Allan Tomlinson
Allan Tomlinson
Verified email at - Homepage
Cited by
Cited by
Security Challenges for Swarm Robotics
F Higgins, A Tomlinson, KM Martin
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
Autonomic and Autonomous Systems, 2009. ICAS'09. Fifth International …, 2009
Threats to the swarm: security considerations for swarm robotics
F Higgins, A Tomlinson, KM Martin
International Journal on Advances in Security 2 (2&3), 2009
Introduction to the TPM
A Tomlinson
Smart Cards, Tokens, Security and Applications, 155-172, 2008
Controlling transmission of broadcast content
A Tomlinson, AW Dent
US Patent 7,698,554, 2010
Secure virtual disk images for grid computing
C Gebhardt, A Tomlinson
Trusted Infrastructure Technologies Conference, 2008. APTC'08. Third Asia …, 2008
Secure delivery of conditional access applications to mobile receivers
E Gallery, A Tomlinson
Trusted Computing, 195, 2005
Conditional access in mobile systems: Securing the application
E Gallery, A Tomlinson
Distributed Frameworks for Multimedia Applications, 2005. DFMA'05. First …, 2005
Security challenges in the personal distributed environment
S Schwiderski-Grosche, A Tomlinson, SK Goo, JM Irvine
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th 5, 3267 …, 2004
Security consideration for virtualization
C Gebhardt, A Tomlinson
Technical Report RHUL–MA–2008–16, Department of Mathematics, Royal Holloway …, 2009
Challenges for Inter Virtual Machine Communication
C Gebhardt, A Tomlinson
Technical Report RHUL-MA-2010-12, Department of Mathematics, Royal Holloway …, 2010
Securing grid workflows with trusted computing
PW Yau, A Tomlinson, S Balfe, E Gallery
Computational Science–ICCS 2008, 510-519, 2008
Separating hypervisor trusted computing base supported by hardware
C Gebhardt, CI Dalton, A Tomlinson
Proceedings of the fifth ACM workshop on Scalable trusted computing, 79-84, 2010
Privacy threats in a mobile enterprise social network
A Tomlinson, PW Yau, JA MacDonald
Information Security Technical Report 15 (2), 57-66, 2010
Modelling malicious entities in a robotic swarm
I Sargeant, A Tomlinson
Digital Avionics Systems Conference (DASC), 2013 IEEE/AIAA 32nd, 7B1-1-7B1-12, 2013
Protection of downloadable software on SDR devices
E Gallery, A Tomlinson
Proceedings of the 4th Software Defined Radio Forum Technical Conference …, 2005
Instant knowledge: Secure autonomous business collaboration
J Irvine, A McDiarmid, C Saunders, A Tomlinson, N Jefferies
Wireless World Research Forum 20, 2008, 2008
Application of trusted computing to secure video broadcasts to mobile receivers
E Gallery, A Tomlinson, R Delicata
EB/OL], http://www. rhu1. ac. uk/mathematics/techreports, June 20o5, 2005
Single-chip 2-port adaptors for wave digital filters
A Tomlinson, AR Mirzai
Electronics Letters 25 (23), 1553-1555, 1989
A distinguishing attack with a neural network
WAR De Souza, A Tomlinson
Data Mining Workshops (ICDMW), 2013 IEEE 13th International Conference on …, 2013
The system can't perform the operation now. Try again later.
Articles 1–20