Bruce Christianson

Orcid: 0000-0002-3777-7476

Affiliations:
  • University of Hertfordshire, Hatfield, UK


According to our database1, Bruce Christianson authored at least 114 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A taxonomy of automatic differentiation pitfalls.
WIREs Data. Mining. Knowl. Discov., 2024

2023
Global convergence of a curvilinear search for non-convex optimization.
Numer. Algorithms, April, 2023

Understanding Automatic Differentiation Pitfalls.
CoRR, 2023

Transporting a Secret Using Destructively-Read Memory.
Proceedings of the Security Protocols XXVIII, 2023

2022
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks.
Sensors, 2022

Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain.
Comput. Networks, 2022

Edge security for SIP-enabled IoT devices with P4.
Comput. Networks, 2022

2020
A comparison of methods for traversing regions of non-convexity in optimization problems.
Numer. Algorithms, 2020

2018
Preface.
Optim. Methods Softw., 2018

Differentiating through conjugate gradient.
Optim. Methods Softw., 2018

Threat Analysis of Software Agents in Online Banking and Payments.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

2017
Simulating Perceptions of Security.
Proceedings of the Security Protocols XXV, 2017

Self Attestation of Things.
Proceedings of the Security Protocols XXV, 2017

2016
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks.
IEEE J. Biomed. Health Informatics, 2016

Resilient misbehaviour detection MAC protocol (MD-MAC) for distributed wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

A Cloud-Based RFID Authentication Protocol with Insecure Communication Channels.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

The Price of Belief: Insuring Credible Trust?
Proceedings of the Security Protocols XXIV, 2016

The Price of Belief: Insuring Credible Trust? (Transcript of Discussion).
Proceedings of the Security Protocols XXIV, 2016

Invisible Security.
Proceedings of the Security Protocols XXIV, 2016

Building an Ensemble for Software Defect Prediction Based on Diversity Selection.
Proceedings of the 10th ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2016

The jinx on the NASA software defect data sets.
Proceedings of the 20th International Conference on Evaluation and Assessment in Software Engineering, 2016

2015
A Dynamic Reputation Management System for Mobile Ad Hoc Networks.
Comput., 2015

Will Technology Make Information Security Impossible? And Must Technology Be Invented Just Because We Can? - Thoughts Occasioned by Brunner's "The Productions of Time" and Asimov's "The Dead Past".
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Pico Without Public Keys.
Proceedings of the Security Protocols XXIII - 23rd International Workshop, Cambridge, UK, March 31, 2015

Guarantor and reputation based trust model for Social Internet of Things.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Analysis of DoS attacks at MAC Layer in mobile adhoc networks.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Survey of Access Control Models in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014

Energy consumption in Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Beyond Trust.
Proceedings of the Security Protocols XXII, 2014

An evaluation of break-the-glass access control model for medical data in wireless sensor networks.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

2013
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs.
Theor. Comput. Sci., 2013

Enhancements to Prepare-and-Measure Based QKD Protocols.
Proceedings of the Security Protocols XXI, 2013

Introduction: What's Happening on the Other Channel? (Transcript of Discussion).
Proceedings of the Security Protocols XXI, 2013

Artists as HRI Pioneers: A Creative Approach to Developing Novel Interactions for Living with Robots.
Proceedings of the Social Robotics - 5th International Conference, 2013

Exploring Robot Etiquette: Refining a HRI Home Companion Scenario Based on Feedback from Two Artists Who Lived with Robots in the UH Robot House.
Proceedings of the Social Robotics - 5th International Conference, 2013

A different approach of using Personas in human-robot interaction: Integrating Personas as computational models to modify robot companions' behaviour.
Proceedings of the IEEE International Symposium on Robot and Human Interactive Communication, 2013

Modular design of data-parallel graph algorithms.
Proceedings of the International Conference on High Performance Computing & Simulation, 2013

An adaptive access control model for medical data in Wireless Sensor Networks.
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013

2012
Preface.
Optim. Methods Softw., 2012

Reflections on the NASA MDP data sets.
IET Softw., 2012

My Familiar Robot Companion: Preferences and Perceptions of CHARLY, a Companion Humanoid Autonomous Robot for Living with You.
Proceedings of the Advances in Autonomous Robotics, 2012

Introduction: Bringing Protocols to Life (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks.
Proceedings of the Q2SWinet'12, 2012

Trustworthiness and authentication in ubiquitous computing.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

A mapping study of software code cloning.
Proceedings of the 16th International Conference on Evaluation & Assessment in Software Engineering, 2012

2011
An Enhanced Fuzzy ARM Approach for Intrusion Detection.
Int. J. Digit. Crime Forensics, 2011

Gearing Up: How to Eat Your Cryptocake and Still Have It.
Proceedings of the Security Protocols XIX, 2011

Introduction: Alice Doesn't Live Here Anymore (Transcript).
Proceedings of the Security Protocols XIX, 2011

Further thoughts on precision.
Proceedings of the 15th International Conference on Evaluation & Assessment in Software Engineering, 2011

The misuse of the NASA metrics data program data sets for automated software defect prediction.
Proceedings of the 15th International Conference on Evaluation & Assessment in Software Engineering, 2011

2010
Modelling and Analysis of TCP Performance in Wireless Multihop Networks.
Wirel. Sens. Netw., 2010

Relay-Proof Channels Using UWB Lasers.
Proceedings of the Security Protocols XVIII, 2010

Recapitulation.
Proceedings of the Security Protocols XVIII, 2010

More Security or Less Insecurity (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Introduction: Virtually Perfect Security (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

More Security or Less Insecurity.
Proceedings of the Security Protocols XVIII, 2010

Software defect prediction using static code metrics underestimates defect-proneness.
Proceedings of the International Joint Conference on Neural Networks, 2010

Multichannel Protocols to Prevent Relay Attacks.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Theatre as a Discussion Tool in Human-Robot Interaction Experiments - A Pilot Study.
Proceedings of the ACHI 2010, 2010

2009
Trust*: Using Local Guarantees to Extend the Reach of Trust.
Proceedings of the Security Protocols XVII, 2009

Trust*: Using Local Guarantees to Extend the Reach of Trust.
Proceedings of the Security Protocols XVII, 2009

Introduction: Brief Encounters.
Proceedings of the Security Protocols XVII, 2009

Using the Support Vector Machine as a Classification Method for Software Defect Prediction with Static Code Metrics.
Proceedings of the Engineering Applications of Neural Networks, 2009

Extending Trust in Peer-to-Peer Networks.
Proceedings of the Advances in Databases and Information Systems, 2009

2008
Security Protocol Deployment Risk (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Remodelling the Attacker (Transcript of Discussion).
Proceedings of the Security Protocols XVI, 2008

Recognizing Facial Expressions: A Comparison of Computational Approaches.
Proceedings of the Artificial Neural Networks, 2008

A Domain-Oriented Approach for Access Control in Pervasive Environments.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Multi-Channel Key Agreement Using Encrypted Public Key Exchange.
Proceedings of the Security Protocols, 2007

Instructions to Reviewers.
Proceedings of the Security Protocols, 2007

Multi-Channel Key Agreement Using Encrypted Public Key Exchange (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

When Is a Protocol Broken? (Transcript of Discussion).
Proceedings of the Security Protocols, 2007

Hierarchical Trustworthy Authentication for Pervasive Computing.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Optimizing Preventive Maintenance Models.
Comput. Optim. Appl., 2006

Vintage Bit Cryptography.
Proceedings of the Security Protocols, 2006

Putting the Human Back in the Protocol.
Proceedings of the Security Protocols, 2006

The Challenges of Efficient Code-Generation for Massively Parallel Architectures.
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006

Reducing the Branch Power Cost in Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation.
Proceedings of the Advances in Computer Systems Architecture, 11th Asia-Pacific Conference, 2006

2005
Anonymous Context Based Role Activation Mechanism.
Proceedings of the Security Protocols, 2005

The System Likes You.
Proceedings of the Security Protocols, 2005

Anonymous Context Based Role Activation Mechanism.
Proceedings of the Security Protocols, 2005

"Fair" Authentication in Pervasive Computing.
Proceedings of the Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, 2005

Auditable Anonymous Delegation.
Proceedings of the Information Systems Security, First International Conference, 2005

2004
Formal Systems, Not Methods.
Proceedings of the Teaching Formal Methods, CoLogNET/FME Symposium, 2004

Anonymous Authentication (Transcript of Discussion).
Proceedings of the Security Protocols, 2004

Introduction: Authentic Privacy.
Proceedings of the Security Protocols, 2004

Anonymous Authentication.
Proceedings of the Security Protocols, 2004

2003
Secure Sessions from Weak Secrets.
Proceedings of the Security Protocols, 2003

Secure Sessions from Weak Secrets (Discussion).
Proceedings of the Security Protocols, 2003

Where Have All the Protocols Gone?
Proceedings of the Security Protocols, 2003

2002
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing.
Proceedings of the Security Protocols, 2002

Concluding Discussion: Accounting for Resources.
Proceedings of the Security Protocols, 2002

Introduction (Transcript).
Proceedings of the Security Protocols, 2002

2001
Merkle Puzzles Revisited - Finding Matching Elements Between Lists.
Proceedings of the Security Protocols, 2001

Concluding Discussion: When Does Confidentiality Harm Security?
Proceedings of the Security Protocols, 2001

Merkle Puzzles Revisited (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

2000
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Proceedings of the Security Protocols, 2000

Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms (Transcript of Discussion).
Proceedings of the Security Protocols, 2000

1999
Pictures Can't Lie under Oath.
Proceedings of the Security Protocols, 1999

Auditing against Impossible Abstractions.
Proceedings of the Security Protocols, 1999

1998
Panel Session - Future Directions.
Proceedings of the Security Protocols, 1998

Delegation and Not-So Smart Cards (Position Paper).
Proceedings of the Security Protocols, 1998

Delegation and Not-So Smart Card (Transcript of Discussion).
Proceedings of the Security Protocols, 1998

1997
A superscalar architecture to exploit instruction level parallelism.
Microprocess. Microsystems, 1997

Practical parallel processing: An introduction to problem solving in parallel : by Alan Chalmers and Jonathan Tidmus. 1996, 400 pp, ISBN 1-85032-135-3, £23.95.
Microprocess. Microsystems, 1997

Binding Bit Patterns to Real World Entities.
Proceedings of the Security Protocols, 1997

1996
Why Isn't Trust Transitive?
Proceedings of the Security Protocols, 1996

1995
Is Your Computing Environment Secure? Security Problems With Interrupt Handling Mechanisms.
ACM SIGOPS Oper. Syst. Rev., 1995

To Whom am I Speaking? Remote Booting in a Hostile World.
Computer, 1995

1994
Self Authenticating Proxies.
Comput. J., 1994

1993
Fine Grained Object Protection in Unix.
ACM SIGOPS Oper. Syst. Rev., 1993


  Loading...