Number of items: 158.
Article
Embedding Trust in the Media Access Control Protocol for Wireless Networks. (2025)
Chaminda Alocious,
Hannan Xiao,
Bruce Christianson
and
William Joseph Spring
Capuciis Furruratis cum Serico Duplicatis: Furred Hoods with Silk Linings from the Late Nineteenth Century. (2024)
Bruce Christianson,
Philip Goff
and
Nicholas Groves
The Academic Dress of Doctors of Philosophy at the University of London. (2023)
Bruce Christianson
Synchronizing DDoS Defense at Network Edge with P4, SDN, and Blockchain. (2022)
Aldo Febro,
Hannan Xiao,
William Joseph Spring
and
Bruce Christianson
Coloured Velvet is Too Gaudy: The 1861 Reforms to the Academical Costume of the University of London. (2022)
Bruce Christianson
Global Convergence of a Curvilinear Search for Non-Convex Optimization. (2022)
Michael Bartholomew-Biggs,
Salah Beddiaf
and
Bruce Christianson
Edge Security for SIP-enabled IoT Devices with P4. (2022)
Aldo Febro,
Hannan Xiao,
William Joseph Spring
and
Bruce Christianson
A Robust Dirichlet Reputation and Trust Evaluation of Nodes in Mobile Ad Hoc Networks. (2022)
Eric Chiejina,
Hannan Xiao,
Bruce Christianson,
Alexios Mylonas
and
Chidinma Chiejina
Reflections on Designing the Academic Dress of the University of Hertfordshire. (2021)
Bruce Christianson
and
Philip Waters
A comparison of methods for traversing regions of non-convexity in optimization problems. (2019)
Michael Bartholomew-Biggs,
Salah Beddiaf
and
Bruce Christianson
Differentiating through Conjugate Gradient. (2018)
Bruce Christianson
A Portrait of an Oxford Nobleman, circa 1705. (2016)
Bruce Christianson
and
Joan Kendall
BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks. (2016)
Htoo Maw,
Hannan Xiao,
Bruce Christianson
and
James Malcolm
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2015)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
Not Just Cyberwarfare. (2015)
B. Christianson
A Survey of Access Control Models in Wireless Sensor Networks. (2014)
Htoo Aung Maw,
Hannan Xiao,
B. Christianson
and
James Malcolm
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs. (2013)
Santanu Dash,
Sven-Bodo Scholz,
Stephan Herhut
and
B. Christianson
Living in an Impossible World : Real-izing the Consequences of Intransitive Trust. (2013)
B. Christianson
A Purple Passion? : Queen's College Oxford and the Blood of the Lord. (2012)
B. Christianson
An enhanced fuzzy ARM approach for intrusion detection. (2011)
N.S. Abouzakhar,
H. Chen
and
B. Christianson
Further thoughts on precision. (2011)
D. Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010)
Hannan Xiao,
Ying Zhang,
James Malcolm,
B. Christianson
and
Kee Chaing Chua
Extending Trust in Peer-to-Peer Networks. (2010)
S. Clarke,
B. Christianson
and
Hannan Xiao
Multi-channel key agreement using encrypted public key exchange. (2010)
B. Christianson
and
J. Li
Multichannel protocols to prevent relay attacks. (2010)
Frank Stajano,
Ford-Long Wong
and
B. Christianson
A non-transitive trust model for key distribution. (2010)
S. Herald,
S. Clarke
and
B. Christianson
Global convergence using de-linked Goldstein or Wolfe linesearch conditions. (2009)
B. Christianson
A Purchase Protocol with Multichannel Authentication. (2009)
Hannan Xiao,
B. Christianson
and
Ying Zhang
Vintage Bit Cryptography. (2009)
B. Christianson
and
A. Shafarenko
Recognizing Facial Expressions : A Comparison of Computational Approaches. (2008)
A. Shenoy,
T.M. Gale,
N. Davey,
B. Christianson
and
R. Frank
Automatic Propagation of Uncertainties. (2006)
B. Christianson
and
M. Cox
Doctors' greens. (2006)
B. Christianson
Optimizing Preventive Maintenance Models. (2006)
M. Bartholomew-Biggs,
B. Christianson
and
M. Zuo
Reflections on academic leadership. (2006)
M.J. Loomes
and
B. Christianson
The challenges of efficient code-generation for massively parallel architectures. (2006)
Jason M. McGuiness,
Colin Egan,
B. Christianson
and
Guang Gao
Lined with gold: London University and the colour of science. (2005)
B. Christianson
Secure Sessions from Weak Secrets. (2005)
B. Christianson,
M. Roe
and
D. Wheeler
In the pink: the strange case of Trinity College Dublin. (2004)
B. Christianson
Wearing Mummy's clothes: an introduction to academical archaeology. (2004)
N. Groves
and
B. Christianson
Oxford Blues: the search for the origins of the lay bachelors' hood. (2003)
B. Christianson
Merkle Puzzles Revisited — Finding Matching Elements between Lists. (2002)
B. Christianson
and
D. Wheeler
The evolution of the Oxford simple shape. (2002)
B. Christianson
Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001)
B. Christianson,
B. Crispo
and
J. Malcolm
A self-stabilizing Pantoja-like indirect algorithm for optimal control. (2001)
B. Christianson
Automatic Differentiation of Algorithms. (2000)
M. Bartholomew-Biggs,
S. Brown,
B. Christianson
and
L. Dixon
Cheap Newton steps for optimal control problems: automatic differentiation and Pantoja's algorithm. (1999)
B. Christianson
Binding bit patterns to real world entities. (1998)
B. Christianson
and
J. Malcolm
Reverse accumulation and implicit functions. (1998)
B. Christianson
Why isn't trust transitive? (1997)
B. Christianson
and
W.S. Harbison
Geometric approach to Fletcher's ideal penalty function. (1995)
B. Christianson
Positive fixed points of lattices under semigroups of positive linear operators. (1995)
B. Christianson
Remote booting in a hostile world: to whom am I speaking? [Computer security]. (1995)
M. Lomas
and
B. Christianson
Reverse accumulation and attractive fixed points. (1994)
B. Christianson
Automatic Hessians by reverse accumulation. (1992)
B. Christianson
Reverse accumulation and accurate rounding error estimates for taylor series coefficient. (1992)
B. Christianson
Relative width of sublattices. (1991)
B. Christianson
Inverse systems of abstract Lebesgue spaces. (1990)
B. Christianson
The positive fixed points of Banach lattices. (1989)
B. Christianson
The system likes you : (transcript of discussion). (2007)
B. Christianson
“Fair” Authentication in Pervasive Computing. (2006)
B. Christianson,
J. Li
and
M. Loomes
Optimization and automatic differentiation in Ada : some practical experience. (1994)
M. Bartholomew-Biggs,
Lynda Bartholomew-Biggs
and
B. Christianson
Using the support vector machine as a classification method for software defect prediction with static code metrics. (2009)
David Gray,
D. Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Computing in the 21st century : nanocircuitry, defect tolerance and quantum logic - Discussion. (1998)
B. Christianson,
N. S. Williams,
T. Beth
and
R. S. Williams
Implementations of quantum logic : fundamental and experimental limits - Discussion. (1998)
B. Christianson,
P.L. Knight
and
T. Beth
When is a protocol broken? (Transcript of discussion). (2010)
B. Christianson
Preface: Special issue dedicated to Andreas Griewank on the occasion of his 60th birthday Preface. (2012)
B. Christianson,
Uwe Naumann,
Jean Utke
and
Andrea Walther
Giving reverse differentiation a helping hand. (1997)
B. Christianson,
A. Davies,
Laurence Dixon,
R. Roy
and
P. van der Zee
Anonymous authentication. (2006)
P. Das Chowdhury,
J. Malcolm
and
B. Christianson
Delegation and not-so smart cards. (1999)
B. Christianson
and
J. Malcolm
A superscalar architecture to exploit instruction level parallelism. (1997)
G.B. Steven,
B. Christianson,
R. Collins,
F.L. Steven
and
R. Potter
Concluding discussion - When does confidentiality harm security? (2002)
B. Christianson,
T Aura,
D Wheeler,
W Harbison,
V Gligor,
L Paulson,
M Blaze
and
J Ioannidis
Technique for authentication, access control and resource management in open distributed systems. (1994)
M.R. Low
and
B. Christianson
Formal Systems, Not Methods. (2004)
M. Loomes,
B. Christianson
and
N. Davey
Anonymous Context Based Role Activation Mechanism. (2005)
P. Das Chowdhury,
B. Christianson
and
J. Malcolm
Where have all the protocols gone? (2005)
B. Christianson
Auditable Anonymous Delegation. (2005)
B. Christianson,
P. Das Chowdhury
and
J. Malcolm
Key-spoofing attacks on nested signature blocks. (1995)
B. Christianson
and
M.R. Low
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. (2003)
B. Christianson
and
J.F. Snook
Preface. (2011)
B. Christianson,
J. Malcolm,
B. Crispo
and
F. Stajano
Pictures Can’t Lie under Oath. (2000)
B. Christianson,
J. Malcolm
and
B. Robinson
Reverse differentiation and the inverse diffusion problem. (1997)
A.J. Davies,
B. Christianson,
Laurence Dixon,
R Roy
and
P. van der Zee
Conference or Workshop Item
Transporting a Secret using Destructively-Read Memory. (2023)
Bruce Christianson
and
Alex Shafarenko
Threat Analysis of Software Agents in Online Banking and Payments. (2018)
Tamsanqa Ngalo,
Hannan Xiao,
Bruce Christianson
and
Ying Zhang
Simulating Perceptions of Security. (2017)
Paul Wernick,
Bruce Christianson
and
William Spring
A Cloud-based RFID Authentication Protocol with Insecure Communication Channels. (2017)
Hannan Xiao,
Awatif Alshehri
and
Bruce Christianson
Building an Ensemble for Software Defect Prediction Based on Diversity Selection. (2016)
Jean Petri,
David Bowes,
Tracy Hall,
Bruce Christianson
and
Nathan Baddoo
Resilient Misbehaviour Detection MAC Protocol (MD-MAC) for Distributed Wireless Networks. (2016)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
Pico without public keys. (2015)
B. Christianson,
Frank Stajano,
Mark Lomas,
Graeme Jenkinson,
Payne Jeunese,
Quentin Stafford-Fraser
and
Max Spencer
Analysis of DoS Attacks at MAC Layer in Mobile Adhoc Networks. (2015)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015)
Htoo Aung Maw,
Hannan Xiao,
B. Christianson
and
James Malcolm
A Dynamic Reputation Management System for Mobile Ad Hoc Networks. (2014)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
Intrusion Detection System using Bayesian Network Modeling. (2014)
Chaminda Alocious,
Nasser Abouzakhar,
Hannan Xiao
and
B. Christianson
Energy Consumption in Mobile Ad Hoc Networks. (2014)
Hannan Xiao,
Dashti Ibrahim
and
B. Christianson
Introduction : Virtually perfect security (transcript of discussion). (2014)
B. Christianson
More security or less insecurity. (2014)
Partha Das Chowdhury
and
B. Christianson
More security or less insecurity (transcript of discussion). (2014)
B. Christianson
Relay-proof channels using UWB lasers. (2014)
B. Christianson,
Alex Shafarenko,
Frank Stajano
and
Ford-Long Wong
An Adaptive Access Control Model for Medical Data in Wireless Sensor Networks. (2013)
Htoo Maw,
Hannan Xiao
and
B. Christianson
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks. (2013)
Eric Chiejina,
Hannan Xiao
and
B. Christianson
A Media Access Control Protocol for Wireless Adhoc Networks with Misbehaviour Avoidance. (2013)
Chaminda Alocious,
Hannan Xiao
and
B. Christianson
Modular design of data-parallel graph algorithms. (2013)
Santanu Dash,
Sven-Bodo Scholz
and
B. Christianson
Trust*: Using Local Guarantees to Extend the Reach of Trust. (2013)
Stephen Clarke,
B. Christianson
and
Hannan Xiao
An Adaptive Access Control Model with Privileges Overriding and Behaviour Monitoring in Wireless Sensor Networks. (2012)
Htoo Aung Maw,
Hannan Xiao
and
B. Christianson
Trustworthiness and Authentication in Ubiquitous Computing. (2012)
Hannan Xiao,
James Malcolm,
B. Christianson
and
Y. Zhang
The Hidden Metamorphosis of Examination Papers : From Summative Caterpillar to Formative Butterfly. (2012)
Bruce Christianson
Arty-facts : The role of performance in the "conventional" PhD. (2011)
B. Christianson
and
Steven Adams
The misuse of the NASA metrics data program data sets for automated software defect prediction. (2011)
D. Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Software defect prediction using static code metrics underestimates defect-proneness. (2010)
David Gray,
David Bowes,
N. Davey,
Yi Sun
and
B. Christianson
Theatre as a Discussion Tool in Human-Robot Interaction Experiments : A Pilot Study. (2010)
A.R. Chatley,
K. Dautenhahn,
M.L. Walters,
D.S. Syrdal
and
B. Christianson
A Domain-Oriented Approach for Access Control in Pervasive Environments. (2008)
J. Li
and
B. Christianson
A Purchase Protocol with Live Cardholder Authentication for Online Credit Card Payment. (2008)
Hannan Xiao,
B. Christianson
and
Y. Zhang
Hierarchical Trustworthy Authentication for Pervasive Computing. (2007)
Hannan Xiao,
J. Malcolm
and
B. Christianson
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007)
S.M. Bo,
Hannan Xiao,
A. Adereti,
J. Malcolm
and
B. Christianson
Reducing the Branch Power Cost In Embedded Processors Through Static Scheduling, Profiling and SuperBlock Formation. (2006)
M. Hicks,
C. Egan,
B. Christianson
and
P. Quick
What Software Evolution and Biological Evolution Don't Have in Common. (2006)
C.L. Nehaniv,
J. Hewitt,
B. Christianson
and
P. Wernick
Associative Memories with Small World Connectivity. (2005)
N. Davey,
L. Calcraft,
B. Christianson
and
R.G. Adams
High Capacity Associative Memories and Small World Networks. (2004)
N. Davey,
B. Christianson
and
R.G. Adams
Sharing storage using dirty vectors. (1996)
B. Christianson,
L. Dixon
and
S. Brown
Reverse accumulation of functions containing gradients. (1993)
B. Christianson
Other
Application of automatic differentiation to race car performance optimisation. (2002)
B. Christianson,
D. Casanova,
R.S. Sharp,
M. Final
and
P. Symonds
Exploring robot etiquette : Refining a HRI home companion scenario based on feedback from two artists who lived with robots in the UH robot house. (2013)
K.L. Koay,
M.L. Walters,
A. May,
A. Dumitriu,
B. Christianson,
N. Burke
and
K. Dautenhahn
Artists as HRI pioneers : A creative approach to developing novel interactions for living with robots. (2013)
H. Lehmann,
M.L. Walters,
A. Dumitriu,
A. May,
K.L. Koay,
J. Sàez-Pons,
D.S. Syrdal,
L.J. Wood,
Joe Saunders,
N. Burke,
I. Duque-Garcia,
B. Christianson
and
K. Dautenhahn
Automatic first- and second-order adjoints for truncated Newton. (2007)
Uwe Naumann,
M. Maier,
Jan Riehme
and
B. Christianson
A different approach of using Personas in human-robot interaction : Integrating Personas as computational models to modify robot companions' behaviour. (2013)
I. Duque,
K. Dautenhahn,
K.L. Koay,
L. Willcock
and
B. Christianson
Enhancements to Prepare-and-Measure Based QKD Protocols. (2013)
Peter Y.A. Ryan
and
B. Christianson
Automatic differentiation of computer programs in a parallel computing environment. (1997)
S. Brown
and
B. Christianson
Remodelling the attacker : (transcript of discussion). (2011)
B. Christianson
The Laplace transform dual reciprocity boundary element method for electromagnetic heating problems. (2005)
D. Crann,
A. Davies
and
B. Christianson
A mapping study of software code cloning. (2012)
T. Shippey,
D. Bowes,
B. Christianson
and
T. Hall
My familiar robot companion : Preferences and perceptions of CHARLY, a companion humanoid autonomous robot for living with you. (2012)
M.L. Walters,
D.S. Syrdal,
K. Dautenhahn,
A. Dumitriu,
A. May,
B. Christianson
and
K.L. Koay
Evaluation of Logarithmic integrals in two dimensional boundary element computation. (2003)
A. Davies,
D. Crann
and
B. Christianson
Introduction : Alice doesn't live here anymore (transcript). (2011)
B. Christianson
Security protocol deployment risk : (transcript of discussion). (2011)
B. Christianson