What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nathan L. Clarke
Google Scholar
ORCID:
0000-0002-3595-3800
19
publications in security and cryptology related venues
Year
Venue
Title
2022
journals/compsec
Real-world smartphone-based gait recognition.
Hind Alobaidi
Nathan L. Clarke
Fudong Li
Abdulrahman Alruban
2019
journals/istr
A proactive malicious software identification approach for digital forensic examiners.
Muhammad Ali
Stavros Shiaeles
Nathan L. Clarke
Dimitrios Kontogeorgis
2018
conf/esorics
Misuse Detection in a Simulated IaaS Environment.
Burhan Al-Bayati
Nathan L. Clarke
Paul Dowland
Fudong Li
2017
journals/compsec
A novel privacy preserving user identification approach for network traffic.
Nathan L. Clarke
Fudong Li
Steven Furnell
2015
journals/compsec
Continuous user authentication using multi-modal biometrics.
Hataichanok Saevanee
Nathan L. Clarke
Steven Furnell
Valerio Biscione
2014
conf/sec
Text-Based Active Authentication for Mobile Devices.
Hataichanok Saevanee
Nathan L. Clarke
Steven Furnell
Valerio Biscione
2013
journals/compsec
Co-operative user identity verification using an Authentication Aura.
Chris G. Hocking
Steven M. Furnell
Nathan L. Clarke
Paul L. Reynolds
2012
journals/compsec
Power to the people? The evolving recognition of human aspects of security.
Steven Furnell
Nathan L. Clarke
2012
conf/sec
A Response Strategy Model for Intrusion Response Systems.
Nor Badrul Anuar
Maria Papadaki
Steven Furnell
Nathan L. Clarke
2012
conf/sec
Multi-modal Behavioural Biometric Authentication for Mobile Devices.
Hataichanok Saevanee
Nathan L. Clarke
Steven M. Furnell
2010
journals/compsec
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm.
Gina C. Tjhai
Steven Furnell
Maria Papadaki
Nathan L. Clarke
2009
journals/compsec
From desktop to mobile: Examining the security experience.
Reinhardt A. Botha
Steven Furnell
Nathan L. Clarke
2009
conf/sec
Flexible and Transparent User Authentication for Mobile Devices.
Nathan L. Clarke
Sevasti Karatzouni
Steven Furnell
2008
conf/sec
Investigating the problem of IDS false alarms: An experimental study using Snort.
Gina C. Tjhai
Maria Papadaki
Steven Furnell
Nathan L. Clarke
2007
journals/compsec
Advanced user authentication for mobile devices.
Nathan L. Clarke
Steven Furnell
2007
conf/sec
Keystroke Analysis for Thumb-based Keyboards on Mobile Devices.
Sevasti Karatzouni
Nathan L. Clarke
2005
journals/compsec
Authentication of users on mobile telephones - A survey of attitudes and practices.
Nathan L. Clarke
Steven Furnell
2003
conf/sec
Using Keystroke Analysis as a Mechanism for Subscriber Authentication on Mobile Handsets.
Nathan L. Clarke
Steven Furnell
Benn Lines
Paul L. Reynolds
2002
journals/compsec
Acceptance of Subscriber Authentication Methods For Mobile Telephony Devices.
Nathan L. Clarke
Steven Furnell
Philip M. Rodwell
Paul L. Reynolds
Coauthors
Abdulrahman Alruban
(1)
Benn Lines
(1)
Burhan Al-Bayati
(1)
Chris G. Hocking
(1)
Dimitrios Kontogeorgis
(1)
Fudong Li
(3)
Gina C. Tjhai
(2)
Hataichanok Saevanee
(3)
Hind Alobaidi
(1)
Maria Papadaki
(3)
Muhammad Ali
(1)
Nathan L. Clarke
(19)
Nor Badrul Anuar
(1)
Paul Dowland
(1)
Paul L. Reynolds
(3)
Philip M. Rodwell
(1)
Reinhardt A. Botha
(1)
Sevasti Karatzouni
(2)
Stavros Shiaeles
(1)
Steven Furnell
(13)
Steven M. Furnell
(2)
Valerio Biscione
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to