University of Oxford Logo University of OxfordDepartment of Computer Science - Home
On Facebook
Facebook
Follow us on twitter
Twitter
Linked in
Linked in
Flickr
Flickr
Google plus
Google plus
Digg
Digg
Pinterest
Pinterest
Stumble Upon
Stumble Upon

Security: Publications

By dateBy titleBy typeBibtex

[1]

Privacy−Enhanced Bi−Directional Communication in the Smart Grid using Trusted Computing

Andrew J Paverd‚ Andrew P Martin and Ian Brown

In Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014). 2014.

[2]

Security and Privacy in Smart Grid Demand Response Systems

Andrew J Paverd‚ Andrew P Martin and Ian Brown

In Jorge Cuellar, editor, Smart Grid Security. Pages 1−15. Springer International Publishing. 2014.

[3]

Analysing the Security Properties of Object−Capability Patterns

Toby Murray

PhD Thesis University of Oxford. 2010.

[4]

Analysing the Information Flow Properties of Object−Capability Patterns

Toby Murray and Gavin Lowe

In Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009). Vol. 5983 of Lecture Notes in Computer Science. Pages 81−95. 2010.

[5]

On Refinement−Closed Security Properties and Nondeterministic Compositions

Toby Murray and Gavin Lowe

In Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08). Vol. 250 of Electronic Notes in Theoretical Computer Science. No. 2. Pages 49−68. 2009.

[6]

Analysing Object−Capability Security

Toby Murray

In Proceedings of the Joint Workshop on Foundations of Computer Security‚ Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS−ARSPA−WITS'08). 2008.

[7]

Separating two roles of hashing in one−way message authentication

L.H. Nguyen and A.W. Roscoe

In Proceedings of FCS−ARSPA−WITS. 2008.

(This version is extended by appendices not present in proceedings.)

[8]

Authenticating ad hoc networks by comparison of short digests

A. W. Roscoe and L. H. Nguyen

In Information and Computation. Vol. 206. Pages 250−271. 2008.

[9]

Non−Delegatable Authorities in Capability Systems

Toby Murray and Duncan Grove

In Journal of Computer Security. Vol. 16. No. 6. Pages 743−759. 2008.

[10]

Analysing TLS in the Strand Spaces Model

Allaa Kamil and Gavin Lowe

2008.

[11]

On the Specication and Analysis of Secure Transport Layers

Christopher Dilloway

PhD Thesis Oxford University Computing Laboratory. 2008.

[12]

Chaining Secure Channels (Technical Report)

Christopher Dilloway

2008.

[13]

Specifying Secure Transport Layers

Christopher Dilloway and Gavin Lowe

In 21st IEEE Computer Security Foundations Symposium (CSF 21). 2008.

[14]

On Information Flow and Refinement−Closure

Gavin Lowe

In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.

[15]

On the Specification of Secure Channels

Christopher Dilloway and Gavin Lowe

In Proceedings of the Workshop on Issues in the Theory of Security (WITS '07). 2007.

[16]

Authority Analysis for Least Privilege Environments

Toby Murray and Gavin Lowe

In Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS−ARSPA'07). 2007.

[17]

Derivation of Error Distribution in Least Squares Steganalysis

Andrew Ker

No. RR−06−03. Oxford University Computing Laboratory. July, 2006.