Home > Research > Security Lancaster (Systems Security) > Publications & Outputs
View graph of relations

Security Lancaster (Systems Security)

  1. 2004
  2. Published

    Why Have Progresses in Real-Time Fault Tolerant Computing Been Slow?

    Kim, K. H., Ezhilchelvan, P. D., Kaiser, J., Moser, L. E., Nett, E. & Suri, N., 2004, IEEE Symposium on Reliable Distributed Systems . IEEE

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paper

  3. 2003
  4. Published

    A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes

    Fagoonee, L. & Honary, B., 12/2003, Cryptography and coding : 9th IMA International Conference on Cryptography and Coding. Paterson, K. G. (ed.). Berlin: Springer-Verlag, p. 24-34 11 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    Unequal Two-fold Turbo Codes and Digital Image Transmission

    Tanriover, C. C. & Honary, B., 12/2003, 7th International Symposium on Digital Signal Processing and Communication Systems .

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    On the limits of the precise specification of component interfaces

    Kopetz, H. & Suri, N., 1/10/2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, p. 26-27 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  7. Published

    Optimized usage of network resources based on context information

    Roedig, U. & Sreenan, C. J., 1/10/2003.

    Research output: Contribution to conference - Without ISBN/ISSN Poster

  8. Published

    Practical aspects of IP take-over mechanisms

    Fetzer, C. & Suri, N., 1/10/2003, 2003 The Ninth IEEE International Workshop on Object-Oriented Real-Time Dependable Systems. IEEE, p. 250-254 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  9. Published

    Image transmission using unequal error protection combined with two-fold turbo coding

    Tanriover, C. C. & Honary, B., 10/2003, Mobile Future and Symposium on Trends in Communications, 2003. SympoTIC '03. Joint First Workshop on . IEEE, p. i-v 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    NETKIT: A software component-based approach to programmable networking

    Coulson, G., Blair, G., Hutchison, D., Joolia, A. A., Lee, K., Ueyama, J., Gomes, A. & Ye, Y. M., 10/2003, In: Computer Communication Review. 33, 5, p. 55-65 11 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    A survey of key management for secure group communications.

    Rafaeli, S. & Hutchison, D., 1/09/2003, In: ACM Computing Surveys. 35, 3, p. 309-329 21 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    Introduction from session chair: multimedia and telecommunications track session:content caching

    Roedig, U., 1/09/2003, Euromicro Conference, 2003. Proceedings. 29th. IEEE, p. 232 1 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Back to top