Follow
Allan Tomlinson
Allan Tomlinson
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Survey on security challenges for swarm robotics
F Higgins, A Tomlinson, KM Martin
2009 Fifth International Conference on Autonomic and Autonomous Systems, 307-312, 2009
1142009
Threats to the swarm: Security considerations for swarm robotics
F Higgins, A Tomlinson, KM Martin
International Journal on Advances in Security 2 (2&3), 2009
942009
Introduction to the TPM
A Tomlinson
Smart Cards, Tokens, Security and Applications, 173-191, 2017
782017
Controlling transmission of broadcast content
A Tomlinson, AW Dent
US Patent 7,698,554, 2010
412010
Secure virtual disk images for grid computing
C Gebhardt, A Tomlinson
2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference, 19-29, 2008
292008
Secure delivery of conditional access applications to mobile receivers
E Gallery, A Tomlinson
Trusted Computing, 195-237, 2005
242005
Conditional access in mobile systems: Securing the application
E Gallery, A Tomlinson
First International Conference on Distributed Frameworks for Multimedia …, 2005
222005
Review of potential attacks on robotic swarms
I Sargeant, A Tomlinson
Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016: Volume …, 2018
192018
Challenges for Inter Virtual Machine Communication
C Gebhardt, A Tomlinson
Technical Report RHUL-MA-2010-12, Department of Mathematics, Royal Holloway …, 2010
192010
A distinguishing attack with a neural network
WAR De Souza, A Tomlinson
2013 IEEE 13th International Conference on Data Mining Workshops, 154-161, 2013
172013
Security challenges in the personal distributed environment
S Schwiderski-Grosche, A Tomlinson, SK Goo, JM Irvine
Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th 5, 3267 …, 2004
172004
Modelling malicious entities in a robotic swarm
I Sargeant, A Tomlinson
2013 IEEE/AIAA 32nd Digital Avionics Systems Conference (DASC), 7B1-1-7B1-12, 2013
162013
Maliciously manipulating a robotic swarm
I Sargeant, A Tomlinson
Proc. of ESCS 16, 2016
152016
Privacy threats in a mobile enterprise social network
A Tomlinson, PW Yau, JA MacDonald
Information Security Technical Report 15 (2), 57-66, 2010
152010
Securing grid workflows with trusted computing
PW Yau, A Tomlinson, S Balfe, E Gallery
Computational Science–ICCS 2008: 8th International Conference, Kraków …, 2008
142008
Security consideration for virtualization
C Gebhardt, A Tomlinson
Technical Report RHUL–MA–2008–16, Department of Mathematics, Royal Holloway …, 2009
132009
Separating hypervisor trusted computing base supported by hardware
C Gebhardt, CI Dalton, A Tomlinson
Proceedings of the fifth ACM workshop on scalable trusted computing, 79-84, 2010
122010
Towards privacy in a context-aware social network based recommendation system
PW Yau, A Tomlinson
2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011
112011
Protection of downloadable software on SDR devices
E Gallery, A Tomlinson
Proceedings of the 4th Software Defined Radio Forum Technical Conference …, 2005
112005
Application of trusted computing to secure video broadcasts to mobile receivers
E Gallery, A Tomlinson, R Delicata
Technical Report RHUL-MA-2005-11, 2005
102005
The system can't perform the operation now. Try again later.
Articles 1–20