default search action
BibTeX records: Jeremy L. Jacob
@inproceedings{DBLP:conf/sbmf/AbbaCJ21, author = {Abdulrazaq Abba and Ana Cavalcanti and Jeremy Jacob}, editor = {S{\'{e}}rgio Campos and Marius Minea}, title = {Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata}, booktitle = {Formal Methods: Foundations and Applications - 24th Brazilian Symposium, {SBMF} 2021, Virtual Event, December 6-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13130}, pages = {70--86}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92137-8\_5}, doi = {10.1007/978-3-030-92137-8\_5}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sbmf/AbbaCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2104-13434, author = {Abdulrazaq Abba and Ana Cavalcanti and Jeremy Jacob}, title = {Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata}, journal = {CoRR}, volume = {abs/2104.13434}, year = {2021}, url = {https://arxiv.org/abs/2104.13434}, eprinttype = {arXiv}, eprint = {2104.13434}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2104-13434.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AydinJ16, author = {Mustafa Aydin and Jeremy L. Jacob}, editor = {Joel Brynielsson and Fredrik Johansson}, title = {Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model}, booktitle = {2016 European Intelligence and Security Informatics Conference, {EISIC} 2016, Uppsala, Sweden, August 17-19, 2016}, pages = {45--51}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/EISIC.2016.016}, doi = {10.1109/EISIC.2016.016}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AydinJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eisic/AydinJ15, author = {Mustafa Aydin and Jeremy L. Jacob}, editor = {Joel Brynielsson and Moi Hoon Yap}, title = {Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems}, booktitle = {2015 European Intelligence and Security Informatics Conference, Manchester, United Kingdom, September 7-9, 2015}, pages = {53--60}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/EISIC.2015.11}, doi = {10.1109/EISIC.2015.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eisic/AydinJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/BanksJ14, author = {Michael J. Banks and Jeremy L. Jacob}, title = {On integrating confidentiality and functionality in a formal method}, journal = {Formal Aspects Comput.}, volume = {26}, number = {5}, pages = {963--992}, year = {2014}, url = {https://doi.org/10.1007/s00165-013-0285-4}, doi = {10.1007/S00165-013-0285-4}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/BanksJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/BoitenJ14, author = {Eerke A. Boiten and Jeremy Jacob}, editor = {Yamine A{\"{\i}}t Ameur and Klaus{-}Dieter Schewe}, title = {Sealed Containers in {Z}}, booktitle = {Abstract State Machines, Alloy, B, TLA, VDM, and {Z} - 4th International Conference, {ABZ} 2014, Toulouse, France, June 2-6, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8477}, pages = {136--141}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43652-3\_12}, doi = {10.1007/978-3-662-43652-3\_12}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/asm/BoitenJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/closer/AydinJ14, author = {Mustafa Aydin and Jeremy Jacob}, editor = {Markus Helfert and Fr{\'{e}}d{\'{e}}ric Desprez and Donald Ferguson and Frank Leymann and V{\'{\i}}ctor M{\'{e}}ndez Mu{\~{n}}oz}, title = {Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors}, booktitle = {{CLOSER} 2014 - Proceedings of the 4th International Conference on Cloud Computing and Services Science, Barcelona, Spain, April 3-5, 2014}, pages = {604--609}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0004958006040609}, doi = {10.5220/0004958006040609}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/closer/AydinJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/AydinJ13, author = {Mustafa Aydin and Jeremy Jacob}, title = {A comparison of major issues for the development of forensics in cloud computing}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {77--82}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750166}, doi = {10.1109/ICITST.2013.6750166}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/icitst/AydinJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/BanksJ11, author = {Michael J. Banks and Jeremy L. Jacob}, editor = {Michael J. Butler and Wolfram Schulte}, title = {Specifying Confidentiality in Circus}, booktitle = {{FM} 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6664}, pages = {215--230}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21437-0\_18}, doi = {10.1007/978-3-642-21437-0\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/fm/BanksJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/DongCJ10, author = {Xun Dong and John A. Clark and Jeremy L. Jacob}, title = {Defending the weakest link: phishing websites detection by analysing user behaviours}, journal = {Telecommun. Syst.}, volume = {45}, number = {2-3}, pages = {215--226}, year = {2010}, url = {https://doi.org/10.1007/s11235-009-9247-9}, doi = {10.1007/S11235-009-9247-9}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/DongCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asm/Jacob10, author = {Jeremy L. Jacob}, editor = {Marc Frappier and Uwe Gl{\"{a}}sser and Sarfraz Khurshid and R{\'{e}}gine Laleau and Steve Reeves}, title = {Trace Specifications in Alloy}, booktitle = {Abstract State Machines, Alloy, {B} and Z, Second International Conference, {ABZ} 2010, Orford, QC, Canada, February 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5977}, pages = {105--117}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11811-1\_9}, doi = {10.1007/978-3-642-11811-1\_9}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/asm/Jacob10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/utp/BanksJ10, author = {Michael J. Banks and Jeremy L. Jacob}, editor = {Shengchao Qin}, title = {On Modelling User Observations in the {UTP}}, booktitle = {Unifying Theories of Programming - Third International Symposium, {UTP} 2010, Shanghai, China, November 15-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6445}, pages = {101--119}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16690-7\_4}, doi = {10.1007/978-3-642-16690-7\_4}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/utp/BanksJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/utp/BanksJ10a, author = {Michael J. Banks and Jeremy L. Jacob}, editor = {Shengchao Qin}, title = {Unifying Theories of Confidentiality}, booktitle = {Unifying Theories of Programming - Third International Symposium, {UTP} 2010, Shanghai, China, November 15-16, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6445}, pages = {120--136}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16690-7\_5}, doi = {10.1007/978-3-642-16690-7\_5}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/utp/BanksJ10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/WoodcockSCCJ08, author = {Jim Woodcock and Susan Stepney and David Cooper and John A. Clark and Jeremy Jacob}, title = {The certification of the Mondex electronic purse to {ITSEC} Level {E6}}, journal = {Formal Aspects Comput.}, volume = {20}, number = {1}, pages = {5--19}, year = {2008}, url = {https://doi.org/10.1007/s00165-007-0060-5}, doi = {10.1007/S00165-007-0060-5}, timestamp = {Fri, 17 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fac/WoodcockSCCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/WhiteCJP08, author = {David Robert White and John A. Clark and Jeremy Jacob and Simon M. Poulding}, editor = {Conor Ryan and Maarten Keijzer}, title = {Searching for resource-efficient programs: low-power pseudorandom number generators}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008}, pages = {1775--1782}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1389095.1389437}, doi = {10.1145/1389095.1389437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/WhiteCJP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/DongCJ08, author = {Xun Dong and John A. Clark and Jeremy L. Jacob}, editor = {Liqun Chen and Mark Dermot Ryan and Guilin Wang}, title = {Threat Modelling in User Performed Authentication}, booktitle = {Information and Communications Security, 10th International Conference, {ICICS} 2008, Birmingham, UK, October 20-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5308}, pages = {49--64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88625-9\_4}, doi = {10.1007/978-3-540-88625-9\_4}, timestamp = {Sun, 22 Jan 2023 01:36:25 +0100}, biburl = {https://dblp.org/rec/conf/icics/DongCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imcsit/DongCJ08, author = {Xun Dong and John A. Clark and Jeremy L. Jacob}, title = {User behaviour based phishing websites detection}, booktitle = {Proceedings of the International Multiconference on Computer Science and Information Technology, {IMCSIT} 2008, Wisla, Poland, 20-22 October 2008}, pages = {783--790}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/IMCSIT.2008.4747332}, doi = {10.1109/IMCSIT.2008.4747332}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imcsit/DongCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/BrookePJ07, author = {Phillip J. Brooke and Richard F. Paige and Jeremy L. Jacob}, title = {A {CSP} model of Eiffel's {SCOOP}}, journal = {Formal Aspects Comput.}, volume = {19}, number = {4}, pages = {487--512}, year = {2007}, url = {https://doi.org/10.1007/s00165-007-0033-8}, doi = {10.1007/S00165-007-0033-8}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/BrookePJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scp/UdzirWJ07, author = {Nur Izura Udzir and Alan M. Wood and Jeremy L. Jacob}, title = {Coordination with multicapabilities}, journal = {Sci. Comput. Program.}, volume = {64}, number = {2}, pages = {205--222}, year = {2007}, url = {https://doi.org/10.1016/j.scico.2006.06.005}, doi = {10.1016/J.SCICO.2006.06.005}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scp/UdzirWJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ChenCJ06, author = {Hao Chen and John A. Clark and Jeremy Jacob}, editor = {Mike Cattolico}, title = {Human competitive security protocols synthesis}, booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2006, Proceedings, Seattle, Washington, USA, July 8-12, 2006}, pages = {1855--1856}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1143997.1144297}, doi = {10.1145/1143997.1144297}, timestamp = {Wed, 27 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gecco/ChenCJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/ClarkJS05, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, title = {The Design of S-Boxes by Simulated Annealing}, journal = {New Gener. Comput.}, volume = {23}, number = {3}, pages = {219--231}, year = {2005}, url = {https://doi.org/10.1007/BF03037656}, doi = {10.1007/BF03037656}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/ClarkJS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coordination/UdzirWJ05, author = {Nur Izura Udzir and Alan M. Wood and Jeremy L. Jacob}, editor = {Jean{-}Marie Jacquet and Gian Pietro Picco}, title = {Coordination with Multicapabilities}, booktitle = {Coordination Models and Languages, 7th International Conference, {COORDINATION} 2005, Namur, Belgium, April 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3454}, pages = {79--93}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11417019\_6}, doi = {10.1007/11417019\_6}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/coordination/UdzirWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ChiversJ05, author = {Howard Chivers and Jeremy Jacob}, title = {Specifying Information-Flow Controls}, booktitle = {25th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}}, pages = {114--120}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDCSW.2005.126}, doi = {10.1109/ICDCSW.2005.126}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ChiversJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/ClarkJMS04, author = {John A. Clark and Jeremy L. Jacob and Subhamoy Maitra and Pantelimon Stanica}, title = {Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {450--462}, year = {2004}, url = {https://doi.org/10.1111/j.0824-7935.2004.00245.x}, doi = {10.1111/J.0824-7935.2004.00245.X}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/ClarkJMS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ci/ChenCJ04, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, title = {Automated Design of Security Protocols}, journal = {Comput. Intell.}, volume = {20}, number = {3}, pages = {503--516}, year = {2004}, url = {https://doi.org/10.1111/j.0824-7935.2004.00249.x}, doi = {10.1111/J.0824-7935.2004.00249.X}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ci/ChenCJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkJS04, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, title = {Searching for cost functions}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2004, 19-23 June 2004, Portland, OR, {USA}}, pages = {1517--1524}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CEC.2004.1331076}, doi = {10.1109/CEC.2004.1331076}, timestamp = {Thu, 16 Dec 2021 13:58:46 +0100}, biburl = {https://dblp.org/rec/conf/cec/ClarkJS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkJS04a, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, title = {The design of s-boxes by simulated annealing}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2004, 19-23 June 2004, Portland, OR, {USA}}, pages = {1533--1537}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CEC.2004.1331078}, doi = {10.1109/CEC.2004.1331078}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cec/ClarkJS04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/HaoCJ05, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, editor = {Alessandro Armando and Luca Vigan{\`{o}}}, title = {Synthesising Efficient and Effective Security Protocols}, booktitle = {Proceedings of the Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@IJCAR 2004, Cork, Ireland, July 4, 2004}, series = {Electronic Notes in Theoretical Computer Science}, volume = {125}, number = {1}, pages = {25--41}, publisher = {Elsevier}, year = {2004}, url = {https://doi.org/10.1016/j.entcs.2004.05.017}, doi = {10.1016/J.ENTCS.2004.05.017}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/entcs/HaoCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/ClarkJMS03, author = {John A. Clark and Jeremy L. Jacob and Subhamoy Maitra and Pantelimon Stanica}, title = {Almost Boolean functions: the design of Boolean functions by spectral inversion}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {2173--2180}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299941}, doi = {10.1109/CEC.2003.1299941}, timestamp = {Thu, 16 Dec 2021 11:43:24 +0100}, biburl = {https://dblp.org/rec/conf/cec/ClarkJMS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cec/0032CJ03, author = {Hao Chen and John A. Clark and Jeremy L. Jacob}, title = {Automated design of security protocols}, booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC} 2003, Canberra, Australia, December 8-12, 2003}, pages = {2181--2188}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/CEC.2003.1299942}, doi = {10.1109/CEC.2003.1299942}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cec/0032CJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/ClarkJS03, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney}, editor = {Erick Cant{\'{u}}{-}Paz and James A. Foster and Kalyanmoy Deb and Lawrence Davis and Rajkumar Roy and Una{-}May O'Reilly and Hans{-}Georg Beyer and Russell K. Standish and Graham Kendall and Stewart W. Wilson and Mark Harman and Joachim Wegener and Dipankar Dasgupta and Mitchell A. Potter and Alan C. Schultz and Kathryn A. Dowsland and Natasa Jonoska and Julian F. Miller}, title = {Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It}, booktitle = {Genetic and Evolutionary Computation - {GECCO} 2003, Genetic and Evolutionary Computation Conference, Chicago, IL, USA, July 12-16, 2003. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2724}, pages = {2022--2033}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45110-2\_100}, doi = {10.1007/3-540-45110-2\_100}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/gecco/ClarkJS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ClarkJ02, author = {John A. Clark and Jeremy L. Jacob}, editor = {Lars R. Knudsen}, title = {Fault Injection and a Timing Channel on an Analysis Technique}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {181--196}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_12}, doi = {10.1007/3-540-46035-7\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ClarkJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ClarkJSMM02, author = {John A. Clark and Jeremy L. Jacob and Susan Stepney and Subhamoy Maitra and William Millan}, editor = {Alfred Menezes and Palash Sarkar}, title = {Evolving Boolean Functions Satisfying Multiple Criteria}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {246--259}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_20}, doi = {10.1007/3-540-36231-2\_20}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ClarkJSMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ClarkJ01, author = {John A. Clark and Jeremy L. Jacob}, title = {Protocols are programs too: the meta-heuristic search for security protocols}, journal = {Inf. Softw. Technol.}, volume = {43}, number = {14}, pages = {891--904}, year = {2001}, url = {https://doi.org/10.1016/S0950-5849(01)00195-1}, doi = {10.1016/S0950-5849(01)00195-1}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/ClarkJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/netsec/FosterJ01, author = {Nathalie Foster and Jeremy Jacob}, editor = {Bart De Decker and Frank Piessens and Jan Smits and Els Van Herreweghen}, title = {Hazard Analysis for Security Protocol Requirements}, booktitle = {Advances in Network and Distributed Systems Security, {IFIP} {TC11} {WG11.4} First Annual Working Conference on Network Security, November 26-27, 2001, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {206}, pages = {75--92}, publisher = {Kluwer}, year = {2001}, url = {https://doi.org/10.1007/0-306-46958-8\_6}, doi = {10.1007/0-306-46958-8\_6}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/netsec/FosterJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchaadMJ01, author = {Andreas Schaad and Jonathan D. Moffett and Jeremy Jacob}, editor = {Ravi S. Sandhu and Trent Jaeger}, title = {The role-based access control system of a European bank: a case study and discussion}, booktitle = {6th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001}, pages = {3--9}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/373256.373257}, doi = {10.1145/373256.373257}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SchaadMJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ClarkJ00, author = {John A. Clark and Jeremy Jacob}, editor = {Ed Dawson and Andrew J. Clark and Colin Boyd}, title = {Two-Stage Optimisation in the Design of Boolean Functions}, booktitle = {Information Security and Privacy, 5th Australasian Conference, {ACISP} 2000, Brisbane, Australia, July 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1841}, pages = {242--254}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/10718964\_20}, doi = {10.1007/10718964\_20}, timestamp = {Sat, 19 Oct 2019 20:34:19 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ClarkJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coordination/JacobW00, author = {Jeremy L. Jacob and Alan M. Wood}, editor = {Ant{\'{o}}nio Porto and Gruia{-}Catalin Roman}, title = {A Principled Semantics for inp}, booktitle = {Coordination Languages and Models, 4th International Conference, {COORDINATION} 2000, Limassol, Cyprus, September 11-13, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1906}, pages = {51--65}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45263-X\_4}, doi = {10.1007/3-540-45263-X\_4}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/coordination/JacobW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ClarkJ00, author = {John A. Clark and Jeremy L. Jacob}, title = {Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {82--95}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848447}, doi = {10.1109/SECPRI.2000.848447}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/ClarkJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/ToynCMJ98, author = {Ian Toyn and David Michael Cattrall and John A. McDermid and Jeremy L. Jacob}, title = {A practical language and toolkit for high-integrity tools}, journal = {J. Syst. Softw.}, volume = {41}, number = {3}, pages = {161--173}, year = {1998}, url = {https://doi.org/10.1016/S0164-1212(97)10017-6}, doi = {10.1016/S0164-1212(97)10017-6}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/ToynCMJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ClarkJ95, author = {John A. Clark and Jeremy Jacob}, title = {On the Security of Recent Protocols}, journal = {Inf. Process. Lett.}, volume = {56}, number = {3}, pages = {151--155}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(95)00136-Z}, doi = {10.1016/0020-0190(95)00136-Z}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ClarkJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FoleyJ95, author = {Simon N. Foley and Jeremy Jacob}, title = {Specifying Security for Computer Supported Collaborative Working}, journal = {J. Comput. Secur.}, volume = {3}, number = {4}, pages = {233--254}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-3402}, doi = {10.3233/JCS-1994/1995-3402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FoleyJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/FoleyJ95, author = {Simon N. Foley and Jeremy Jacob}, title = {Specifying security for {CSCW} systems}, booktitle = {The Eighth {IEEE} Computer Security Foundations Workshop {(CSFW} '95), March 13-15, 1995, Kenmare, County Kerry, Ireland}, pages = {136}, publisher = {{IEEE} Computer Society}, year = {1995}, url = {https://doi.org/10.1109/CSFW.1995.518559}, doi = {10.1109/CSFW.1995.518559}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/FoleyJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Jacob92, author = {Jeremy Jacob}, title = {A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions}, journal = {Inf. Process. Lett.}, volume = {41}, number = {1}, pages = {9--12}, year = {1992}, url = {https://doi.org/10.1016/0020-0190(92)90073-5}, doi = {10.1016/0020-0190(92)90073-5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Jacob92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Jacob92, author = {Jeremy Jacob}, title = {Basic Theorems About Security}, journal = {J. Comput. Secur.}, volume = {1}, number = {3-4}, pages = {385--412}, year = {1992}, url = {https://doi.org/10.3233/JCS-1992-13-409}, doi = {10.3233/JCS-1992-13-409}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Jacob92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Jacob91, author = {Jeremy Jacob}, title = {A Uniform Presentation of Confidentiality Properties}, journal = {{IEEE} Trans. Software Eng.}, volume = {17}, number = {11}, pages = {1186--1194}, year = {1991}, url = {https://doi.org/10.1109/32.106973}, doi = {10.1109/32.106973}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Jacob91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Jacob91, author = {Jeremy Jacob}, title = {The Basic Integrity Theorem}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {89--97}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151573}, doi = {10.1109/CSFW.1991.151573}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Jacob91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Jacob90, author = {Jeremy Jacob}, title = {Separability and the Detection of Hidden Channels}, journal = {Inf. Process. Lett.}, volume = {34}, number = {1}, pages = {27--29}, year = {1990}, url = {https://doi.org/10.1016/0020-0190(90)90225-M}, doi = {10.1016/0020-0190(90)90225-M}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Jacob90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Jacob90a, author = {Jeremy Jacob}, title = {A Model of Reconfiguration in Communicating Sequential Processes}, journal = {Inf. Process. Lett.}, volume = {35}, number = {1}, pages = {19--22}, year = {1990}, url = {https://doi.org/10.1016/0020-0190(90)90168-W}, doi = {10.1016/0020-0190(90)90168-W}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Jacob90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Jacob90, author = {Jeremy Jacob}, title = {Categorizing non-interference}, booktitle = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings}, pages = {44--50}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/CSFW.1990.128184}, doi = {10.1109/CSFW.1990.128184}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Jacob90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Jacob89, author = {Jeremy Jacob}, title = {On the Derivation of Secure Components}, booktitle = {Proceedings of the 1989 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 1-3, 1989}, pages = {242--247}, publisher = {{IEEE} Computer Society}, year = {1989}, url = {https://doi.org/10.1109/SECPRI.1989.36298}, doi = {10.1109/SECPRI.1989.36298}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/Jacob89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Jacob88, author = {Jeremy Jacob}, title = {A Security Framework}, booktitle = {First {IEEE} Computer Security Foundations Workshop - CSFW'88, Franconia, New Hampshire, USA, June 12-15, 1988, Proceedings}, pages = {98--111}, publisher = {{MITRE} Corporation Press}, year = {1988}, timestamp = {Thu, 19 Sep 2013 16:43:13 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Jacob88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/Jacob88, author = {Jeremy Jacob}, title = {Security specifications}, booktitle = {Proceedings of the 1988 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, April 18-21, 1988}, pages = {14--23}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/SECPRI.1988.8094}, doi = {10.1109/SECPRI.1988.8094}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/Jacob88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.