Keith Harrison

According to our database1, Keith Harrison authored at least 26 papers between 1990 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Introduction to the Minitrack on Cybersecurity and Privacy in Government.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

The Dark Blue CyberPatriot Training Tool.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2019
The Need for Information Sharing and Analysis Organizations to Combat Attacks on States and Community Public and Private Networks.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

Introduction to the Minitrack on Cybersecurity in Digital Government.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Introduction to the Minitrack on Cybersecurity and Government.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
State and Community Information Sharing and Analysis Organizations.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Cybersecurity and Government Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2015
Introspecting for RSA Key Material to Assist Intrusion Detection.
IEEE Cloud Comput., 2015

Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud.
Proceedings of the 2015 IEEE International Conference on Cloud Engineering, 2015

The Honey Community: Use of Combined Organizational Data for Community Protection.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Forensic Virtual Machines: Dynamic Defence in the Cloud via Introspection.
Proceedings of the 2014 IEEE International Conference on Cloud Engineering, 2014

2013
Anonymous and Distributed Community Cyberincident Detection.
IEEE Secur. Priv., 2013

2012
A Framework for Detecting Malware in Cloud by Identifying Symptoms.
Proceedings of the 16th IEEE International Enterprise Distributed Object Computing Conference, 2012

2011
A Taxonomy of Cyber Events Affecting Communities.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

2010
The CyberPatriot National High School Cyber Defense Competition.
IEEE Secur. Priv., 2010

An Empirical Study on the Effectiveness of Common Security Measures.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2007
Protecting Cryptographic Keys from Memory Disclosure Attacks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2003
The HP time vault service: exploiting IBE for timed release of confidential information.
Proceedings of the Twelfth International World Wide Web Conference, 2003

A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems.
LMS J. Comput. Math., 2002

Certification of Public Keys within an Identity Based System.
Proceedings of the Information Security, 5th International Conference, 2002

Applications of Multiple Trust Authorities in Pairing Based Cryptosystems.
Proceedings of the Infrastructure Security, International Conference, 2002

Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

Implementing the Tate Pairing.
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002

1998
Use of Static Code Analysis to Support the Safety Certification of Airborne Software.
Proceedings of the Industrial Perspectives of Safety-critical Systems, 1998

1990
GAP: An Exercise in Model Oriented Programming.
Proceedings of the Logic Programming, 1990


  Loading...