James A. Malcolm

According to our database1, James A. Malcolm authored at least 31 papers between 1981 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
BTG-AC: Break-the-Glass Access Control Model for Medical Data in Wireless Sensor Networks.
IEEE J. Biomed. Health Informatics, 2016

2015
Evaluation and Prevention of MAC Layer Misbehaviours in Public Wireless Hotspots.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
A Survey of Access Control Models in Wireless Sensor Networks.
J. Sens. Actuator Networks, 2014

An evaluation of break-the-glass access control model for medical data in wireless sensor networks.
Proceedings of the 16th IEEE International Conference on e-Health Networking, 2014

2012
Trustworthiness and authentication in ubiquitous computing.
Proceedings of the 10th ACM International Symposium on Mobility Management and Wireless Access, 2012

2010
Modelling and Analysis of TCP Performance in Wireless Multihop Networks.
Wirel. Sens. Netw., 2010

Snoop behaviour in multihop wireless networks.
Proceedings of the 5th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, 2010

2008
Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing.
Comput. Oper. Res., 2008

Using n-grams to rapidly characterise the evolution of software code.
Proceedings of the 23rd IEEE/ACM International Conference on Automated Software Engineering, 2008

2007
Instructions to Reviewers.
Proceedings of the Security Protocols, 2007

Hierarchical Trustworthy Authentication for Pervasive Computing.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Landscape analysis for multicast routing.
Comput. Commun., 2006

LSA-based Landscape Analysis for Multicast Routing.
Proceedings of the Research and Development in Intelligent Systems XXIII, 2006

Genetic local search for multicast routing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2006

2005
Anonymous Context Based Role Activation Mechanism.
Proceedings of the Security Protocols, 2005

Auditable Anonymous Delegation.
Proceedings of the Information Systems Security, First International Conference, 2005

Theoretical analysis of TCP throughput in adhoc wireless networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Anonymous Authentication.
Proceedings of the Security Protocols, 2004

2003
Blind Publication: A Copyright Library Without Publication or Trust (Discussion).
Proceedings of the Security Protocols, 2003

Blind Publication: A Copyright Library without Publication or Trust.
Proceedings of the Security Protocols, 2003

2002
Incremental Retrieval of Documents Relevant to a Topic.
Proceedings of The Eleventh Text REtrieval Conference, 2002

2001
Lightweight Authentication in a Mobile Network (Transcript of Discussion).
Proceedings of the Security Protocols, 2001

Detecting Short Passages of Similar Text in Large Document Collections.
Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2001

Experiences With Web Content Creation From a Database.
Proceedings of the Digital Content Creation, 2001

2000
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms.
Proceedings of the Security Protocols, 2000

1999
Pictures Can't Lie under Oath.
Proceedings of the Security Protocols, 1999

1998
Delegation and Not-So Smart Cards (Position Paper).
Proceedings of the Security Protocols, 1998

1997
A Joint Authorisation Scheme.
ACM SIGOPS Oper. Syst. Rev., 1997

Binding Bit Patterns to Real World Entities.
Proceedings of the Security Protocols, 1997

1981
Brevity and clarity in command languages.
ACM SIGPLAN Notices, 1981


  Loading...