Jeremy Jacob
Jeremy Jacob
Lecturer in Computer Science, University of York
Verified email at cs.york.ac.uk
Title
Cited by
Cited by
Year
A survey of authentication protocol literature: Version 1.0
JA Clark, JL Jacob
Citeseer, 1997
3081997
The role-based access control system of a European bank: a case study and discussion
A Schaad, J Moffett, J Jacob
Proceedings of the sixth ACM symposium on Access control models and …, 2001
2272001
A survey of authentication protocol literature
J Clark, J Jacob
Technical Report 1.0, 1997
2231997
The design of S-boxes by simulated annealing
JA Clark, JL Jacob, S Stepney
New Generation Computing 23 (3), 219-231, 2005
1512005
On the derivation of secure components
J Jacob
Proceedings. 1989 IEEE Symposium on Security and Privacy, 242-242, 1989
1061989
Evolving Boolean functions satisfying multiple criteria
JA Clark, JL Jacob, S Stepney, S Maitra, W Millan
International conference on cryptology in India, 246-259, 2002
1042002
Protocols are programs too: the meta-heuristic search for security protocols
JA Clark, JL Jacob
Information and Software Technology 43 (14), 891-904, 2001
842001
Two-stage optimisation in the design of Boolean functions
JA Clark, JL Jacob
Australasian conference on information security and privacy, 242-254, 2000
742000
Security specifications
J Jacob
Proceedings. 1988 IEEE Symposium on Security and Privacy, 14-14, 1988
701988
The certification of the Mondex electronic purse to ITSEC Level E6
J Woodcock, S Stepney, D Cooper, J Clark, J Jacob
Formal Aspects of Computing 20 (1), 5-19, 2008
592008
On the Security of Recent Protocols.
JA Clark, J Jacob
Inf. Process. Lett. 56 (3), 151-155, 1995
591995
Searching for resource-efficient programs: Low-power pseudorandom number generators
DR White, J Clark, J Jacob, SM Poulding
Proceedings of the 10th annual conference on Genetic and evolutionary …, 2008
582008
Almost Boolean functions: The design of Boolean functions by spectral inversion
JA Clark, JL Jacob, S Maitra, P Stănică
Computational Intelligence 20 (3), 450-462, 2004
562004
Searching for a solution: Engineering tradeoffs and the evolution of provably secure protocols
JA Clark, JL Jacob
Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000, 82-95, 2000
542000
Basic theorems about security
J Jacob
Journal of Computer Security 1 (3-4), 385-411, 1992
491992
A survey of authentication protocol literature, 1997
J Clark, J Jacob
482003
Attacking authentication protocols
J Clark, J Jacob
High Integrity Systems 1, 465-474, 1996
451996
A survey of authentication protocol literature: Version 1.0, 17. nov. 1997
J Clark, J Jacob
URL: www. cs. york. ac. uk/~ jac/papers/drareview. ps. gz 12, 1997
351997
A CSP model of Eiffel’s SCOOP
PJ Brooke, RF Paige, JL Jacob
Formal Aspects of Computing 19 (4), 487-512, 2007
342007
Almost boolean functions: the design of boolean functions by spectral inversion
JA Clark, JL Jacob, S Maitra, P Stanica
The 2003 Congress on Evolutionary Computation, 2003. CEC'03. 3, 2173-2180, 2003
342003
The system can't perform the operation now. Try again later.
Articles 1–20