Author
Number of items: 158.
Article
  • Embedding Trust in the Media Access Control Protocol for Wireless Networks. (2025) Chaminda Alocious, Hannan Xiao, Bruce Christianson and William Joseph Spring
  • Capuciis Furruratis cum Serico Duplicatis: Furred Hoods with Silk Linings from the Late Nineteenth Century. (2024) Bruce Christianson, Philip Goff and Nicholas Groves
  • The Academic Dress of Doctors of Philosophy at the University of London. (2023) Bruce Christianson
  • Synchronizing DDoS Defense at Network Edge with P4, SDN, and Blockchain. (2022) Aldo Febro, Hannan Xiao, William Joseph Spring and Bruce Christianson
  • Coloured Velvet is Too Gaudy: The 1861 Reforms to the Academical Costume of the University of London. (2022) Bruce Christianson
  • Global Convergence of a Curvilinear Search for Non-Convex Optimization. (2022) Michael Bartholomew-Biggs, Salah Beddiaf and Bruce Christianson
  • Edge Security for SIP-enabled IoT Devices with P4. (2022) Aldo Febro, Hannan Xiao, William Joseph Spring and Bruce Christianson
  • A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. (2022) Eric Chiejina, Hannan Xiao, Bruce Christianson, Alexios Mylonas and Chidinma Chiejina
  • Reflections on Designing the Academic Dress of the University of Hertfordshire. (2021) Bruce Christianson and Philip Waters
  • A comparison of methods for traversing regions of non-convexity in optimization problems. (2019) Michael Bartholomew-Biggs, Salah Beddiaf and Bruce Christianson
  • Differentiating through Conjugate Gradient. (2018) Bruce Christianson
  • A Portrait of an Oxford Nobleman, circa 1705. (2016) Bruce Christianson and Joan Kendall
  • BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks. (2016) Htoo Maw, Hannan Xiao, Bruce Christianson and James Malcolm
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015) Eric Chiejina, Hannan Xiao and B. Christianson
  • Not Just Cyberwarfare. (2015) B. Christianson
  • A Survey of Access Control Models in Wireless Sensor Networks. (2014) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013) Santanu Dash, Sven-Bodo Scholz, Stephan Herhut and B. Christianson
  • Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013) B. Christianson
  • A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012) B. Christianson
  • An enhanced fuzzy ARM approach for intrusion detection. (2011) N.S. Abouzakhar, H. Chen and B. Christianson
  • Further thoughts on precision. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010) Hannan Xiao, Ying Zhang, James Malcolm, B. Christianson and Kee Chaing Chua
  • Extending Trust in Peer-to-Peer Networks. (2010) S. Clarke, B. Christianson and Hannan Xiao
  • Multi-channel key agreement using encrypted public key exchange. (2010) B. Christianson and J. Li
  • Multichannel protocols to prevent relay attacks. (2010) Frank Stajano, Ford-Long Wong and B. Christianson
  • A non-transitive trust model for key distribution. (2010) S. Herald, S. Clarke and B. Christianson
  • Global convergence using de-linked Goldstein or Wolfe linesearch conditions. (2009) B. Christianson
  • A Purchase Protocol with Multichannel Authentication. (2009) Hannan Xiao, B. Christianson and Ying Zhang
  • Vintage Bit Cryptography. (2009) B. Christianson and A. Shafarenko
  • Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008) A. Shenoy, T.M. Gale, N. Davey, B. Christianson and R. Frank
  • Automatic Propagation of Uncertainties. (2006) B. Christianson and M. Cox
  • Doctors' greens. (2006) B. Christianson
  • Optimizing Preventive Maintenance Models. (2006) M. Bartholomew-Biggs, B. Christianson and M. Zuo
  • Reflections on academic leadership. (2006) M.J. Loomes and B. Christianson
  • The challenges of efficient code-generation for massively parallel architectures. (2006) Jason M. McGuiness, Colin Egan, B. Christianson and Guang Gao
  • Lined with gold: London University and the colour of science. (2005) B. Christianson
  • Secure Sessions from Weak Secrets. (2005) B. Christianson, M. Roe and D. Wheeler
  • In the pink: the strange case of Trinity College Dublin. (2004) B. Christianson
  • Wearing Mummy's clothes: an introduction to academical archaeology. (2004) N. Groves and B. Christianson
  • Oxford Blues: the search for the origins of the lay bachelors' hood. (2003) B. Christianson
  • Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002) B. Christianson and D. Wheeler
  • The evolution of the Oxford simple shape. (2002) B. Christianson
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • A self-stabilizing Pantoja-like indirect algorithm for optimal control. (2001) B. Christianson
  • Automatic Differentiation of Algorithms. (2000) M. Bartholomew-Biggs, S. Brown, B. Christianson and L. Dixon
  • Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm. (1999) B. Christianson
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • Reverse accumulation and implicit functions. (1998) B. Christianson
  • Why isn't trust transitive? (1997) B. Christianson and W.S. Harbison
  • Geometric approach to Fletcher's ideal penalty function. (1995) B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1995) B. Christianson
  • Remote booting in a hostile world: to whom am I speaking? [Computer security]. (1995) M. Lomas and B. Christianson
  • Reverse accumulation and attractive fixed points. (1994) B. Christianson
  • Automatic Hessians by reverse accumulation. (1992) B. Christianson
  • Reverse accumulation and accurate rounding error estimates for taylor series coefficient. (1992) B. Christianson
  • Relative width of sublattices. (1991) B. Christianson
  • Inverse systems of abstract Lebesgue spaces. (1990) B. Christianson
  • The positive fixed points of Banach lattices. (1989) B. Christianson
  • The system likes you : (transcript of discussion). (2007) B. Christianson
  • “Fair” Authentication in Pervasive Computing. (2006) B. Christianson, J. Li and M. Loomes
  • Optimization and automatic differentiation in Ada : some practical experience. (1994) M. Bartholomew-Biggs, Lynda Bartholomew-Biggs and B. Christianson
  • Using the support vector machine as a classification method for software defect prediction with static code metrics. (2009) David Gray, D. Bowes, N. Davey, Yi Sun and B. Christianson
  • Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion. (1998) B. Christianson, N. S. Williams, T. Beth and R. S. Williams
  • Implementations of quantum logic : fundamental and experimental limits - Discussion. (1998) B. Christianson, P.L. Knight and T. Beth
  • When is a protocol broken? (Transcript of discussion). (2010) B. Christianson
  • Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012) B. Christianson, Uwe Naumann, Jean Utke and Andrea Walther
  • Giving reverse differentiation a helping hand. (1997) B. Christianson, A. Davies, Laurence Dixon, R. Roy and P. van der Zee
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • A superscalar architecture to exploit instruction level parallelism. (1997) G.B. Steven, B. Christianson, R. Collins, F.L. Steven and R. Potter
  • Concluding discussion - When does confidentiality harm security? (2002) B. Christianson, T Aura, D Wheeler, W Harbison, V Gligor, L Paulson, M Blaze and J Ioannidis
  • Technique for authentication, access control and resource management in open distributed systems. (1994) M.R. Low and B. Christianson
  • Formal Systems, Not Methods. (2004) M. Loomes, B. Christianson and N. Davey
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Where have all the protocols gone? (2005) B. Christianson
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • Key-spoofing attacks on nested signature blocks. (1995) B. Christianson and M.R. Low
  • Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003) B. Christianson and J.F. Snook
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • Reverse differentiation and the inverse diffusion problem. (1997) A.J. Davies, B. Christianson, Laurence Dixon, R Roy and P. van der Zee
  • Book Section
  • Transporting a Secret using Destructively-Read Memory. (2023) Bruce Christianson and Alex Shafarenko
  • Threat Analysis of Software Agents in Online Banking and Payments. (2018) Tamsanqa Ngalo, Hannan Xiao, Bruce Christianson and Ying Zhang
  • Simulating Perceptions of Security. (2017) Paul Wernick, Bruce Christianson and William Spring
  • A Cloud-based RFID Authentication Protocol with Insecure Communication Channels. (2017) Hannan Xiao, Awatif Alshehri and Bruce Christianson
  • Building an Ensemble for Software Defect Prediction Based on Diversity Selection. (2016) Jean Petri, David Bowes, Tracy Hall, Bruce Christianson and Nathan Baddoo
  • Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks. (2016) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Pico without public keys. (2015) B. Christianson, Frank Stajano, Mark Lomas, Graeme Jenkinson, Payne Jeunese, Quentin Stafford-Fraser and Max Spencer
  • Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks. (2015) Chaminda Alocious, Hannan Xiao and B. Christianson
  • An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2014) Eric Chiejina, Hannan Xiao and B. Christianson
  • Intrusion Detection System using Bayesian Network Modeling. (2014) Chaminda Alocious, Nasser Abouzakhar, Hannan Xiao and B. Christianson
  • Energy Consumption in Mobile Ad Hoc Networks. (2014) Hannan Xiao, Dashti Ibrahim and B. Christianson
  • Introduction : Virtually perfect security (transcript of discussion). (2014) B. Christianson
  • More security or less insecurity. (2014) Partha Das Chowdhury and B. Christianson
  • More security or less insecurity (transcript of discussion). (2014) B. Christianson
  • Relay-proof channels using UWB lasers. (2014) B. Christianson, Alex Shafarenko, Frank Stajano and Ford-Long Wong
  • An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013) Htoo Maw, Hannan Xiao and B. Christianson
  • A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013) Eric Chiejina, Hannan Xiao and B. Christianson
  • A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013) Chaminda Alocious, Hannan Xiao and B. Christianson
  • Modular design of data-parallel graph algorithms. (2013) Santanu Dash, Sven-Bodo Scholz and B. Christianson
  • Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013) Stephen Clarke, B. Christianson and Hannan Xiao
  • An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012) Htoo Aung Maw, Hannan Xiao and B. Christianson
  • Trustworthiness and Authentication in Ubiquitous Computing. (2012) Hannan Xiao, James Malcolm, B. Christianson and Y. Zhang
  • A Leibniz notation for automatic differentiation. (2012) B. Christianson
  • Gearing up : How to eat your cryptocake and still have it. (2011) A. Shafarenko and B. Christianson
  • Arty-facts : The role of performance in the "conventional" PhD. (2011) B. Christianson and Steven Adams
  • The misuse of the NASA metrics data program data sets for automated software defect prediction. (2011) D. Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Software defect prediction using static code metrics underestimates defect-proneness. (2010) David Gray, David Bowes, N. Davey, Yi Sun and B. Christianson
  • Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010) A.R. Chatley, K. Dautenhahn, M.L. Walters, D.S. Syrdal and B. Christianson
  • A Domain-Oriented Approach for Access Control in Pervasive Environments. (2008) J. Li and B. Christianson
  • A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. (2008) Hannan Xiao, B. Christianson and Y. Zhang
  • Hierarchical Trustworthy Authentication for Pervasive Computing. (2007) Hannan Xiao, J. Malcolm and B. Christianson
  • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007) S.M. Bo, Hannan Xiao, A. Adereti, J. Malcolm and B. Christianson
  • Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006) M. Hicks, C. Egan, B. Christianson and P. Quick
  • What Software Evolution and Biological Evolution Don't Have in Common. (2006) C.L. Nehaniv, J. Hewitt, B. Christianson and P. Wernick
  • Associative Memories with Small World Connectivity. (2005) N. Davey, L. Calcraft, B. Christianson and R.G. Adams
  • High Capacity Associative Memories and Small World Networks. (2004) N. Davey, B. Christianson and R.G. Adams
  • Globalization of Pantoja's optimal control algorithm. (2002) B. Christianson and M. Bartholomew-Biggs
  • A Note About the Semantics of Delegation. (1999) B. Crispo and B. Christianson
  • Sharing storage using dirty vectors. (1996) B. Christianson, L. Dixon and S. Brown
  • Reverse accumulation of functions containing gradients. (1993) B. Christianson
  • Conference or Workshop Item
  • The Hidden Metamorphosis of Examination Papers : From Summative Caterpillar to Formative Butterfly. (2012) Bruce Christianson
  • Book
  • Second-order adjoints by source code manipulation of numerical programs. (2007) U. Naumann, M. Maier, Jan Riehme and B. Christianson
  • Academic dress in the University of Hertfordshire. (2006) B. Christianson
  • Merkle puzzles revisited - finding matching elements between lists. (1999) B. Christianson and D. Wheeler
  • Binding bit patterns to real world entities. (1997) B. Christianson and J. Malcolm
  • An introduction to the Hatfield superscalar architecture. (1996) G.B. Steven, B. Christianson, R. Collins, R. Potter and F.L. Steven
  • Authentication v Certification. (1995) M.R. Low and B. Christianson
  • Hades - towards the design of an asynchronous superscalar processor. (1995) C.J. Elston, B. Christianson, P. Findlay and G.B. Steven
  • Is your computing environment secure? Security problems with interrupt handling mechanisms. (1995) B. Christianson and P. Hu
  • Nested signature blocks. (1995) M.R. Low and B. Christianson
  • Roles and rights. (1995) M.R. Low and B. Christianson
  • File server architecture for an open distributed document system. (1994) B. Christianson and P. Hu
  • Self authenticating proxies. (1994) M.R. Low and B. Christianson
  • Shrink-wrapped optimism: the DODA approach to distributed document processing. (1994) B. Christianson and J.F. Snook
  • To whom am I speaking? Remote booting in a hostile world. (1994) M. Lomas and B. Christianson
  • Positive fixed points of lattices under semigroups of positive linear operators. (1993) B. Christianson
  • Testing should help to insert new bugs or how to modify programs predictably? (1992) B. Christianson and R. Barrett
  • Why is software development so difficult to manage? (1992) R. Barrett and B. Christianson
  • Optimizing real-time transport protocols. (1990) B. Christianson
  • Patent
  • Container and Method : A tamper evident container that uses Destructive Read Memory elements that store more content than they reveal when they are destructively read. (2022) Alex Shafarenko and Bruce Christianson
  • Secure Communication Method/Procédé de Communication Sécureisée/Laborgerät für eine Gesteuerte Umgebung. European Patent 09784674.5. (2017) Bruce Christianson, Sergei Turitsin and Alex Shafarenko
  • Report
  • The Role of Publications and Other Artefacts in Submissions for the UK PhD. (2015) B. Christianson, Martin Elliot and Ben Massey
  • Other
  • Application of automatic differentiation to race car performance optimisation. (2002) B. Christianson, D. Casanova, R.S. Sharp, M. Final and P. Symonds
  • Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013) K.L. Koay, M.L. Walters, A. May, A. Dumitriu, B. Christianson, N. Burke and K. Dautenhahn
  • Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013) H. Lehmann, M.L. Walters, A. Dumitriu, A. May, K.L. Koay, J. Sàez-Pons, D.S. Syrdal, L.J. Wood, Joe Saunders, N. Burke, I. Duque-Garcia, B. Christianson and K. Dautenhahn
  • Automatic first- and second-order adjoints for truncated Newton. (2007) Uwe Naumann, M. Maier, Jan Riehme and B. Christianson
  • A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013) I. Duque, K. Dautenhahn, K.L. Koay, L. Willcock and B. Christianson
  • Enhancements to Prepare-and-Measure Based QKD Protocols. (2013) Peter Y.A. Ryan and B. Christianson
  • Automatic differentiation of computer programs in a parallel computing environment. (1997) S. Brown and B. Christianson
  • Remodelling the attacker : (transcript of discussion). (2011) B. Christianson
  • The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems. (2005) D. Crann, A. Davies and B. Christianson
  • A mapping study of software code cloning. (2012) T. Shippey, D. Bowes, B. Christianson and T. Hall
  • My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012) M.L. Walters, D.S. Syrdal, K. Dautenhahn, A. Dumitriu, A. May, B. Christianson and K.L. Koay
  • Evaluation of Logarithmic integrals in two dimensional boundary element computation. (2003) A. Davies, D. Crann and B. Christianson
  • Introduction : Alice doesn't live here anymore (transcript). (2011) B. Christianson
  • Security protocol deployment risk : (transcript of discussion). (2011) B. Christianson