Publications

[1] Po-Wah Yau and Allan Tomlinson. Towards privacy in a context-aware social network based recommendation system. In SocialCom 2011, 3rd IEEE International Conference on Social Computing, Boston, October 2011. IEEE Computer Society. [ bib ]
[2] Po-Wah Yau and Allan Tomlinson. Development of a privacy architecture for an Instant Knowledge system. In 2011 International Conference on E-Learning, E-Business, Enterprise Information Systems, & E-Government, EEE 2011, Las Vegas NV, July 2011. CSREA Press. [ bib ]
[3] Allan Tomlinson, Po-Wah Yau, and John A. MacDonald. Privacy Threats in a Mobile Enterprise Social Network. Information Security Technical Report, 15(2):57 - 66, May 2011. [ bib | DOI ]
[4] Clarenta George, Swee Keow Goo, and Allan Tomlinson. Theoretical Analysis of Security Attacks from a Swarm-like Perspective. In Cyberforensics 2011. University of Strathclyde Publishing, 2011. [ bib ]
[5] Carl Gebhardt, Chris I. Dalton, and Allan Tomlinson. Separating Hypervisor Trusted Computing Base Supported by Hardware. In Proceedings of the fifth ACM workshop on Scalable trusted computing, STC '10, pages 79-84, Chicago, October 2010. ACM Press. [ bib | DOI | http ]
[6] Po-Wah Yau and Allan Tomlinson. Misuse cases for an Instant Knowledge system. In Wireless World Research Forum. WWRF, 2010. [ bib ]
[7] Nazir A Malik and Allan Tomlinson. Web-Services Architecture for Pervasive Computing Environment. Pakistan Journal of Science, 61(3):153 - 157, September 2009. [ bib | .pdf ]
[8] Nazir A Malik and Allan Tomlinson. Privacy and Consent in Pervasive Networks. Information Security Technical Report, 14(3):138 - 142, August 2009. [ bib | DOI ]
[9] Carlo Gebhardt and Allan Tomlinson. Trusted Virtual Disk Images. In David Gawrock, Helmut Reimer, Ahmad-Reza Sadeghi, and Claire Vishik, editors, Future of Trust in Computing, pages 197-207. Vieweg & Teubner, Berlin, July 2009. 10.1007/978-3-8348-9324-6_21. [ bib | http ]
[10] Swee Keow Goo, James M. Irvine, Ivan Andonovic, and Allan Tomlinson. Preserving Privacy in Assistive Technologies. In First International Workshop on Medical Applications Networking (MAN 2009), pages 110 - 115, Dresden, June 2009. IEEE. [ bib | DOI ]
[11] Martin Helmhout, Craig Saunders, Allan Tomlinson, John A. MacDonald, Jame M. Irvine, and Alisdair McDiarmid. Instant Knowledge: a Secure Mobile Context-Aware Distributed Recommender System. In Paul Cunningham and Miriam Cunningham, editors, ICT - MobileSummit 2009, Santander, June 2009. IIMC International Information Management Corporation. [ bib ]
[12] Fiona Higgins, Allan Tomlinson, and Keith Martin. Survey on Security Challenges for Swarm Robotics. In Radu Calinescu, Fidel Liberal, Mauricio Marin, Lourdes Penalver Herrero, Carlos Turro, and Manuela Popescu, editors, Fifth International Conference on Autonomic and Autonomous Systems (ICAS 2009), pages 307- 312, Valencia, April 2009. IEEE Computer Society. [ bib | DOI ]
[13] Fiona Higgins, Allan Tomlinson, and Keith Martin. Threats to the Swarm: Security Considerations for Swarm Robotics. International Journal on Advances in Security, 2(3):288 - 297, 2009. [ bib | .html ]
[14] Po-Wah Yau and Allan Tomlinson. Enhancing Grid Security Using Workflows, Trusted Computing and Virtualisation. In International Conference on Grid Computing and Applications (GCA 09), pages 113 - 119, Las Vegas, NV, 2009. [ bib ]
[15] Po-Wah Yau, Allan Tomlinson, Shane Balfe, and Eimear Gallery. Securing Grid Workflows with Trusted Computing. In Marian Bubak, Geert Dick van Albada, Jack Dongarra, and Peter M.A. Sloo, editors, ICCS 2008 8th International Conference on International Conference on Computational Science, volume 5103-0510 of LNCS, pages 510-519, Krakow, Poland, June 2008. Springer. [ bib | http ]
[16] Allan Tomlinson. Developments in mobile communications security. Information Security Technical Report, 13(3):111 - 111, 2008. [ bib | DOI | http ]
[17] Allan Tomlinson. Security For Video Broadcasting. In Smart Cards, Tokens, Security and Applications, pages 139-154. Springer, 2008. [ bib | DOI ]
[18] Allan Tomlinson. Introduction to the TPM. In Smart Cards, Tokens, Security and Applications, pages 155-172. Springer, 2008. [ bib | DOI ]
[19] Po-Wah Yau, Allan Tomlinson, Shane Balfe, and Eimear Gallery. Securing Grid Workflows with Trusted Computing (Extended Abstract). In Eighth IEEE International Symposium on Cluster Computing and the Grid (CCGRID), page 700, 2008. [ bib | DOI ]
[20] Carl Gebhardt and Allan Tomlinson. Security consideration for virtualization. Technical Report RHUL-MA-2008-16, Department of Mathematics, Royal Holloway, University of London, 2008. [ bib | .pdf ]
[21] P.-W. Yau and A. Tomlinson. Using Trusted Computing in Commercial Grids. In Babak Akhgar, editor, Proceedings of the 15th International Workshops on Conceptual Structures (ICCS 2007), Sheffield, UK, July 22-27, 2007, pages 31-36. Springer-Verlag, July 2007. [ bib ]
[22] Allan Tomlinson. Editorial. Information Security Technical Report, 12(3):111-112, 2007. [ bib | DOI | http ]
[23] Swee Keow Goo, James Irvine, and Allan Tomlinson. An Overview of the Formal Verification on the Digital Marketplace Cryptographic Protocols. In 4th Internationall Conference on Applied Cryptography and Network Security (ACNS), June 2006. [ bib ]
[24] Eimear Gallery and Allan Tomlinson. Protection of Downloadable Software on SDR Devices. In Software Defined Radio Technical Conference SDR05, November 2005. [ bib ]
[25] Scarlet Schwiderski-Grosche, Allan Tomlinson, and David B. Pearce. Towards the Secure Initialisation of a Personal Distributed Environment. Technical Report RHUL-MA-2005-09, Department of Mathematics, Royal Holloway, University of London, July 2005. [ bib | .pdf ]
[26] Eimear Gallery, Allan Tomlinson, and Rob Delicata. Application of Trusted Computing to Secure Video Broadcasts to Mobile Receivers. Technical Report RHUL-MA-2005-11, Department of Mathematics, Royal Holloway, University of London, June 2005. (submitted to IEEE Trans. on Vehicular Technology). [ bib | .pdf ]
[27] Swee Keow Goo, James M. Irvine, John Dunlop, Allan Tomlinson, and Scarlet Schwiderski-Grosche. Security Requirements for Mobile Service Provision via a Digital Marketplace (Invited Paper). In 11th European Wireless Conference, EW '05, volume 2, pages 573-581, Nicosia, Cyprus, April 2005. VDE, VDE Verlag. [ bib | http ]
[28] Paul Pangalos, Kar Ann Chew, Nima Sattari, Allan Tomlinson, Robert Atkinson, Hamid Aghvami, and Rahim Tafazolli. The Mobile VCE Architecture for the Interworking of Mobile and Broadcast Networks. In 11th European Wireless Conference, EW '05, volume 2, pages 823-828, Nicosia, Cyprus, April 2005. VDE, VDE Verlag. [ bib | http ]
[29] Eimear Gallery and Allan Tomlinson. Conditional Access in Mobile Systems: Securing the Application. In The First International Conference on Distributed Frameworks for Multimedia Applications DFMA 05, pages 190-197, Los Alamitos, CA, USA, February 2005. IEEE Computer Society. [ bib | DOI ]
[30] Alexander W. Dent and Allan Tomlinson. Controlling Transmission of Broadcast Content. US patent filing, 11/056 681, February 2005. [ bib ]
[31] Eimear Gallery and Allan Tomlinson. Secure Delivery of Conditional Access Applications to Mobile Receivers. In Chris J. Mitchell, editor, Trusted Computing. IEE, 2005. [ bib ]
[32] Swee Keow Goo, James M. Irvine, Allan Tomlinson, and Scarlet Schwiderski-Grosche. Designing and Verifying Secure Protocols of the Digital Marketplace. In International Workshop on Satellite and Space Communications 2005 (IWSSC 2005), Sienna, Italy, 2005. IEEE. [ bib ]
[33] Karen Louise Billington and Allan Tomlinson. Mutual Authentication of B3G devices within Personal Distributed Environments. In Fifth International Conference on 3G Mobile Communications Technologies, 3G 2004, pages 452-456, London, UK, October 2004. IEE. [ bib ]
[34] Alexander W. Dent and Allan Tomlinson. Regional Blackouts: Protection of Broadcast Content on 3G Networks. In Fifth International Conference on 3G Mobile Communications Technologies, 3G 2004, pages 442-446, London, UK, October 2004. IEE. [ bib ]
[35] Allan Tomlinson and Scarlet Schwiderski-Grosche. Application of Grid Security to Personal Distributed Environments. In Robert Meersman, Zahir Tari, and Angelo Corsaro, editors, First International Workshop on Grid Computing and its Application to Data Analysis GADA '04, volume 3292 of LNCS OTM Workshops, pages 68-78, Cyprus, October 2004. Springer-Verlag. [ bib | DOI ]
[36] Scarlet Schwiderski-Grosche, Allan Tomlinson, Swee Keow Goo, and James M. Irvine. Security Challenges in the Personal Distributed Environment. In 60th Vehicular Technology Conference, VTC Fall '04, pages 3267 - 3270, Los Angeles, USA, September 2004. IEEE. [ bib | DOI ]
[37] Alexander W. Dent and Allan Tomlinson. Controlling Transmission of Broadcast Content. GB patent filing, GB0403218.1, February 2004. [ bib ]
[38] Allan Tomlinson. Modulo Multiplier to enhance encryption rates. Electronic Engineering, 62(760):25, April 1990. [ bib ]
[39] Allan Tomlinson. Bit-Serial Modulo Multiplier. Electronics Letters, 25(24):1664, November 1989. [ bib ]
[40] Allan Tomlinson and A. R. Mirza. Single-chip 2-port Adapters for Wave Digital Filters. Electronics Letters, 25(23):1553-1555, 1989. [ bib ]
[41] Mike S. McGregor, Allan Tomlinson, and Ooi Kiang Tan. Experiences of SOLO 1000 in research at the University of Edinburgh. In P.L. Jones and A. Buckley, editors, Electronics Computer Aided Design, pages 182-184. Manchester University Press, 1989. [ bib ]

This file was generated by bibtex2html 1.95.

Valid CSS! Valid XHTML 1.0 Strict