Author
Number of items: 38.
2016
  • BTG-AC: Break-The-Glass Access Control Model for Medical Data in Wireless Sensor Networks. (2016) Htoo Maw, Hannan Xiao, Bruce Christianson and James Malcolm
  • 2015
  • An evaluation of break-the-glass access control model for medical data in wireless sensor networks. (2015) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • 2014
  • A Survey of Access Control Models in Wireless Sensor Networks. (2014) Htoo Aung Maw, Hannan Xiao, B. Christianson and James Malcolm
  • 2012
  • Trustworthiness and Authentication in Ubiquitous Computing. (2012) Hannan Xiao, James Malcolm, B. Christianson and Y. Zhang
  • 2011
  • Preface. (2011) B. Christianson, J. Malcolm, B. Crispo and F. Stajano
  • The sense of security and a countermeasure for the false sense (transcript of discussion). (2011) J. Malcolm
  • 2010
  • Modelling and Analysis of TCP Performance in Wireless Multihop Networks. (2010) Hannan Xiao, Ying Zhang, James Malcolm, B. Christianson and Kee Chaing Chua
  • Snoop behaviour in multihop wireless networks. (2010) P. Nambiar, Hannan Xiao and J. Malcolm
  • 2009
  • Tackling the PAN’09 External Plagiarism Detection Corpus with a Desktop Plaigiarism Detector. (2009) J. Malcolm and P.C.R. Lane
  • 2008
  • Efficient Search for Plagiarism on the Web. (2008) J. Malcolm and P.C.R. Lane
  • Genetic local search for multicast routing with pre-processing by logarithmic simulated annealing. (2008) M.S. Zahrani, M.J. Loomes, J. Malcolm, A.Z.M. Dayem Ullah, K. Steinhofel and A. Albrecht
  • Using n-grams to rapidly characterise the evolution of software code. (2008) A. Rainer, P.C.R. Lane, J. Malcolm and S. Scholz
  • 2007
  • Comparing Different Text Similarity Methods. (2007) J. Bao, C. Lyon, P.C.R. Lane, W. Ji and J. Malcolm
  • Hierarchical Trustworthy Authentication for Pervasive Computing. (2007) Hannan Xiao, J. Malcolm and B. Christianson
  • A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. (2007) S.M. Bo, Hannan Xiao, A. Adereti, J. Malcolm and B. Christianson
  • 2006
  • Plagiarism is easy, but also easy to detect. (2006) C. Lyon, R. Barrett and J. Malcolm
  • Anonymous authentication. (2006) P. Das Chowdhury, J. Malcolm and B. Christianson
  • Copy detection in Chinese documents using the Ferret: a report on experiments. (2006) J. Bao, C. Lyon, P.C.R. Lane, W. Ji and J. Malcolm
  • Embedding plagiarism education in the assessment process. (2006) R. Barrett and J. Malcolm
  • Landscape analysis for multicast routing. (2006) M.S. Zahrani, M.J. Loomes, J. Malcolm and A. Albrecht
  • Plagiarism prevention is discipline specific : a view from computer science. (2006) R. Barrett, A. Cox, James Malcolm and Caroline Lyon
  • Text similarity in academic conference papers. (2006) J. Bao and J. Malcolm
  • 2005
  • Anonymous Context Based Role Activation Mechanism. (2005) P. Das Chowdhury, B. Christianson and J. Malcolm
  • Auditable Anonymous Delegation. (2005) B. Christianson, P. Das Chowdhury and J. Malcolm
  • Joint Source Channel Coding for H.264 Compliant Stereoscopic Video Transmission. (2005) P.Y. Yip, J. Malcolm, A. Fernando, K.K. Loo and H.K. Arachchi
  • Theoretical analysis of TCP throughput in adhoc wireless networks. (2005) Hannan Xiao, K.C. Chua, J. Malcolm and Y. Zhang
  • 2004
  • A theoretical basis to the automated detection of copying between texts, and its practical implementation in the Ferret plagiarism and collusion detector. (2004) C. Lyon, R. Barrett and J. Malcolm
  • 2003
  • Experiments in Electronic Plagiarism Detection. (2003) C. Lyon, R. Barrett and J. Malcolm
  • 2002
  • Incremental Retrieval of documents relevant to a topic. (2002) C. Lyon, J. Malcolm and R. Dickerson
  • 2001
  • Detecting Short Passages of Similar Text in Large Document Collections. (2001) C. Lyon, J. Malcolm and B. Dickerson
  • Public-Key Crypto-systems Using Symmetric-Key Crypto-algorithms. (2001) B. Christianson, B. Crispo and J. Malcolm
  • 2000
  • Pictures Can’t Lie under Oath. (2000) B. Christianson, J. Malcolm and B. Robinson
  • 1999
  • Delegation and not-so smart cards. (1999) B. Christianson and J. Malcolm
  • Digital cash : electronic commerce over open networks. (1999) J. Mankin and J. Malcolm
  • 1998
  • Binding bit patterns to real world entities. (1998) B. Christianson and J. Malcolm
  • 1997
  • Binding bit patterns to real world entities. (1997) B. Christianson and J. Malcolm
  • 1996
  • Teaching client server computing to undergraduates and postgraduates. (1996) J. Malcolm and P. Hu
  • 1990
  • Knowledge-based systems in network management. (1990) T. Wooding and J. Malcolm