalPCB06, author = {Emine Gokce Aydal and Richard F. Paige and Howard Chivers and Phillip J. Brooke}, editor = {Pekka Abrahamsson and Michele Marchesi and Giancarlo Succi}, title = {Security Planning and Refactoring in Extreme Programming}, booktitle = {Extreme Programming and Agile Processes in Software Engineering, 7th International Conference, {XP} 2006, Oulu, Finland, June 17-22, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4044}, pages = {154--163}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11774129\_16}, doi = {10.1007/11774129\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/xpu/AydalPCB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/ChiversM05, author = {Howard Chivers and Andrew P. Martin}, title = {Editorial}, journal = {Softw. Pract. Exp.}, volume = {35}, number = {9}, pages = {799--800}, year = {2005}, url = {https://doi.org/10.1002/spe.687}, doi = {10.1002/SPE.687}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/ChiversM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/ChiversF05, author = {Howard Chivers and Martyn Fletcher}, title = {Applying Security Design Analysis to a service-based system}, journal = {Softw. Pract. Exp.}, volume = {35}, number = {9}, pages = {873--897}, year = {2005}, url = {https://doi.org/10.1002/spe.693}, doi = {10.1002/SPE.693}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/ChiversF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecmdafa/ChiversP05, author = {Howard Chivers and Richard F. Paige}, editor = {Alan Hartman and David Kreische}, title = {XRound: Bidirectional Transformations and Unifications Via a Reversible Template Language}, booktitle = {Model Driven Architecture - Foundations and Applications, 1st European Conference, {ECMDA-FA} 2005, Nuremberg, Germany, November 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3748}, pages = {205--219}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11581741\_16}, doi = {10.1007/11581741\_16}, timestamp = {Wed, 24 Jun 2020 12:15:03 +0200}, biburl = {https://dblp.org/rec/conf/ecmdafa/ChiversP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ChiversJ05, author = {Howard Chivers and Jeremy Jacob}, title = {Specifying Information-Flow Controls}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {114--120}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.126}, doi = {10.1109/ICDCSW.2005.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ChiversJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/PaigeCMS05, author = {Richard F. Paige and Howard Chivers and John A. McDermid and Zo{\"{e}} R. Stephenson}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {High-integrity extreme programming}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {1518--1523}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1067019}, doi = {10.1145/1066677.1067019}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/PaigeCMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xpu/ChiversPG05, author = {Howard Chivers and Richard F. Paige and Xiaocheng Ge}, editor = {Hubert Baumeister and Michele Marchesi and Mike Holcombe}, title = {Agile Security Using an Incremental Security Architecture}, booktitle = {Extreme Programming and Agile Processes in Software Engineering, 6th International Conference, {XP} 2005, Sheffield, UK, June 18-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3556}, pages = {57--65}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11499053\_7}, doi = {10.1007/11499053\_7}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/xpu/ChiversPG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/ClarkSC05, author = {John A. Clark and Susan Stepney and Howard Chivers}, editor = {John Derrick and Eerke A. Boiten}, title = {Breaking the Model: Finalisation and a Taxonomy of Security Attacks}, booktitle = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford, UK, April 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {137}, number = {2}, pages = {225--242}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.04.033}, doi = {10.1016/J.ENTCS.2005.04.033}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/ClarkSC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChiversC04, author = {Howard Chivers and John A. Clark}, title = {Smart dust, friend or foe?--Replacing identity with configuration trust}, journal = {Comput. Networks}, volume = {46}, number = {5}, pages = {723--740}, year = {2004}, url = {https://doi.org/10.1016/j.comnet.2004.06.002}, doi = {10.1016/J.COMNET.2004.06.002}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChiversC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/Chivers04, author = {Howard Chivers}, editor = {David Chadwick and Bart Preneel}, title = {Personal Attributes and Privacy - How to ensure that private attribute management is not subverted by datamining}, booktitle = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11} Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom}, series = {{IFIP}}, volume = {175}, pages = {17--29}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-24486-7\_2}, doi = {10.1007/0-387-24486-7\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cms/Chivers04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spc/ChiversCS03, author = {Howard Chivers and John A. Clark and Susan Stepney}, editor = {Dieter Hutter and G{\"{u}}nter M{\"{u}}ller and Werner Stephan and Markus Ullmann}, title = {Smart Devices and Software Agents: The Basics of Good Behaviour}, booktitle = {Security in Pervasive Computing, First International Conference, Boppard, Germany, March 12-14, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2802}, pages = {39--52}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39881-3\_7}, doi = {10.1007/978-3-540-39881-3\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spc/ChiversCS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.