Michael Roe
According to our database1,
Michael Roe
authored at least 53 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Des. Test, February, 2024
2022
Drivers and challenges of internet of things diffusion in smart stores: A field exploration.
CoRR, 2022
2020
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
2019
CHERIvoke: Characterising Pointer Revocation using CHERI Capabilities for Temporal Memory Safety.
Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, 2019
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Proceedings of the 36th IEEE International Conference on Computer Design, 2018
2017
Proceedings of the 2017 IEEE International Conference on Computer Design, 2017
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017
2016
IEEE Micro, 2016
2015
CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, 2015
2014
Proceedings of the ACM/IEEE 41st International Symposium on Computer Architecture, 2014
2011
Proceedings of the Security Protocols XIX, 2011
Production and raw material ordering management for a manufacturing supply chain with uncertainties.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011
2010
Weighting the competitiveness factors for container ports under conflicting interests.
J. Oper. Res. Soc., 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
Proceedings of the Security Protocols XVIII, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2008
Proceedings of the Security Protocols XVI, 2008
Proceedings of the Security Protocols XVI, 2008
2007
Proceedings of the Security Protocols, 2007
Proceedings of the Security Protocols, 2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
2005
Proceedings of the Security Protocols, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
2003
Proceedings of the Security Protocols, 2003
2002
Proceedings of the 2002 ACM Workshop on Wireless Security, 2002
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002
2001
2000
Proceedings of the Security Protocols, 2000
Proceedings of the Security Protocols, 2000
1999
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999
1998
Proceedings of the Security Protocols, 1998
1997
1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
1993
Proceedings of the Fast Software Encryption, 1993
1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989