default search action
Allan Tomlinson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c22]Ian Sargeant, Allan Tomlinson:
Intrusion Detection in Robotic Swarms. IntelliSys (2) 2019: 968-980 - 2018
- [c21]Voke Augoye, Allan Tomlinson:
Mutual Authentication in Electronic Voting Schemes. PST 2018: 1-2 - [c20]Voke Augoye, Allan Tomlinson:
Analysis Of Electronic Voting Schemes In The Real World. UKAIS 2018: 14 - 2017
- [c19]Liuxuan Pan, Allan Tomlinson, Alexey A. Koloydenko:
Time Pattern Analysis of Malware by Circular Statistics. ANCS 2017: 119-130 - [p2]Allan Tomlinson, Sheila Cobourne:
Security for Video Broadcasting. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 155-171 - [p1]Allan Tomlinson:
Introduction to the TPM. Smart Cards, Tokens, Security and Applications, 2nd Ed. 2017: 173-191 - 2016
- [c18]Ian Sargeant, Allan Tomlinson:
Review of Potential Attacks on Robotic Swarms. IntelliSys (2) 2016: 628-646 - 2015
- [c17]William Augusto Rodrigues de Souza, Allan Tomlinson:
SMM-Based Hypervisor Integrity Measurement. CSCloud 2015: 362-367 - [c16]William Augusto Rodrigues de Souza, Allan Tomlinson:
SMM Revolutions. HPCC/CSS/ICESS 2015: 1466-1472 - [c15]Jiun Yi Yap, Allan Tomlinson:
A Causality-Based Model for Describing the Trustworthiness of a Computing Device. INTRUST 2015: 130-149 - [c14]Jiun Yi Yap, Allan Tomlinson:
Provenance-Based Attestation for Trustworthy Computing. TrustCom/BigDataSE/ISPA (1) 2015: 630-637 - 2013
- [c13]William A. R. De Souza, Allan Tomlinson:
A Distinguishing Attack with a Neural Network. ICDM Workshops 2013: 154-161 - [c12]Jiun Yi Yap, Allan Tomlinson:
Para-Virtualizing the Trusted Platform Module: An Enterprise Framework Based on Version 2.0 Specification. INTRUST 2013: 1-16 - [c11]Jiun Yi Yap, Allan Tomlinson:
Threat Model of a Scenario Based on Trusted Platform Module 2.0 Specification. WASH 2013 - [c10]William A. R. De Souza, Allan Tomlinson:
Understanding threats in a cloud infrastructure with no hypervisor. WorldCIS 2013: 128-133 - 2012
- [e1]Chris J. Mitchell, Allan Tomlinson:
Trusted Systems, 4th International Conference, INTRUST 2012, London, UK, December 17-18, 2012. Proceedings. Lecture Notes in Computer Science 7711, Springer 2012, ISBN 978-3-642-35370-3 [contents] - 2011
- [c9]Po-Wah Yau, Allan Tomlinson:
Towards Privacy in a Context-Aware Social Network Based Recommendation System. SocialCom/PASSAT 2011: 862-865 - 2010
- [j4]Allan Tomlinson, Po-Wah Yau, John A. MacDonald:
Privacy threats in a mobile enterprise social network. Inf. Secur. Tech. Rep. 15(2): 57-66 (2010) - [c8]Carl Gebhardt, Chris I. Dalton, Allan Tomlinson:
Separating hypervisor trusted computing base supported by hardware. STC@CCS 2010: 79-84
2000 – 2009
- 2009
- [j3]Nazir A. Malik, Allan Tomlinson:
Privacy and consent in pervasive networks. Inf. Secur. Tech. Rep. 14(3): 138-142 (2009) - [c7]Po-Wah Yau, Allan Tomlinson:
Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation. GCA 2009: 113-119 - [c6]Fiona Higgins, Allan Tomlinson, Keith M. Martin:
Survey on Security Challenges for Swarm Robotics. ICAS 2009: 307-312 - 2008
- [j2]Allan Tomlinson:
Developments in mobile communications security. Inf. Secur. Tech. Rep. 13(3): 111 (2008) - [c5]Po-Wah Yau, Allan Tomlinson, Shane Balfe, Eimear Gallery:
Securing Grid Workflows with Trusted Computing (Extended Abstract). CCGRID 2008: 700 - [c4]Po-Wah Yau, Allan Tomlinson, Shane Balfe, Eimear Gallery:
Securing Grid Workflows with Trusted Computing. ICCS (3) 2008: 510-519 - 2007
- [j1]Allan Tomlinson:
Editorial. Inf. Secur. Tech. Rep. 12(3): 111-112 (2007) - 2005
- [c3]Eimear Gallery, Allan Tomlinson:
Conditional Access in Mobile Systems: Securing the Application. DFMA 2005: 190-197 - [c2]Swee Keow Goo, James M. Irvine, Allan Tomlinson, Scarlet Schwiderski-Grosche:
Designing & verifying secure protocols of the digital marketplace. ISWCS 2005: 86-90 - 2004
- [c1]Allan Tomlinson, Scarlet Schwiderski-Grosche:
Application of Grid Security to Personal Distributed Environments. OTM Workshops 2004: 68-78 - [i1]Alexander W. Dent, Allan Tomlinson:
Regional Blackouts: Protection of Broadcast Content on 3G Networks. IACR Cryptol. ePrint Arch. 2004: 169 (2004)
1990 – 1999
- 1991
- [b1]Allan Tomlinson:
VLSI architectures for public key cryptology. University of Edinburgh, UK, 1991
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint