Now showing items 61-80 of 144

    • Key-spoofing attacks on nested signature blocks 

      Christianson, B.; Low, M.R. (1995)
      For a given signature block and any other data, there exists a key which produces the same signature block. The threat that this poses to schemes which use nested signature blocks as pointers to other tokens is identified, ...
    • The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems 

      Crann, D.; Davies, A.; Christianson, B. (EC Ltd, 2005)
      There are many situations in applied science and engineering where materials are heated electrically via the so-called ohmic heating, or Joule heating, process. In this process the heating occurs throughout the volume as ...
    • A Leibniz notation for automatic differentiation 

      Christianson, B. (Springer Nature, 2012)
      Notwithstanding the superiority of the Leibniz notation for differential calculus, the dot-and-bar notation predominantly used by the Automatic Differentiation community is resolutely Newtonian. In this paper we extend the ...
    • Lined with gold: London University and the colour of science 

      Christianson, B. (2005)
      Faculty colours for academic hoods are a surprisingly modern development. London University seems to have invented the first British system of faculty colours, out of whole cloth as it were, in 1844. But in 1862 this first ...
    • Living in an Impossible World : Real-izing the Consequences of Intransitive Trust 

      Christianson, B. (2013)
      Many accounts of online trust are based upon mechanisms for building reputation. Trust is portrayed as desirable, and handing off trust is easier if trust is modelled to be transitive. But in the analysis of cyber-security ...
    • A mapping study of software code cloning 

      Shippey, T.; Bowes, D.; Christianson, B.; Hall, T. (Institution of Engineering and Technology (IET), 2012)
      Background: Software Code Cloning is widely used by developers to produce code in which they have confidence and which reduces development costs and improves the software quality. However, Fowler and Beck suggest that the ...
    • A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance 

      Alocious, Chaminda; Xiao, Hannan; Christianson, B. (University of York, 2013)
      The most common wireless Medium Access Control (MAC) protocol is IEEE 802.11. Currently IEEE 802.11 standard protocol is not resilient for many identified MAC layer attacks, because the protocol is designed without intention ...
    • Merkle puzzles revisited - finding matching elements between lists 

      Christianson, B.; Wheeler, D. (University of Hertfordshire, 1999)
      Consider the following problem. A and B have a N-element set of bit-strings. They wish to find all collisions, in other words to find the common strings of their sets or to establish that there are none. How much data must ...
    • Merkle Puzzles Revisited — Finding Matching Elements between Lists 

      Christianson, B.; Wheeler, D. (2002)
      Consider the following problem. A and B each have a N-element set of bit-strings. They wish to find all collisions, in other words to find the common strings of their sets or to establish that there are none. How much data ...
    • The misuse of the NASA metrics data program data sets for automated software defect prediction 

      Gray, D.; Bowes, David; Davey, N.; Sun, Yi; Christianson, B. (Institution of Engineering and Technology (IET), 2011)
      Background: The NASA Metrics Data Program data sets have been heavily used in software defect prediction experiments. Aim: To demonstrate and explain why these data sets require significant pre-processing in order to be ...
    • Modelling and Analysis of TCP Performance in Wireless Multihop Networks 

      Xiao, Hannan; Zhang, Ying; Malcolm, James; Christianson, B.; Chua, Kee Chaing (2010-07)
      Researchers have used extensive simulation and experimental studies to understand TCP performance in wireless multihop networks. In contrast, the objective of this paper is to theoretically analyze TCP performance in this ...
    • Modular design of data-parallel graph algorithms 

      Dash, Santanu; Scholz, Sven-Bodo; Christianson, B. (Institute of Electrical and Electronics Engineers (IEEE), 2013)
      Amorphous Data Parallelism has proven to be a suitable vehicle for implementing concurrent graph algorithms effectively on multi-core architectures. In view of the growing complexity of graph algorithms for information ...
    • More security or less insecurity 

      Chowdhury, Partha Das; Christianson, B. (Springer Nature, 2014)
      We depart from the conventional quest for ‘Completely Secure Systems’ and ask ‘How can we be more Secure’. We draw heavily from the evolution of the Theory of Justice and the arguments against the institutional approach ...
    • More security or less insecurity (transcript of discussion) 

      Christianson, B. (Springer Nature, 2014)
      The purpose of this talk is to explore the possibility of an exploitable analogy between approaches to secure system design and theories of jurisprudence. The prevailing theory of jurisprudence in the West at the moment ...
    • Multi-channel key agreement using encrypted public key exchange 

      Christianson, B.; Li, J. (2010)
      We present a new protocol for cryptographic key agreement between devices which have had no previous association, and which does not rely upon mutual access to a pre-existing key infrastructure. This protocol is suitable ...
    • Multichannel protocols to prevent relay attacks 

      Stajano, Frank; Wong, Ford-Long; Christianson, B. (2010)
      A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encrypting the communication between the honest ...
    • My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you 

      Walters, M.L.; Syrdal, D.S.; Dautenhahn, K.; Dumitriu, A.; May, A.; Christianson, B.; Koay, K.L. (Springer Nature, 2012)
      This paper presents findings from a survey conducted with visitors to the My Familiar Companion exhibit, part of the HUMAN+ Exhibition at the Science Gallery in Dublin. The exhibit consisted of a humanoid robot, CHARLY ...
    • Nested signature blocks 

      Low, M.R.; Christianson, B. (University of Hertfordshire, 1995)
      For any signature block and any other data, there exists a key which produces the same signature block. In this report we identify the threat that this poses for the SAProxy scheme which uses nested signature blocks as ...
    • A non-transitive trust model for key distribution 

      Herald, S.; Clarke, S.; Christianson, B. (2010)
      Key distribution mechanisms such as PKI or PGP implicitly assume trust to be transitive. This can be a problematic assumption. The user relies indirectly (often implicitly) on the remote entities to satisfy its trust ...
    • Not Just Cyberwarfare 

      Christianson, B. (2015-03-28)
      Bringsjord and Licato provide a general meta-argument that cyberwarfare is so different from traditional kinetic warfare that no argument from analogy can allow the just war theory of Augustine and Aquinas (hereinafter ...