Security: Publications
Click here to download all publications in a single bibtex file
@inproceedings{Paverd2014a,
title = "Privacy-Enhanced Bi-Directional Communication in the Smart Grid using Trusted Computing",
author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian",
year = "2014",
booktitle = "Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014)",
url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7007758",
doi = "10.1109/SmartGridComm.2014.7007758",
}
@incollection{Paverd2014,
title = "Security and Privacy in Smart Grid Demand Response Systems",
author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian",
year = "2014",
booktitle = "Smart Grid Security",
editor = "Cuellar, Jorge",
isbn = "978-3-319-10328-0",
language = "English",
pages = "1-15",
publisher = "Springer International Publishing",
series = "Lecture Notes in Computer Science",
url = "http://link.springer.com/chapter/10.1007/978-3-319-10329-7_1",
doi = "10.1007/978-3-319-10329-7_1",
}
@inproceedings{murray10-infoflow,
title = "Analysing the Information Flow Properties of Object-Capability Patterns",
author = "Toby Murray and Gavin Lowe",
year = "2010",
booktitle = "Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009)",
pages = "81-95",
series = "Lecture Notes in Computer Science",
volume = "5983",
doi = "10.1007/978-3-642-12459-4_7",
}
@phdthesis{murray10dphil,
title = "Analysing the Security Properties of Object-Capability Patterns",
author = "Toby Murray",
year = "2010",
school = "University of Oxford",
}
@conference{murray09-avocs08,
title = "On Refinement-Closed Security Properties and Nondeterministic Compositions",
author = "Toby Murray and Gavin Lowe",
year = "2009",
booktitle = "Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08)",
number = "2",
pages = "49-68",
series = "Electronic Notes in Theoretical Computer Science",
volume = "250",
doi = "10.1016/j.entcs.2009.08.017",
}
@article{ShortDigests,
title = "Authenticating ad hoc networks by comparison of short digests",
author = "A. W. Roscoe and L. H. Nguyen",
year = "2008",
journal = "{Information and Computation}",
pages = "250-271",
url = "http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/120.pdf",
volume = "206",
}
@article{article/Murray08,
title = "Non-Delegatable Authorities in Capability Systems",
author = "Toby Murray and Duncan Grove",
year = "2008",
journal = "Journal of Computer Security",
number = "6",
pages = "743-759",
publisher = "IOS Press",
volume = "16",
doi = "10.3233/JCS-2008-0314",
}
@inproceedings{murray08-fcsarspawits,
title = "Analysing Object-Capability Security",
author = "Toby Murray",
year = "2008",
booktitle = "Proceedings of the Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08)",
}
@inproceedings{biro122,
title = "Separating two roles of hashing in one-way message authentication",
author = "L.H. Nguyen and A.W. Roscoe",
year = "2008",
booktitle = "Proceedings of FCS-ARSPA-WITS",
note = "(This version is extended by appendices not present in proceedings.)",
}
@conference{chris08csf,
title = "Specifying Secure Transport Layers",
author = "Christopher Dilloway and Gavin Lowe",
year = "2008",
booktitle = "21st IEEE Computer Security Foundations Symposium (CSF 21)",
}
@techreport{440,
title = "Analysing TLS in the Strand Spaces Model",
author = "Allaa Kamil and Gavin Lowe",
year = "2008",
}
@techreport{cdilloway08proxytr,
title = "Chaining Secure Channels (Technical Report)",
author = "Christopher Dilloway",
year = "2008",
}
@phdthesis{dilloway08thesis,
title = "On the Specication and Analysis of Secure Transport Layers",
author = "Christopher Dilloway",
year = "2008",
school = "Oxford University Computing Laboratory",
url = "http://web.comlab.ox.ac.uk/activities/security/papers/dilloway_thesis.pdf",
}
@inproceedings{inproc/Lowe2007,
title = "On Information Flow and Refinement-Closure",
author = "Gavin Lowe",
year = "2007",
booktitle = "{Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)}",
url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/NDC.pdf",
}
@conference{cdilloway2007spec,
title = "On the Specification of Secure Channels",
author = "Christopher Dilloway and Gavin Lowe",
year = "2007",
booktitle = "Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)",
}
@inproceedings{inproc/Murray2007,
title = "Authority Analysis for Least Privilege Environments",
author = "Toby Murray and Gavin Lowe",
year = "2007",
booktitle = "{Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07)}",
}
@techreport{RR-06-03,
title = "Derivation of Error Distribution in Least Squares Steganalysis",
author = "Andrew Ker",
year = "2006",
institution = "Oxford University Computing Laboratory",
month = "July",
number = "RR-06-03",
}