default search action
James A. Malcolm
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j7]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks. IEEE J. Biomed. Health Informatics 20(3): 763-774 (2016) - 2015
- [c24]Chaminda Alocious, Hannan Xiao, Bruce Christianson, James A. Malcolm:
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots. CIT/IUCC/DASC/PICom 2015: 1853-1860 - [e16]Bruce Christianson, Petr Svenda, Vashek Matyás, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31 - April 2, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9379, Springer 2015, ISBN 978-3-319-26095-2 [contents] - 2014
- [j6]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
A Survey of Access Control Models in Wireless Sensor Networks. J. Sens. Actuator Networks 3(2): 150-180 (2014) - [c23]Htoo Aung Maw, Hannan Xiao, Bruce Christianson, James A. Malcolm:
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. Healthcom 2014: 130-135 - [e15]Bruce Christianson, James A. Malcolm:
Security Protocols XVIII - 18th International Workshop, Cambridge, UK, March 24-26, 2010, Revised Selected Papers. Lecture Notes in Computer Science 7061, Springer 2014, ISBN 978-3-662-45920-1 [contents] - [e14]Bruce Christianson, James A. Malcolm, Vashek Matyás, Petr Svenda, Frank Stajano, Jonathan Anderson:
Security Protocols XXII - 22nd International Workshop Cambridge, UK, March 19-21, 2014 Revised Selected Papers. Lecture Notes in Computer Science 8809, Springer 2014, ISBN 978-3-319-12399-8 [contents] - 2013
- [e13]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVII, 17th International Workshop, Cambridge, UK, April 1-3, 2009. Revised Selected Papers. Lecture Notes in Computer Science 7028, Springer 2013, ISBN 978-3-642-36212-5 [contents] - [e12]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson, Joseph Bonneau:
Security Protocols XXI - 21st International Workshop, Cambridge, UK, March 19-20, 2013, Revised Selected Papers. Lecture Notes in Computer Science 8263, Springer 2013, ISBN 978-3-642-41716-0 [contents] - 2012
- [c22]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Trustworthiness and authentication in ubiquitous computing. MOBIWAC 2012: 135-138 - [e11]Bruce Christianson, James A. Malcolm, Frank Stajano, Jonathan Anderson:
Security Protocols XX - 20th International Workshop, Cambridge, UK, April 12-13, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7622, Springer 2012, ISBN 978-3-642-35693-3 [contents] - 2011
- [e10]Bruce Christianson, James A. Malcolm, Vashek Matyas, Michael Roe:
Security Protocols XVI - 16th International Workshop, Cambridge, UK, April 16-18, 2008. Revised Selected Papers. Lecture Notes in Computer Science 6615, Springer 2011, ISBN 978-3-642-22136-1 [contents] - [e9]Bruce Christianson, Bruno Crispo, James A. Malcolm, Frank Stajano:
Security Protocols XIX - 19th International Workshop, Cambridge, UK, March 28-30, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7114, Springer 2011, ISBN 978-3-642-25866-4 [contents] - 2010
- [j5]Hannan Xiao, Ying Zhang, James A. Malcolm, Bruce Christianson, Kee Chaing Chua:
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. Wirel. Sens. Netw. 2(7): 493-503 (2010) - [c21]Prasad Nambiar, Hannan Xiao, James A. Malcolm:
Snoop behaviour in multihop wireless networks. PM2HW2N@MSWiM 2010: 55-62 - [e8]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols - 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers. Lecture Notes in Computer Science 5964, Springer 2010, ISBN 978-3-642-17772-9 [contents]
2000 – 2009
- 2009
- [e7]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers. Lecture Notes in Computer Science 5087, Springer 2009, ISBN 978-3-642-04903-3 [contents] - 2008
- [j4]Mohammed Saeed Zahrani, Martin J. Loomes, James A. Malcolm, Abu Zafer M. Dayem Ullah, Kathleen Steinhöfel, Andreas Alexander Albrecht:
Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. Comput. Oper. Res. 35(6): 2049-2070 (2008) - [c20]Austen Rainer, Peter C. R. Lane, James A. Malcolm, Sven-Bodo Scholz:
Using n-grams to rapidly characterise the evolution of software code. ASE Workshops 2008: 43-52 - 2007
- [c19]Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson:
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. IAS 2007: 50-55 - [c18]Hannan Xiao, James A. Malcolm, Bruce Christianson, Ying Zhang:
Hierarchical Trustworthy Authentication for Pervasive Computing. MobiQuitous 2007: 1-3 - [c17]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Instructions to Reviewers. Security Protocols Workshop 2007: 256 - [e6]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers. Lecture Notes in Computer Science 4631, Springer 2007, ISBN 978-3-540-77155-5 [contents] - 2006
- [j3]Mohammed Saeed Zahrani, Martin J. Loomes, James A. Malcolm, Andreas Alexander Albrecht:
Landscape analysis for multicast routing. Comput. Commun. 30(1): 101-116 (2006) - [c16]Mohammed Saeed Zahrani, Martin J. Loomes, James A. Malcolm, Andreas Alexander Albrecht:
Genetic local search for multicast routing. GECCO 2006: 615-616 - [c15]Mohammed Saeed Zahrani, James A. Malcolm, Martin J. Loomes, Andreas Alexander Albrecht:
LSA-based Landscape Analysis for Multicast Routing. SGAI Conf. 2006: 187-200 - [e5]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers. Lecture Notes in Computer Science 3957, Springer 2006, ISBN 3-540-40925-4 [contents] - 2005
- [c14]Hannan Xiao, Kee Chaing Chua, James A. Malcolm, Ying Zhang:
Theoretical analysis of TCP throughput in adhoc wireless networks. GLOBECOM 2005: 6 - [c13]Bruce Christianson, Partha Das Chowdhury, James A. Malcolm:
Auditable Anonymous Delegation. ICISS 2005: 66-76 - [c12]Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Context Based Role Activation Mechanism. Security Protocols Workshop 2005: 315-321 - [e4]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers. Lecture Notes in Computer Science 3364, Springer 2005, ISBN 3-540-28389-7 [contents] - 2004
- [c11]Partha Das Chowdhury, Bruce Christianson, James A. Malcolm:
Anonymous Authentication. Security Protocols Workshop 2004: 299-305 - [e3]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers. Lecture Notes in Computer Science 2845, Springer 2004, ISBN 3-540-20830-5 [contents] - 2003
- [c10]James A. Malcolm:
Blind Publication: A Copyright Library without Publication or Trust. Security Protocols Workshop 2003: 336-340 - [c9]James A. Malcolm:
Blind Publication: A Copyright Library Without Publication or Trust (Discussion). Security Protocols Workshop 2003: 341-349 - 2002
- [c8]Caroline Lyon, Bob Dickerson, James A. Malcolm:
Incremental Retrieval of Documents Relevant to a Topic. TREC 2002 - [e2]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers. Lecture Notes in Computer Science 2467, Springer 2002, ISBN 3-540-44263-4 [contents] - 2001
- [c7]Jill Hewitt, Sarah A. Jones, James A. Malcolm, Robert J. Ollenbuttel:
Experiences With Web Content Creation From a Database. Digital Content Creation 2001: 316-331 - [c6]Caroline Lyon, James A. Malcolm, Bob Dickerson:
Detecting Short Passages of Similar Text in Large Document Collections. EMNLP 2001 - [c5]James A. Malcolm:
Lightweight Authentication in a Mobile Network (Transcript of Discussion). Security Protocols Workshop 2001: 217-220 - 2000
- [c4]Bruce Christianson, Bruno Crispo, James A. Malcolm:
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. Security Protocols Workshop 2000: 182-183 - [e1]Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe:
Security Protocols, 7th International Workshop, Cambridge, UK, April 19-21, 1999, Proceedings. Lecture Notes in Computer Science 1796, Springer 2000, ISBN 3-540-67381-4 [contents]
1990 – 1999
- 1999
- [c3]Bruce Christianson, James A. Malcolm, Brian L. Robinson:
Pictures Can't Lie under Oath. Security Protocols Workshop 1999: 208-218 - 1998
- [c2]Bruce Christianson, James A. Malcolm:
Delegation and Not-So Smart Cards (Position Paper). Security Protocols Workshop 1998: 154-157 - 1997
- [j2]Marie Rose Low, James A. Malcolm:
A Joint Authorisation Scheme. ACM SIGOPS Oper. Syst. Rev. 31(1): 88-96 (1997) - [c1]Bruce Christianson, James A. Malcolm:
Binding Bit Patterns to Real World Entities. Security Protocols Workshop 1997: 105-113
1980 – 1989
- 1981
- [j1]James A. Malcolm:
Brevity and clarity in command languages. ACM SIGPLAN Notices 16(10): 53-59 (1981)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint