David Llewellyn-Jones
Affiliations:- Liverpool John Moores University, UK
According to our database1,
David Llewellyn-Jones
authored at least 61 papers
between 2002 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on flypig.co.uk
On csauthors.net:
Bibliography
2020
Peer-to-Peer Netw. Appl., 2020
Trans. Emerg. Telecommun. Technol., 2020
Deploying authentication in the wild: towards greater ecological validity in security usability studies.
J. Cybersecur., 2020
2018
Proceedings of the Security Protocols XXVI, 2018
Proceedings of the Security Protocols XXVI, 2018
2016
Optimizing runtime performance of hybrid dynamically and statically typed languages for the .Net platform.
J. Syst. Softw., 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the Security Protocols XXIV, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
2015
Secur. Commun. Networks, 2015
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Proceedings of the International Conference on Developments of E-Systems Engineering, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015
2014
Pervasive Mob. Comput., 2014
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
Proceedings of the Cyberpatterns, 2014
Proceedings of the Cyberpatterns, 2014
2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of 10th IEEE International Conference on Networking, Sensing and Control, 2013
Proceedings of the 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), 2013
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013
2012
J. Netw. Comput. Appl., 2012
Applying dynamic separation of aspects to distributed systems security: A case study.
IET Softw., 2012
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012
Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories.
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012
2011
Proceedings of the 6th International Workshop on Digital Forensics and Incident Analysis, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
Proceedings of the 6th International Conference on System of Systems Engineering, 2011
The effect of direct interactions on reputation based schemes in mobile ad hoc networks.
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
Proceedings of the Handbook of Information and Communication Security, 2010
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks.
Proceedings of the 3rd IFIP Wireless Days Conference 2010, 2010
Proceedings of the 5th International Conference on System of Systems Engineering, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
Towards viable computer systems: a set theory interpretation of ecological dependence within Beer's self-organizing viable system model.
Proceedings of the MEDES '09: International ACM Conference on Management of Emergent Digital EcoSystems, 2009
Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), 2009
2008
Proceedings of the 1st International ICST Conference on Forensic Applications and Techniques in Telecommunications, 2008
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008
2007
Proceedings of the Home Networking, 2007
Proceedings of the IEEE International Conference on Pervasive Services, 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the Ambient Intelligence in Everyday Life - Foreword by Emile Aarts, 2006
2005
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005
An Knowledge Model for Self-regenerative Service Activations Adaptation Across Standards.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
2004
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2002
On the Earth's surface energy exchange determination from ERS satellite ATSR data - heat exchange of coastal zones.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2002