BibTeX records: Jeremy L. Jacob

download as .bib file

@inproceedings{DBLP:conf/sbmf/AbbaCJ21,
  author       = {Abdulrazaq Abba and
                  Ana Cavalcanti and
                  Jeremy Jacob},
  editor       = {S{\'{e}}rgio Campos and
                  Marius Minea},
  title        = {Temporal Reasoning Through Automatic Translation of tock-CSP into
                  Timed Automata},
  booktitle    = {Formal Methods: Foundations and Applications - 24th Brazilian Symposium,
                  {SBMF} 2021, Virtual Event, December 6-10, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13130},
  pages        = {70--86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92137-8\_5},
  doi          = {10.1007/978-3-030-92137-8\_5},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sbmf/AbbaCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-13434,
  author       = {Abdulrazaq Abba and
                  Ana Cavalcanti and
                  Jeremy Jacob},
  title        = {Temporal Reasoning Through Automatic Translation of tock-CSP into
                  Timed Automata},
  journal      = {CoRR},
  volume       = {abs/2104.13434},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.13434},
  eprinttype    = {arXiv},
  eprint       = {2104.13434},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-13434.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AydinJ16,
  author       = {Mustafa Aydin and
                  Jeremy L. Jacob},
  editor       = {Joel Brynielsson and
                  Fredrik Johansson},
  title        = {Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying
                  Analysis Model},
  booktitle    = {2016 European Intelligence and Security Informatics Conference, {EISIC}
                  2016, Uppsala, Sweden, August 17-19, 2016},
  pages        = {45--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/EISIC.2016.016},
  doi          = {10.1109/EISIC.2016.016},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AydinJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisic/AydinJ15,
  author       = {Mustafa Aydin and
                  Jeremy L. Jacob},
  editor       = {Joel Brynielsson and
                  Moi Hoon Yap},
  title        = {Cloud-COVER: Using User Security Attribute Preferences and Propagation
                  Analysis to Prioritise Threats to Systems},
  booktitle    = {2015 European Intelligence and Security Informatics Conference, Manchester,
                  United Kingdom, September 7-9, 2015},
  pages        = {53--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EISIC.2015.11},
  doi          = {10.1109/EISIC.2015.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisic/AydinJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/BanksJ14,
  author       = {Michael J. Banks and
                  Jeremy L. Jacob},
  title        = {On integrating confidentiality and functionality in a formal method},
  journal      = {Formal Aspects Comput.},
  volume       = {26},
  number       = {5},
  pages        = {963--992},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00165-013-0285-4},
  doi          = {10.1007/S00165-013-0285-4},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/BanksJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/BoitenJ14,
  author       = {Eerke A. Boiten and
                  Jeremy Jacob},
  editor       = {Yamine A{\"{\i}}t Ameur and
                  Klaus{-}Dieter Schewe},
  title        = {Sealed Containers in {Z}},
  booktitle    = {Abstract State Machines, Alloy, B, TLA, VDM, and {Z} - 4th International
                  Conference, {ABZ} 2014, Toulouse, France, June 2-6, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8477},
  pages        = {136--141},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43652-3\_12},
  doi          = {10.1007/978-3-662-43652-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/asm/BoitenJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/closer/AydinJ14,
  author       = {Mustafa Aydin and
                  Jeremy Jacob},
  editor       = {Markus Helfert and
                  Fr{\'{e}}d{\'{e}}ric Desprez and
                  Donald Ferguson and
                  Frank Leymann and
                  V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz},
  title        = {Extending Hypervisor Architecture to Allow One Way Data Transfers
                  from VMs to Hypervisors},
  booktitle    = {{CLOSER} 2014 - Proceedings of the 4th International Conference on
                  Cloud Computing and Services Science, Barcelona, Spain, April 3-5,
                  2014},
  pages        = {604--609},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0004958006040609},
  doi          = {10.5220/0004958006040609},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/closer/AydinJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/AydinJ13,
  author       = {Mustafa Aydin and
                  Jeremy Jacob},
  title        = {A comparison of major issues for the development of forensics in cloud
                  computing},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {77--82},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750166},
  doi          = {10.1109/ICITST.2013.6750166},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/AydinJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/BanksJ11,
  author       = {Michael J. Banks and
                  Jeremy L. Jacob},
  editor       = {Michael J. Butler and
                  Wolfram Schulte},
  title        = {Specifying Confidentiality in Circus},
  booktitle    = {{FM} 2011: Formal Methods - 17th International Symposium on Formal
                  Methods, Limerick, Ireland, June 20-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6664},
  pages        = {215--230},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21437-0\_18},
  doi          = {10.1007/978-3-642-21437-0\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/BanksJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/DongCJ10,
  author       = {Xun Dong and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {Defending the weakest link: phishing websites detection by analysing
                  user behaviours},
  journal      = {Telecommun. Syst.},
  volume       = {45},
  number       = {2-3},
  pages        = {215--226},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11235-009-9247-9},
  doi          = {10.1007/S11235-009-9247-9},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/telsys/DongCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asm/Jacob10,
  author       = {Jeremy L. Jacob},
  editor       = {Marc Frappier and
                  Uwe Gl{\"{a}}sser and
                  Sarfraz Khurshid and
                  R{\'{e}}gine Laleau and
                  Steve Reeves},
  title        = {Trace Specifications in Alloy},
  booktitle    = {Abstract State Machines, Alloy, {B} and Z, Second International Conference,
                  {ABZ} 2010, Orford, QC, Canada, February 22-25, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5977},
  pages        = {105--117},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11811-1\_9},
  doi          = {10.1007/978-3-642-11811-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/asm/Jacob10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/utp/BanksJ10,
  author       = {Michael J. Banks and
                  Jeremy L. Jacob},
  editor       = {Shengchao Qin},
  title        = {On Modelling User Observations in the {UTP}},
  booktitle    = {Unifying Theories of Programming - Third International Symposium,
                  {UTP} 2010, Shanghai, China, November 15-16, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6445},
  pages        = {101--119},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16690-7\_4},
  doi          = {10.1007/978-3-642-16690-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/utp/BanksJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/utp/BanksJ10a,
  author       = {Michael J. Banks and
                  Jeremy L. Jacob},
  editor       = {Shengchao Qin},
  title        = {Unifying Theories of Confidentiality},
  booktitle    = {Unifying Theories of Programming - Third International Symposium,
                  {UTP} 2010, Shanghai, China, November 15-16, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6445},
  pages        = {120--136},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16690-7\_5},
  doi          = {10.1007/978-3-642-16690-7\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/utp/BanksJ10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/WoodcockSCCJ08,
  author       = {Jim Woodcock and
                  Susan Stepney and
                  David Cooper and
                  John A. Clark and
                  Jeremy Jacob},
  title        = {The certification of the Mondex electronic purse to {ITSEC} Level
                  {E6}},
  journal      = {Formal Aspects Comput.},
  volume       = {20},
  number       = {1},
  pages        = {5--19},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00165-007-0060-5},
  doi          = {10.1007/S00165-007-0060-5},
  timestamp    = {Fri, 17 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fac/WoodcockSCCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/WhiteCJP08,
  author       = {David Robert White and
                  John A. Clark and
                  Jeremy Jacob and
                  Simon M. Poulding},
  editor       = {Conor Ryan and
                  Maarten Keijzer},
  title        = {Searching for resource-efficient programs: low-power pseudorandom
                  number generators},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings,
                  Atlanta, GA, USA, July 12-16, 2008},
  pages        = {1775--1782},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1389095.1389437},
  doi          = {10.1145/1389095.1389437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/WhiteCJP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/DongCJ08,
  author       = {Xun Dong and
                  John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Liqun Chen and
                  Mark Dermot Ryan and
                  Guilin Wang},
  title        = {Threat Modelling in User Performed Authentication},
  booktitle    = {Information and Communications Security, 10th International Conference,
                  {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5308},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88625-9\_4},
  doi          = {10.1007/978-3-540-88625-9\_4},
  timestamp    = {Sun, 22 Jan 2023 01:36:25 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/DongCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imcsit/DongCJ08,
  author       = {Xun Dong and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {User behaviour based phishing websites detection},
  booktitle    = {Proceedings of the International Multiconference on Computer Science
                  and Information Technology, {IMCSIT} 2008, Wisla, Poland, 20-22 October
                  2008},
  pages        = {783--790},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/IMCSIT.2008.4747332},
  doi          = {10.1109/IMCSIT.2008.4747332},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/imcsit/DongCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/BrookePJ07,
  author       = {Phillip J. Brooke and
                  Richard F. Paige and
                  Jeremy L. Jacob},
  title        = {A {CSP} model of Eiffel's {SCOOP}},
  journal      = {Formal Aspects Comput.},
  volume       = {19},
  number       = {4},
  pages        = {487--512},
  year         = {2007},
  url          = {https://doi.org/10.1007/s00165-007-0033-8},
  doi          = {10.1007/S00165-007-0033-8},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/BrookePJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/UdzirWJ07,
  author       = {Nur Izura Udzir and
                  Alan M. Wood and
                  Jeremy L. Jacob},
  title        = {Coordination with multicapabilities},
  journal      = {Sci. Comput. Program.},
  volume       = {64},
  number       = {2},
  pages        = {205--222},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.scico.2006.06.005},
  doi          = {10.1016/J.SCICO.2006.06.005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scp/UdzirWJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ChenCJ06,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy Jacob},
  editor       = {Mike Cattolico},
  title        = {Human competitive security protocols synthesis},
  booktitle    = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings,
                  Seattle, Washington, USA, July 8-12, 2006},
  pages        = {1855--1856},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1143997.1144297},
  doi          = {10.1145/1143997.1144297},
  timestamp    = {Wed, 27 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gecco/ChenCJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/ClarkJS05,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  title        = {The Design of S-Boxes by Simulated Annealing},
  journal      = {New Gener. Comput.},
  volume       = {23},
  number       = {3},
  pages        = {219--231},
  year         = {2005},
  url          = {https://doi.org/10.1007/BF03037656},
  doi          = {10.1007/BF03037656},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/ClarkJS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coordination/UdzirWJ05,
  author       = {Nur Izura Udzir and
                  Alan M. Wood and
                  Jeremy L. Jacob},
  editor       = {Jean{-}Marie Jacquet and
                  Gian Pietro Picco},
  title        = {Coordination with Multicapabilities},
  booktitle    = {Coordination Models and Languages, 7th International Conference, {COORDINATION}
                  2005, Namur, Belgium, April 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3454},
  pages        = {79--93},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11417019\_6},
  doi          = {10.1007/11417019\_6},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/coordination/UdzirWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ChiversJ05,
  author       = {Howard Chivers and
                  Jeremy Jacob},
  title        = {Specifying Information-Flow Controls},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {114--120},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.126},
  doi          = {10.1109/ICDCSW.2005.126},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ChiversJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/ClarkJMS04,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Subhamoy Maitra and
                  Pantelimon Stanica},
  title        = {Almost Boolean Functions: The Design of Boolean Functions by Spectral
                  Inversion},
  journal      = {Comput. Intell.},
  volume       = {20},
  number       = {3},
  pages        = {450--462},
  year         = {2004},
  url          = {https://doi.org/10.1111/j.0824-7935.2004.00245.x},
  doi          = {10.1111/J.0824-7935.2004.00245.X},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/ClarkJMS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/ChenCJ04,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {Automated Design of Security Protocols},
  journal      = {Comput. Intell.},
  volume       = {20},
  number       = {3},
  pages        = {503--516},
  year         = {2004},
  url          = {https://doi.org/10.1111/j.0824-7935.2004.00249.x},
  doi          = {10.1111/J.0824-7935.2004.00249.X},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/ChenCJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkJS04,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  title        = {Searching for cost functions},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2004, 19-23 June 2004, Portland, OR, {USA}},
  pages        = {1517--1524},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CEC.2004.1331076},
  doi          = {10.1109/CEC.2004.1331076},
  timestamp    = {Thu, 16 Dec 2021 13:58:46 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkJS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkJS04a,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  title        = {The design of s-boxes by simulated annealing},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2004, 19-23 June 2004, Portland, OR, {USA}},
  pages        = {1533--1537},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CEC.2004.1331078},
  doi          = {10.1109/CEC.2004.1331078},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkJS04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/HaoCJ05,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Alessandro Armando and
                  Luca Vigan{\`{o}}},
  title        = {Synthesising Efficient and Effective Security Protocols},
  booktitle    = {Proceedings of the Workshop on Automated Reasoning for Security Protocol
                  Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {125},
  number       = {1},
  pages        = {25--41},
  publisher    = {Elsevier},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.entcs.2004.05.017},
  doi          = {10.1016/J.ENTCS.2004.05.017},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/HaoCJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/ClarkJMS03,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Subhamoy Maitra and
                  Pantelimon Stanica},
  title        = {Almost Boolean functions: the design of Boolean functions by spectral
                  inversion},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2003, Canberra, Australia, December 8-12, 2003},
  pages        = {2173--2180},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CEC.2003.1299941},
  doi          = {10.1109/CEC.2003.1299941},
  timestamp    = {Thu, 16 Dec 2021 11:43:24 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/ClarkJMS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/0032CJ03,
  author       = {Hao Chen and
                  John A. Clark and
                  Jeremy L. Jacob},
  title        = {Automated design of security protocols},
  booktitle    = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
                  2003, Canberra, Australia, December 8-12, 2003},
  pages        = {2181--2188},
  publisher    = {{IEEE}},
  year         = {2003},
  url          = {https://doi.org/10.1109/CEC.2003.1299942},
  doi          = {10.1109/CEC.2003.1299942},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cec/0032CJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/ClarkJS03,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney},
  editor       = {Erick Cant{\'{u}}{-}Paz and
                  James A. Foster and
                  Kalyanmoy Deb and
                  Lawrence Davis and
                  Rajkumar Roy and
                  Una{-}May O'Reilly and
                  Hans{-}Georg Beyer and
                  Russell K. Standish and
                  Graham Kendall and
                  Stewart W. Wilson and
                  Mark Harman and
                  Joachim Wegener and
                  Dipankar Dasgupta and
                  Mitchell A. Potter and
                  Alan C. Schultz and
                  Kathryn A. Dowsland and
                  Natasa Jonoska and
                  Julian F. Miller},
  title        = {Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor,
                  and Why You Might Not Get Away with It},
  booktitle    = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary
                  Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2724},
  pages        = {2022--2033},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45110-2\_100},
  doi          = {10.1007/3-540-45110-2\_100},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/gecco/ClarkJS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ClarkJ02,
  author       = {John A. Clark and
                  Jeremy L. Jacob},
  editor       = {Lars R. Knudsen},
  title        = {Fault Injection and a Timing Channel on an Analysis Technique},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {181--196},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_12},
  doi          = {10.1007/3-540-46035-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ClarkJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ClarkJSMM02,
  author       = {John A. Clark and
                  Jeremy L. Jacob and
                  Susan Stepney and
                  Subhamoy Maitra and
                  William Millan},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Evolving Boolean Functions Satisfying Multiple Criteria},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {246--259},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_20},
  doi          = {10.1007/3-540-36231-2\_20},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ClarkJSMM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ClarkJ01,
  author       = {John A. Clark and
                  Jeremy L. Jacob},
  title        = {Protocols are programs too: the meta-heuristic search for security
                  protocols},
  journal      = {Inf. Softw. Technol.},
  volume       = {43},
  number       = {14},
  pages        = {891--904},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0950-5849(01)00195-1},
  doi          = {10.1016/S0950-5849(01)00195-1},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/ClarkJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/netsec/FosterJ01,
  author       = {Nathalie Foster and
                  Jeremy Jacob},
  editor       = {Bart De Decker and
                  Frank Piessens and
                  Jan Smits and
                  Els Van Herreweghen},
  title        = {Hazard Analysis for Security Protocol Requirements},
  booktitle    = {Advances in Network and Distributed Systems Security, {IFIP} {TC11}
                  {WG11.4} First Annual Working Conference on Network Security, November
                  26-27, 2001, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {206},
  pages        = {75--92},
  publisher    = {Kluwer},
  year         = {2001},
  url          = {https://doi.org/10.1007/0-306-46958-8\_6},
  doi          = {10.1007/0-306-46958-8\_6},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/netsec/FosterJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/SchaadMJ01,
  author       = {Andreas Schaad and
                  Jonathan D. Moffett and
                  Jeremy Jacob},
  editor       = {Ravi S. Sandhu and
                  Trent Jaeger},
  title        = {The role-based access control system of a European bank: a case study
                  and discussion},
  booktitle    = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001},
  pages        = {3--9},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/373256.373257},
  doi          = {10.1145/373256.373257},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/SchaadMJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ClarkJ00,
  author       = {John A. Clark and
                  Jeremy Jacob},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Two-Stage Optimisation in the Design of Boolean Functions},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {242--254},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_20},
  doi          = {10.1007/10718964\_20},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ClarkJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coordination/JacobW00,
  author       = {Jeremy L. Jacob and
                  Alan M. Wood},
  editor       = {Ant{\'{o}}nio Porto and
                  Gruia{-}Catalin Roman},
  title        = {A Principled Semantics for inp},
  booktitle    = {Coordination Languages and Models, 4th International Conference, {COORDINATION}
                  2000, Limassol, Cyprus, September 11-13, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1906},
  pages        = {51--65},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45263-X\_4},
  doi          = {10.1007/3-540-45263-X\_4},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/coordination/JacobW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ClarkJ00,
  author       = {John A. Clark and
                  Jeremy L. Jacob},
  title        = {Searching for a Solution: Engineering Tradeoffs and the Evolution
                  of Provably Secure Protocols},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {82--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848447},
  doi          = {10.1109/SECPRI.2000.848447},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ClarkJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/ToynCMJ98,
  author       = {Ian Toyn and
                  David Michael Cattrall and
                  John A. McDermid and
                  Jeremy L. Jacob},
  title        = {A practical language and toolkit for high-integrity tools},
  journal      = {J. Syst. Softw.},
  volume       = {41},
  number       = {3},
  pages        = {161--173},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0164-1212(97)10017-6},
  doi          = {10.1016/S0164-1212(97)10017-6},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/ToynCMJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ClarkJ95,
  author       = {John A. Clark and
                  Jeremy Jacob},
  title        = {On the Security of Recent Protocols},
  journal      = {Inf. Process. Lett.},
  volume       = {56},
  number       = {3},
  pages        = {151--155},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(95)00136-Z},
  doi          = {10.1016/0020-0190(95)00136-Z},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ClarkJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/FoleyJ95,
  author       = {Simon N. Foley and
                  Jeremy Jacob},
  title        = {Specifying Security for Computer Supported Collaborative Working},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {4},
  pages        = {233--254},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-3402},
  doi          = {10.3233/JCS-1994/1995-3402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/FoleyJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/FoleyJ95,
  author       = {Simon N. Foley and
                  Jeremy Jacob},
  title        = {Specifying security for {CSCW} systems},
  booktitle    = {The Eighth {IEEE} Computer Security Foundations Workshop {(CSFW} '95),
                  March 13-15, 1995, Kenmare, County Kerry, Ireland},
  pages        = {136},
  publisher    = {{IEEE} Computer Society},
  year         = {1995},
  url          = {https://doi.org/10.1109/CSFW.1995.518559},
  doi          = {10.1109/CSFW.1995.518559},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/FoleyJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Jacob92,
  author       = {Jeremy Jacob},
  title        = {A Model of Reconfiguration in Communicating Sequential Processes with
                  a Notion of Transactions},
  journal      = {Inf. Process. Lett.},
  volume       = {41},
  number       = {1},
  pages        = {9--12},
  year         = {1992},
  url          = {https://doi.org/10.1016/0020-0190(92)90073-5},
  doi          = {10.1016/0020-0190(92)90073-5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Jacob92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Jacob92,
  author       = {Jeremy Jacob},
  title        = {Basic Theorems About Security},
  journal      = {J. Comput. Secur.},
  volume       = {1},
  number       = {3-4},
  pages        = {385--412},
  year         = {1992},
  url          = {https://doi.org/10.3233/JCS-1992-13-409},
  doi          = {10.3233/JCS-1992-13-409},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Jacob92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Jacob91,
  author       = {Jeremy Jacob},
  title        = {A Uniform Presentation of Confidentiality Properties},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {17},
  number       = {11},
  pages        = {1186--1194},
  year         = {1991},
  url          = {https://doi.org/10.1109/32.106973},
  doi          = {10.1109/32.106973},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/Jacob91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Jacob91,
  author       = {Jeremy Jacob},
  title        = {The Basic Integrity Theorem},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {89--97},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151573},
  doi          = {10.1109/CSFW.1991.151573},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Jacob91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Jacob90,
  author       = {Jeremy Jacob},
  title        = {Separability and the Detection of Hidden Channels},
  journal      = {Inf. Process. Lett.},
  volume       = {34},
  number       = {1},
  pages        = {27--29},
  year         = {1990},
  url          = {https://doi.org/10.1016/0020-0190(90)90225-M},
  doi          = {10.1016/0020-0190(90)90225-M},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Jacob90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Jacob90a,
  author       = {Jeremy Jacob},
  title        = {A Model of Reconfiguration in Communicating Sequential Processes},
  journal      = {Inf. Process. Lett.},
  volume       = {35},
  number       = {1},
  pages        = {19--22},
  year         = {1990},
  url          = {https://doi.org/10.1016/0020-0190(90)90168-W},
  doi          = {10.1016/0020-0190(90)90168-W},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Jacob90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Jacob90,
  author       = {Jeremy Jacob},
  title        = {Categorizing non-interference},
  booktitle    = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia,
                  New Hampshire, USA, June 12-14, 1990, Proceedings},
  pages        = {44--50},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSFW.1990.128184},
  doi          = {10.1109/CSFW.1990.128184},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Jacob90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Jacob89,
  author       = {Jeremy Jacob},
  title        = {On the Derivation of Secure Components},
  booktitle    = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 1-3, 1989},
  pages        = {242--247},
  publisher    = {{IEEE} Computer Society},
  year         = {1989},
  url          = {https://doi.org/10.1109/SECPRI.1989.36298},
  doi          = {10.1109/SECPRI.1989.36298},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Jacob89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Jacob88,
  author       = {Jeremy Jacob},
  title        = {A Security Framework},
  booktitle    = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia,
                  New Hampshire, USA, June 12-15, 1988, Proceedings},
  pages        = {98--111},
  publisher    = {{MITRE} Corporation Press},
  year         = {1988},
  timestamp    = {Thu, 19 Sep 2013 16:43:13 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Jacob88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/Jacob88,
  author       = {Jeremy Jacob},
  title        = {Security specifications},
  booktitle    = {Proceedings of the 1988 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, April 18-21, 1988},
  pages        = {14--23},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/SECPRI.1988.8094},
  doi          = {10.1109/SECPRI.1988.8094},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/Jacob88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}