BibTeX records: Howard Chivers

download as .bib file

@article{DBLP:journals/di/Chivers18,
  author       = {Howard Chivers},
  title        = {Navigating the Windows Mail database},
  journal      = {Digit. Investig.},
  volume       = {26},
  pages        = {92--99},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.diin.2018.02.001},
  doi          = {10.1016/J.DIIN.2018.02.001},
  timestamp    = {Mon, 15 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/di/Chivers18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/RashidDCLMLP18,
  author       = {Awais Rashid and
                  George Danezis and
                  Howard Chivers and
                  Emil Lupu and
                  Andrew Martin and
                  Makayla Lewis and
                  Claudia Peersman},
  title        = {Scoping the Cyber Security Body of Knowledge},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {3},
  pages        = {96--102},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.2701150},
  doi          = {10.1109/MSP.2018.2701150},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/RashidDCLMLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/Chivers17,
  author       = {Howard Chivers},
  title        = {Optimising unicode regular expression evaluation with previews},
  journal      = {Softw. Pract. Exp.},
  volume       = {47},
  number       = {5},
  pages        = {669--688},
  year         = {2017},
  url          = {https://doi.org/10.1002/spe.2436},
  doi          = {10.1002/SPE.2436},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/Chivers17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijccbs/Chivers16,
  author       = {Howard Chivers},
  title        = {Control consistency as a management tool: the identification of systematic
                  security control weaknesses in air traffic management},
  journal      = {Int. J. Crit. Comput. Based Syst.},
  volume       = {6},
  number       = {3},
  pages        = {229--245},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJCCBS.2016.079079},
  doi          = {10.1504/IJCCBS.2016.079079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijccbs/Chivers16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/Chivers14,
  author       = {Howard Chivers},
  title        = {Private browsing: {A} window of forensic opportunity},
  journal      = {Digit. Investig.},
  volume       = {11},
  number       = {1},
  pages        = {20--29},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.diin.2013.11.002},
  doi          = {10.1016/J.DIIN.2013.11.002},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/Chivers14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ChiversCNSC13,
  author       = {Howard Chivers and
                  John A. Clark and
                  Philip Nobles and
                  Siraj A. Shaikh and
                  Hao Chen},
  title        = {Knowing who to watch: Identifying attackers whose actions are hidden
                  within false alarms and background noise},
  journal      = {Inf. Syst. Frontiers},
  volume       = {15},
  number       = {1},
  pages        = {17--34},
  year         = {2013},
  url          = {https://doi.org/10.1007/s10796-010-9268-7},
  doi          = {10.1007/S10796-010-9268-7},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/ChiversCNSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChiversH13,
  author       = {Howard Chivers and
                  John Hird},
  title        = {Security Blind Spots in the {ATM} Safety Culture},
  booktitle    = {2013 International Conference on Availability, Reliability and Security,
                  {ARES} 2013, Regensburg, Germany, September 2-6, 2013},
  pages        = {774--779},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ARES.2013.103},
  doi          = {10.1109/ARES.2013.103},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChiversH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/ChiversH11,
  author       = {Howard Chivers and
                  Christopher James Hargreaves},
  title        = {Forensic data recovery from the Windows Search Database},
  journal      = {Digit. Investig.},
  volume       = {7},
  number       = {3-4},
  pages        = {114--126},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.diin.2011.01.001},
  doi          = {10.1016/J.DIIN.2011.01.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/ChiversH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NoblesAC11,
  author       = {Philip Nobles and
                  Shahid Ali and
                  Howard Chivers},
  title        = {Improved Estimation of Trilateration Distances for Indoor Wireless
                  Intrusion Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {2},
  number       = {1},
  pages        = {93--102},
  year         = {2011},
  url          = {https://doi.org/10.22667/JOWUA.2011.03.31.093},
  doi          = {10.22667/JOWUA.2011.03.31.093},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NoblesAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ChenCSCN10,
  author       = {Hao Chen and
                  John A. Clark and
                  Siraj A. Shaikh and
                  Howard Chivers and
                  Philip Nobles},
  title        = {Optimising {IDS} Sensor Placement},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {315--320},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.92},
  doi          = {10.1109/ARES.2010.92},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ChenCSCN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/HargreavesC10,
  author       = {Christopher James Hargreaves and
                  Howard Chivers},
  editor       = {Bart De Decker and
                  Ingrid Schaum{\"{u}}ller{-}Bichl},
  title        = {Detecting Hidden Encrypted Volumes},
  booktitle    = {Communications and Multimedia Security, 11th {IFIP} {TC} 6/TC 11 International
                  Conference, {CMS} 2010, Linz, Austria, May 31 - June 2, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6109},
  pages        = {233--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13241-4\_21},
  doi          = {10.1007/978-3-642-13241-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/HargreavesC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChiversCC09,
  author       = {Howard Chivers and
                  John A. Clark and
                  Pau{-}Chen Cheng},
  title        = {Risk profiles and distributed risk assessment},
  journal      = {Comput. Secur.},
  volume       = {28},
  number       = {7},
  pages        = {521--535},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.cose.2009.04.005},
  doi          = {10.1016/J.COSE.2009.04.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChiversCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ChiversP09,
  author       = {Howard Chivers and
                  Richard F. Paige},
  title        = {XRound: {A} reversible template language and its application in model-based
                  security analysis},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {876--893},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.006},
  doi          = {10.1016/J.INFSOF.2008.05.006},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/ChiversP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis-spain/ChenCTSCN09,
  author       = {Hao Chen and
                  John A. Clark and
                  Juan E. Tapiador and
                  Siraj A. Shaikh and
                  Howard Chivers and
                  Philip Nobles},
  editor       = {{\'{A}}lvaro Herrero and
                  Paolo Gastaldo and
                  Rodolfo Zunino and
                  Emilio Corchado},
  title        = {A Multi-objective Optimisation Approach to {IDS} Sensor Placement},
  booktitle    = {Computational Intelligence in Security for Information Systems - CISIS'09,
                  2nd International Workshop, Burgos, Spain, 23-26 September 2009 Proceedings},
  series       = {Advances in Intelligent and Soft Computing},
  volume       = {63},
  pages        = {101--108},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04091-7\_13},
  doi          = {10.1007/978-3-642-04091-7\_13},
  timestamp    = {Fri, 12 Aug 2022 13:44:54 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis-spain/ChenCTSCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ShaikhCNCC09,
  author       = {Siraj A. Shaikh and
                  Howard Chivers and
                  Philip Nobles and
                  John A. Clark and
                  Hao Chen},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {A Deployment Value Model for Intrusion Detection Sensors},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {250--259},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_26},
  doi          = {10.1007/978-3-642-02617-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ShaikhCNCC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/di/HargreavesCT08,
  author       = {Christopher James Hargreaves and
                  Howard Chivers and
                  Dave Titheridge},
  title        = {Windows Vista and digital investigations},
  journal      = {Digit. Investig.},
  volume       = {5},
  number       = {1-2},
  pages        = {34--48},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.diin.2008.08.001},
  doi          = {10.1016/J.DIIN.2008.08.001},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/di/HargreavesCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/HargreavesC08,
  author       = {Christopher James Hargreaves and
                  Howard Chivers},
  title        = {Recovery of Encryption Keys from Memory Using a Linear Scan},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {1369--1376},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.109},
  doi          = {10.1109/ARES.2008.109},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/HargreavesC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/LaurensPBC07,
  author       = {Peter Laurens and
                  Richard F. Paige and
                  Phillip J. Brooke and
                  Howard Chivers},
  title        = {A Novel Approach to the Detection of Cheating in Multiplayer Online
                  Games},
  booktitle    = {12th International Conference on Engineering of Complex Computer Systems
                  {(ICECCS} 2007), 10-14 July 2007, Auckland, New Zealand},
  pages        = {97--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICECCS.2007.11},
  doi          = {10.1109/ICECCS.2007.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iceccs/LaurensPBC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Chivers06,
  author       = {Howard Robert Chivers},
  title        = {Security design analysis},
  school       = {University of York, {UK}},
  year         = {2006},
  url          = {http://etheses.whiterose.ac.uk/9885/},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Chivers06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChiversM06,
  author       = {Howard Chivers and
                  John A. McDermid},
  title        = {Refactoring service-based systems: how to avoid trusting a workflow
                  service},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {18},
  number       = {10},
  pages        = {1255--1275},
  year         = {2006},
  url          = {https://doi.org/10.1002/cpe.997},
  doi          = {10.1002/CPE.997},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChiversM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Chivers06,
  author       = {Howard Chivers},
  editor       = {Herbert Leitold and
                  Evangelos P. Markatos},
  title        = {Information Modeling for Automated Risk Analysis},
  booktitle    = {Communications and Multimedia Security, 10th {IFIP} {TC-6} {TC-11}
                  International Conference, {CMS} 2006, Heraklion, Crete, Greece, October
                  19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4237},
  pages        = {228--239},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11909033\_21},
  doi          = {10.1007/11909033\_21},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Chivers06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwe/GePPCB06,
  author       = {Xiaocheng Ge and
                  Richard F. Paige and
                  Fiona Polack and
                  Howard Chivers and
                  Phillip J. Brooke},
  editor       = {David Wolber and
                  Neil Calder and
                  Christopher H. Brooks and
                  Athula Ginige},
  title        = {Agile development of secure web applications},
  booktitle    = {Proceedings of the 6th International Conference on Web Engineering,
                  {ICWE} 2006, Palo Alto, California, USA, July 11-14, 2006},
  pages        = {305--312},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1145581.1145641},
  doi          = {10.1145/1145581.1145641},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwe/GePPCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/Chivers06,
  author       = {Howard Chivers},
  editor       = {John A. Clark and
                  Richard F. Paige and
                  Fiona Polack and
                  Phillip J. Brooke},
  title        = {Trust Without Identification},
  booktitle    = {Security in Pervasive Computing, Third International Conference, {SPC}
                  2006, York, UK, April 18-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3934},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734666\_1},
  doi          = {10.1007/11734666\_1},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/Chivers06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xpu/AydalPCB06,
  author       = {Emine Gokce Aydal and
                  Richard F. Paige and
                  Howard Chivers and
                  Phillip J. Brooke},
  editor       = {Pekka Abrahamsson and
                  Michele Marchesi and
                  Giancarlo Succi},
  title        = {Security Planning and Refactoring in Extreme Programming},
  booktitle    = {Extreme Programming and Agile Processes in Software Engineering, 7th
                  International Conference, {XP} 2006, Oulu, Finland, June 17-22, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4044},
  pages        = {154--163},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11774129\_16},
  doi          = {10.1007/11774129\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/xpu/AydalPCB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/ChiversM05,
  author       = {Howard Chivers and
                  Andrew P. Martin},
  title        = {Editorial},
  journal      = {Softw. Pract. Exp.},
  volume       = {35},
  number       = {9},
  pages        = {799--800},
  year         = {2005},
  url          = {https://doi.org/10.1002/spe.687},
  doi          = {10.1002/SPE.687},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/ChiversM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/spe/ChiversF05,
  author       = {Howard Chivers and
                  Martyn Fletcher},
  title        = {Applying Security Design Analysis to a service-based system},
  journal      = {Softw. Pract. Exp.},
  volume       = {35},
  number       = {9},
  pages        = {873--897},
  year         = {2005},
  url          = {https://doi.org/10.1002/spe.693},
  doi          = {10.1002/SPE.693},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/spe/ChiversF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecmdafa/ChiversP05,
  author       = {Howard Chivers and
                  Richard F. Paige},
  editor       = {Alan Hartman and
                  David Kreische},
  title        = {XRound: Bidirectional Transformations and Unifications Via a Reversible
                  Template Language},
  booktitle    = {Model Driven Architecture - Foundations and Applications, 1st European
                  Conference, {ECMDA-FA} 2005, Nuremberg, Germany, November 7-10, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3748},
  pages        = {205--219},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11581741\_16},
  doi          = {10.1007/11581741\_16},
  timestamp    = {Wed, 24 Jun 2020 12:15:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ecmdafa/ChiversP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ChiversJ05,
  author       = {Howard Chivers and
                  Jeremy Jacob},
  title        = {Specifying Information-Flow Controls},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {114--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.126},
  doi          = {10.1109/ICDCSW.2005.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ChiversJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/PaigeCMS05,
  author       = {Richard F. Paige and
                  Howard Chivers and
                  John A. McDermid and
                  Zo{\"{e}} R. Stephenson},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {High-integrity extreme programming},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {1518--1523},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1067019},
  doi          = {10.1145/1066677.1067019},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/PaigeCMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xpu/ChiversPG05,
  author       = {Howard Chivers and
                  Richard F. Paige and
                  Xiaocheng Ge},
  editor       = {Hubert Baumeister and
                  Michele Marchesi and
                  Mike Holcombe},
  title        = {Agile Security Using an Incremental Security Architecture},
  booktitle    = {Extreme Programming and Agile Processes in Software Engineering, 6th
                  International Conference, {XP} 2005, Sheffield, UK, June 18-23, 2005,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3556},
  pages        = {57--65},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11499053\_7},
  doi          = {10.1007/11499053\_7},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/xpu/ChiversPG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/ClarkSC05,
  author       = {John A. Clark and
                  Susan Stepney and
                  Howard Chivers},
  editor       = {John Derrick and
                  Eerke A. Boiten},
  title        = {Breaking the Model: Finalisation and a Taxonomy of Security Attacks},
  booktitle    = {Proceedings of the {REFINE} 2005 Workshop, {REFINE} 2005, Guildford,
                  UK, April 2005},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {137},
  number       = {2},
  pages        = {225--242},
  publisher    = {Elsevier},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.entcs.2005.04.033},
  doi          = {10.1016/J.ENTCS.2005.04.033},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/ClarkSC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChiversC04,
  author       = {Howard Chivers and
                  John A. Clark},
  title        = {Smart dust, friend or foe?--Replacing identity with configuration
                  trust},
  journal      = {Comput. Networks},
  volume       = {46},
  number       = {5},
  pages        = {723--740},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.comnet.2004.06.002},
  doi          = {10.1016/J.COMNET.2004.06.002},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChiversC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/Chivers04,
  author       = {Howard Chivers},
  editor       = {David Chadwick and
                  Bart Preneel},
  title        = {Personal Attributes and Privacy - How to ensure that private attribute
                  management is not subverted by datamining},
  booktitle    = {Communications and Multimedia Security - 8th {IFIP} {TC-6} {TC-11}
                  Conference on Communications and Multimedia Security, Sept. 15-18,
                  2004, Windermere, The Lake District, United Kingdom},
  series       = {{IFIP}},
  volume       = {175},
  pages        = {17--29},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-24486-7\_2},
  doi          = {10.1007/0-387-24486-7\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/Chivers04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/ChiversCS03,
  author       = {Howard Chivers and
                  John A. Clark and
                  Susan Stepney},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Smart Devices and Software Agents: The Basics of Good Behaviour},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {39--52},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_7},
  doi          = {10.1007/978-3-540-39881-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/ChiversCS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics