default search action
Keith Harrison
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c26]Keith Harrison, Greg White, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2024: 1880 - 2023
- [c25]Keith Harrison, Wm. Arthur Conklin, Greg White:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2023: 1673 - 2022
- [c24]Scott Semian, Keith Harrison:
The Dark Blue CyberPatriot Training Tool. HICSS 2022: 1-10 - [c23]Gregory B. White, Keith Harrison, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2022: 1 - 2021
- [c22]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2021: 1 - 2020
- [c21]Gregory White, Keith Harrison, Wm. Arthur Conklin:
Introduction to the Minitrack on Cybersecurity and Privacy in Government. HICSS 2020: 1-2
2010 – 2019
- 2019
- [c20]Wm. Arthur Conklin, Gregory White, Keith Harrison:
Introduction to the Minitrack on Cybersecurity in Digital Government. HICSS 2019: 1 - [c19]Gregory White, Natalie Sjelin, Keith Harrison:
The Need for Information Sharing and Analysis Organizations to Combat Attacks on States and Community Public and Private Networks. HICSS 2019: 1-9 - 2018
- [c18]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to the Minitrack on Cybersecurity and Government. HICSS 2018: 1 - 2017
- [c17]Gregory White, Wm. Arthur Conklin, Keith Harrison:
Introduction to Cybersecurity and Government Minitrack. HICSS 2017: 1 - [c16]Gregory White, Keith Harrison:
State and Community Information Sharing and Analysis Organizations. HICSS 2017: 1-9 - 2015
- [j4]John T. Saxon, Behzad Bordbar, Keith Harrison:
Introspecting for RSA Key Material to Assist Intrusion Detection. IEEE Cloud Comput. 2(5): 30-38 (2015) - [c15]Keith Harrison, James Rutherford, Gregory B. White:
The Honey Community: Use of Combined Organizational Data for Community Protection. HICSS 2015: 2288-2297 - [c14]John T. Saxon, Behzad Bordbar, Keith Harrison:
Efficient Retrieval of Key Material for Inspecting Potentially Malicious Traffic in the Cloud. IC2E 2015: 155-164 - 2014
- [c13]Adrian L. Shaw, Behzad Bordbar, John T. Saxon, Keith Harrison, Chris I. Dalton:
Forensic Virtual Machines: Dynamic Defence in the Cloud via Introspection. IC2E 2014: 303-310 - 2013
- [j3]Keith Harrison, Gregory B. White:
Anonymous and Distributed Community Cyberincident Detection. IEEE Secur. Priv. 11(5): 20-27 (2013) - 2012
- [c12]Keith Harrison, Behzad Bordbar, Syed T. T. Ali, Chris I. Dalton, Andrew P. Norman:
A Framework for Detecting Malware in Cloud by Identifying Symptoms. EDOC 2012: 164-172 - 2011
- [c11]Keith Harrison, Gregory White:
A Taxonomy of Cyber Events Affecting Communities. HICSS 2011: 1-9 - 2010
- [j2]Gregory B. White, Dwayne Williams, Keith Harrison:
The CyberPatriot National High School Cyber Defense Competition. IEEE Secur. Priv. 8(5): 59-61 (2010) - [c10]Keith Harrison, Gregory White:
An Empirical Study on the Effectiveness of Common Security Measures. HICSS 2010: 1-7
2000 – 2009
- 2007
- [c9]Keith Harrison, Shouhuai Xu:
Protecting Cryptographic Keys from Memory Disclosure Attacks. DSN 2007: 137-143 - 2003
- [c8]Marco Casassa Mont, Pete Bramhall, Keith Harrison:
A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care. DEXA Workshops 2003: 432-437 - [c7]Marco Casassa Mont, Keith Harrison, Martin Sadler:
The HP time vault service: exploiting IBE for timed release of confidential information. WWW 2003: 160-169 - 2002
- [j1]Keith Harrison, Dan Page, Nigel P. Smart:
Software Implementation of Finite Fields of Characteristic Three, for Use in Pairing-based Cryptosystems. LMS J. Comput. Math. 5: 181-193 (2002) - [c6]Steven D. Galbraith, Keith Harrison, David Soldera:
Implementing the Tate Pairing. ANTS 2002: 324-337 - [c5]Marco Casassa Mont, Adrian Baldwin, Yolanta Beres, Keith Harrison, Martin Sadler, Simon Shiu:
Reducing Risks of Widespread Faults and Attacks for Commercial Software Applications: Towards Diversity of Software Components. COMPSAC 2002: 271-278 - [c4]Liqun Chen, Keith Harrison, David Soldera, Nigel P. Smart:
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. InfraSec 2002: 260-275 - [c3]Liqun Chen, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart:
Certification of Public Keys within an Identity Based System. ISC 2002: 322-333
1990 – 1999
- 1998
- [c2]Richard Granville, Keith Harrison:
Use of Static Code Analysis to Support the Safety Certification of Airborne Software. SSS 1998: 169-183 - 1990
- [c1]Keith Harrison:
GAP: An Exercise in Model Oriented Programming. ALPUK 1990: 159-172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint