Author
Number of items: 158.
2022
Synchronizing DDoS Defense at Network Edge with P4, SDN, and Blockchain. (2022)
Aldo Febro,
Hannan Xiao,
William Joseph Spring
and
Bruce Christianson
Coloured Velvet is Too Gaudy: The 1861 Reforms to the Academical Costume of the University of London. (2022)
Bruce Christianson
Global Convergence of a Curvilinear Search for Non-Convex Optimization. (2022)
Michael Bartholomew-Biggs,
Salah Beddiaf
and
Bruce Christianson
Container and Method : A tamper evident container that uses Destructive Read Memory elements that store more content than they reveal when they are destructively read. (2022)
Alex Shafarenko
and
Bruce Christianson
Edge Security for SIP-enabled IoT Devices with P4. (2022)
Aldo Febro,
Hannan Xiao,
William Joseph Spring
and
Bruce Christianson
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. (2022)
Eric Chiejina,
Hannan Xiao,
Bruce Christianson,
Alexios Mylonas
and
Chidinma Chiejina
2015
Pico without public keys. (2015)
B. Christianson,
Frank Stajano,
Mark Lomas,
Graeme Jenkinson,
Payne Jeunese,
Quentin Stafford-Fraser
and
Max Spencer
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks. (2015)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
Not Just Cyberwarfare. (2015)
B. Christianson
The Role of Publications and Other Artefacts in Submissions for the UK PhD. (2015)
B. Christianson,
Martin Elliot
and
Ben Massey
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015)
Htoo Aung Maw,
Hannan Xiao,
B. Christianson
and
James Malcolm
2013
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013)
Santanu Dash,
Sven-Bodo Scholz,
Stephan Herhut
and
B. Christianson
An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013)
Htoo Maw,
Hannan Xiao
and
B. Christianson
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013)
B. Christianson
A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
Modular design of data-parallel graph algorithms. (2013)
Santanu Dash,
Sven-Bodo Scholz
and
B. Christianson
Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013)
Stephen Clarke,
B. Christianson
and
Hannan Xiao
Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013)
K.L. Koay,
M.L. Walters,
A. May,
A. Dumitriu,
B. Christianson,
N. Burke
and
K. Dautenhahn
Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013)
H. Lehmann,
M.L. Walters,
A. Dumitriu,
A. May,
K.L. Koay,
J. Sàez-Pons,
D.S. Syrdal,
L.J. Wood,
Joe Saunders,
N. Burke,
I. Duque-Garcia,
B. Christianson
and
K. Dautenhahn
A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013)
I. Duque,
K. Dautenhahn,
K.L. Koay,
L. Willcock
and
B. Christianson
Enhancements to Prepare-and-Measure Based QKD Protocols. (2013)
Peter Y.A. Ryan
and
B. Christianson
2012
An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012)
Htoo Aung Maw,
Hannan Xiao
and
B. Christianson
Trustworthiness and Authentication in Ubiquitous Computing. (2012)
Hannan Xiao,
James Malcolm,
B. Christianson
and
Y. Zhang
The Hidden Metamorphosis of Examination Papers : From Summative Caterpillar to Formative Butterfly. (2012)
Bruce Christianson
A Leibniz notation for automatic differentiation. (2012)
B. Christianson
A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012)
B. Christianson
Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012)
B. Christianson,
Uwe Naumann,
Jean Utke
and
Andrea Walther
A mapping study of software code cloning. (2012)
T. Shippey,
D. Bowes,
B. Christianson
and
T. Hall
My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012)
M.L. Walters,
D.S. Syrdal,
K. Dautenhahn,
A. Dumitriu,
A. May,
B. Christianson
and
K.L. Koay
2010
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010)
Hannan Xiao,
Ying Zhang,
James Malcolm,
B. Christianson
and
Kee Chaing Chua
Extending Trust in Peer-to-Peer Networks. (2010)
S. Clarke,
B. Christianson
and
Hannan Xiao
Multi-channel key agreement using encrypted public key exchange. (2010)
B. Christianson
and
J. Li
Multichannel protocols to prevent relay attacks. (2010)
Frank Stajano,
Ford-Long Wong
and
B. Christianson
Software defect prediction using static code metrics underestimates defect-proneness. (2010)
David Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010)
A.R. Chatley,
K. Dautenhahn,
M.L. Walters,
D.S. Syrdal
and
B. Christianson
A non-transitive trust model for key distribution. (2010)
S. Herald,
S. Clarke
and
B. Christianson
When is a protocol broken? (Transcript of discussion). (2010)
B. Christianson
2006
Academic dress in the University of Hertfordshire. (2006)
B. Christianson
Automatic Propagation of Uncertainties. (2006)
B. Christianson
and
M. Cox
Doctors' greens. (2006)
B. Christianson
Optimizing Preventive Maintenance Models. (2006)
M. Bartholomew-Biggs,
B. Christianson
and
M. Zuo
Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006)
M. Hicks,
C. Egan,
B. Christianson
and
P. Quick
Reflections on academic leadership. (2006)
M.J. Loomes
and
B. Christianson
What Software Evolution and Biological Evolution Don't Have in Common. (2006)
C.L. Nehaniv,
J. Hewitt,
B. Christianson
and
P. Wernick
The challenges of efficient code-generation for massively parallel architectures. (2006)
Jason M. McGuiness,
Colin Egan,
B. Christianson
and
Guang Gao
“Fair” Authentication in Pervasive Computing. (2006)
B. Christianson,
J. Li
and
M. Loomes
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson