Skip to main content

Security: Publications

Click here to download all publications in a single bibtex file

@inproceedings{Paverd2014a,
  title = "Privacy-Enhanced Bi-Directional Communication in the Smart Grid using Trusted Computing",
  author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian",
  year = "2014",
  booktitle = "Fifth IEEE International Conference on Smart Grid Communications (SmartGridComm 2014)",
  url = "http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=7007758",
  doi = "10.1109/SmartGridComm.2014.7007758",
}
@incollection{Paverd2014,
  title = "Security and Privacy in Smart Grid Demand Response Systems",
  author = "Paverd, Andrew J and Martin, Andrew P and Brown, Ian",
  year = "2014",
  booktitle = "Smart Grid Security",
  editor = "Cuellar, Jorge",
  isbn = "978-3-319-10328-0",
  language = "English",
  pages = "1-15",
  publisher = "Springer International Publishing",
  series = "Lecture Notes in Computer Science",
  url = "http://link.springer.com/chapter/10.1007/978-3-319-10329-7_1",
  doi = "10.1007/978-3-319-10329-7_1",
}
@inproceedings{murray10-infoflow,
  title = "Analysing the Information Flow Properties of Object-Capability Patterns",
  author = "Toby Murray and Gavin Lowe",
  year = "2010",
  booktitle = "Proceedings of the Sixth International Workshop on Formal Aspects of Security and Trust (FAST2009)",
  pages = "81-95",
  series = "Lecture Notes in Computer Science",
  volume = "5983",
  doi = "10.1007/978-3-642-12459-4_7",
}
@phdthesis{murray10dphil,
  title = "Analysing the Security Properties of Object-Capability Patterns",
  author = "Toby Murray",
  year = "2010",
  school = "University of Oxford",
}
@conference{murray09-avocs08,
  title = "On Refinement-Closed Security Properties and Nondeterministic Compositions",
  author = "Toby Murray and Gavin Lowe",
  year = "2009",
  booktitle = "Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems (AVoCS '08)",
  number = "2",
  pages = "49-68",
  series = "Electronic Notes in Theoretical Computer Science",
  volume = "250",
  doi = "10.1016/j.entcs.2009.08.017",
}
@article{ShortDigests,
  title = "Authenticating ad hoc networks by comparison of short digests",
  author = "A. W. Roscoe and L. H. Nguyen",
  year = "2008",
  journal = "{Information and Computation}",
  pages = "250-271",
  url = "http://web.comlab.ox.ac.uk/oucl/work/bill.roscoe/publications/120.pdf",
  volume = "206",
}
@article{article/Murray08,
  title = "Non-Delegatable Authorities in Capability Systems",
  author = "Toby Murray and Duncan Grove",
  year = "2008",
  journal = "Journal of Computer Security",
  number = "6",
  pages = "743-759",
  publisher = "IOS Press",
  volume = "16",
  doi = "10.3233/JCS-2008-0314",
}
@inproceedings{murray08-fcsarspawits,
  title = "Analysing Object-Capability Security",
  author = "Toby Murray",
  year = "2008",
  booktitle = "Proceedings of the Joint Workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security (FCS-ARSPA-WITS'08)",
}
@inproceedings{biro122,
  title = "Separating two roles of hashing in one-way message authentication",
  author = "L.H. Nguyen and A.W. Roscoe",
  year = "2008",
  booktitle = "Proceedings of FCS-ARSPA-WITS",
  note = "(This version is extended by appendices not present in proceedings.)",
}
@conference{chris08csf,
  title = "Specifying Secure Transport Layers",
  author = "Christopher Dilloway and Gavin Lowe",
  year = "2008",
  booktitle = "21st IEEE Computer Security Foundations Symposium (CSF 21)",
}
@techreport{440,
  title = "Analysing TLS in the Strand Spaces Model",
  author = "Allaa Kamil and Gavin Lowe",
  year = "2008",
}
@techreport{cdilloway08proxytr,
  title = "Chaining Secure Channels (Technical Report)",
  author = "Christopher Dilloway",
  year = "2008",
}
@phdthesis{dilloway08thesis,
  title = "On the Specication and Analysis of Secure Transport Layers",
  author = "Christopher Dilloway",
  year = "2008",
  school = "Oxford University Computing Laboratory",
  url = "http://web.comlab.ox.ac.uk/activities/security/papers/dilloway_thesis.pdf",
}
@inproceedings{inproc/Lowe2007,
  title = "On Information Flow and Refinement-Closure",
  author = "Gavin Lowe",
  year = "2007",
  booktitle = "{Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)}",
  url = "http://web.comlab.ox.ac.uk/oucl/work/gavin.lowe/Papers/NDC.pdf",
}
@conference{cdilloway2007spec,
  title = "On the Specification of Secure Channels",
  author = "Christopher Dilloway and Gavin Lowe",
  year = "2007",
  booktitle = "Proceedings of the Workshop on Issues in the Theory of Security (WITS '07)",
}
@inproceedings{inproc/Murray2007,
  title = "Authority Analysis for Least Privilege Environments",
  author = "Toby Murray and Gavin Lowe",
  year = "2007",
  booktitle = "{Proceedings of Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis (FCS-ARSPA'07)}",
}
@techreport{RR-06-03,
  title = "Derivation of Error Distribution in Least Squares Steganalysis",
  author = "Andrew Ker",
  year = "2006",
  institution = "Oxford University Computing Laboratory",
  month = "July",
  number = "RR-06-03",
}