default search action
Jeremy L. Jacob
Person information
- affiliation: University of York, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c35]Abdulrazaq Abba, Ana Cavalcanti, Jeremy Jacob:
Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata. SBMF 2021: 70-86 - [i1]Abdulrazaq Abba, Ana Cavalcanti, Jeremy Jacob:
Temporal Reasoning Through Automatic Translation of tock-CSP into Timed Automata. CoRR abs/2104.13434 (2021)
2010 – 2019
- 2016
- [c34]Mustafa Aydin, Jeremy L. Jacob:
Providing Extensibility to Threat Modelling in Cloud-COVER's Underlying Analysis Model. EISIC 2016: 45-51 - 2015
- [c33]Mustafa Aydin, Jeremy L. Jacob:
Cloud-COVER: Using User Security Attribute Preferences and Propagation Analysis to Prioritise Threats to Systems. EISIC 2015: 53-60 - 2014
- [j17]Michael J. Banks, Jeremy L. Jacob:
On integrating confidentiality and functionality in a formal method. Formal Aspects Comput. 26(5): 963-992 (2014) - [c32]Eerke A. Boiten, Jeremy Jacob:
Sealed Containers in Z. ABZ 2014: 136-141 - [c31]Mustafa Aydin, Jeremy Jacob:
Extending Hypervisor Architecture to Allow One Way Data Transfers from VMs to Hypervisors. CLOSER 2014: 604-609 - 2013
- [c30]Mustafa Aydin, Jeremy Jacob:
A comparison of major issues for the development of forensics in cloud computing. ICITST 2013: 77-82 - 2011
- [c29]Michael J. Banks, Jeremy L. Jacob:
Specifying Confidentiality in Circus. FM 2011: 215-230 - 2010
- [j16]Xun Dong, John A. Clark, Jeremy L. Jacob:
Defending the weakest link: phishing websites detection by analysing user behaviours. Telecommun. Syst. 45(2-3): 215-226 (2010) - [c28]Jeremy L. Jacob:
Trace Specifications in Alloy. ASM 2010: 105-117 - [c27]Michael J. Banks, Jeremy L. Jacob:
On Modelling User Observations in the UTP. UTP 2010: 101-119 - [c26]Michael J. Banks, Jeremy L. Jacob:
Unifying Theories of Confidentiality. UTP 2010: 120-136
2000 – 2009
- 2008
- [j15]Jim Woodcock, Susan Stepney, David Cooper, John A. Clark, Jeremy Jacob:
The certification of the Mondex electronic purse to ITSEC Level E6. Formal Aspects Comput. 20(1): 5-19 (2008) - [c25]David Robert White, John A. Clark, Jeremy Jacob, Simon M. Poulding:
Searching for resource-efficient programs: low-power pseudorandom number generators. GECCO 2008: 1775-1782 - [c24]Xun Dong, John A. Clark, Jeremy L. Jacob:
Threat Modelling in User Performed Authentication. ICICS 2008: 49-64 - [c23]Xun Dong, John A. Clark, Jeremy L. Jacob:
User behaviour based phishing websites detection. IMCSIT 2008: 783-790 - 2007
- [j14]Phillip J. Brooke, Richard F. Paige, Jeremy L. Jacob:
A CSP model of Eiffel's SCOOP. Formal Aspects Comput. 19(4): 487-512 (2007) - [j13]Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob:
Coordination with multicapabilities. Sci. Comput. Program. 64(2): 205-222 (2007) - 2006
- [c22]Hao Chen, John A. Clark, Jeremy Jacob:
Human competitive security protocols synthesis. GECCO 2006: 1855-1856 - 2005
- [j12]John A. Clark, Jeremy L. Jacob, Susan Stepney:
The Design of S-Boxes by Simulated Annealing. New Gener. Comput. 23(3): 219-231 (2005) - [c21]Nur Izura Udzir, Alan M. Wood, Jeremy L. Jacob:
Coordination with Multicapabilities. COORDINATION 2005: 79-93 - [c20]Howard Chivers, Jeremy Jacob:
Specifying Information-Flow Controls. ICDCS Workshops 2005: 114-120 - 2004
- [j11]John A. Clark, Jeremy L. Jacob, Subhamoy Maitra, Pantelimon Stanica:
Almost Boolean Functions: The Design of Boolean Functions by Spectral Inversion. Comput. Intell. 20(3): 450-462 (2004) - [j10]Hao Chen, John A. Clark, Jeremy L. Jacob:
Automated Design of Security Protocols. Comput. Intell. 20(3): 503-516 (2004) - [c19]John A. Clark, Jeremy L. Jacob, Susan Stepney:
Searching for cost functions. IEEE Congress on Evolutionary Computation 2004: 1517-1524 - [c18]John A. Clark, Jeremy L. Jacob, Susan Stepney:
The design of s-boxes by simulated annealing. IEEE Congress on Evolutionary Computation 2004: 1533-1537 - [c17]Hao Chen, John A. Clark, Jeremy L. Jacob:
Synthesising Efficient and Effective Security Protocols. ARSPA@IJCAR 2004: 25-41 - 2003
- [c16]John A. Clark, Jeremy L. Jacob, Subhamoy Maitra, Pantelimon Stanica:
Almost Boolean functions: the design of Boolean functions by spectral inversion. IEEE Congress on Evolutionary Computation 2003: 2173-2180 - [c15]Hao Chen, John A. Clark, Jeremy L. Jacob:
Automated design of security protocols. IEEE Congress on Evolutionary Computation 2003: 2181-2188 - [c14]John A. Clark, Jeremy L. Jacob, Susan Stepney:
Secret Agents Leave Big Footprints: How to Plant a Cryptographic Trapdoor, and Why You Might Not Get Away with It. GECCO 2003: 2022-2033 - 2002
- [c13]John A. Clark, Jeremy L. Jacob:
Fault Injection and a Timing Channel on an Analysis Technique. EUROCRYPT 2002: 181-196 - [c12]John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria. INDOCRYPT 2002: 246-259 - 2001
- [j9]John A. Clark, Jeremy L. Jacob:
Protocols are programs too: the meta-heuristic search for security protocols. Inf. Softw. Technol. 43(14): 891-904 (2001) - [c11]Nathalie Foster, Jeremy Jacob:
Hazard Analysis for Security Protocol Requirements. Network Security 2001: 75-92 - [c10]Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob:
The role-based access control system of a European bank: a case study and discussion. SACMAT 2001: 3-9 - 2000
- [c9]John A. Clark, Jeremy Jacob:
Two-Stage Optimisation in the Design of Boolean Functions. ACISP 2000: 242-254 - [c8]Jeremy L. Jacob, Alan M. Wood:
A Principled Semantics for inp. COORDINATION 2000: 51-65 - [c7]John A. Clark, Jeremy L. Jacob:
Searching for a Solution: Engineering Tradeoffs and the Evolution of Provably Secure Protocols. S&P 2000: 82-95
1990 – 1999
- 1998
- [j8]Ian Toyn, David Michael Cattrall, John A. McDermid, Jeremy L. Jacob:
A practical language and toolkit for high-integrity tools. J. Syst. Softw. 41(3): 161-173 (1998) - 1995
- [j7]John A. Clark, Jeremy Jacob:
On the Security of Recent Protocols. Inf. Process. Lett. 56(3): 151-155 (1995) - [j6]Simon N. Foley, Jeremy Jacob:
Specifying Security for Computer Supported Collaborative Working. J. Comput. Secur. 3(4): 233-254 (1995) - [c6]Simon N. Foley, Jeremy Jacob:
Specifying security for CSCW systems. CSFW 1995: 136- - 1992
- [j5]Jeremy Jacob:
A Model of Reconfiguration in Communicating Sequential Processes with a Notion of Transactions. Inf. Process. Lett. 41(1): 9-12 (1992) - [j4]Jeremy Jacob:
Basic Theorems About Security. J. Comput. Secur. 1(3-4): 385-412 (1992) - 1991
- [j3]Jeremy Jacob:
A Uniform Presentation of Confidentiality Properties. IEEE Trans. Software Eng. 17(11): 1186-1194 (1991) - [c5]Jeremy Jacob:
The Basic Integrity Theorem. CSFW 1991: 89-97 - 1990
- [j2]Jeremy Jacob:
Separability and the Detection of Hidden Channels. Inf. Process. Lett. 34(1): 27-29 (1990) - [j1]Jeremy Jacob:
A Model of Reconfiguration in Communicating Sequential Processes. Inf. Process. Lett. 35(1): 19-22 (1990) - [c4]Jeremy Jacob:
Categorizing non-interference. CSFW 1990: 44-50
1980 – 1989
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint