Farrell, Stephen, Requirements Analysis Required--Otherwise Targeted Monitoring Enables Pervasive Monitoring, Computer, (3), 2016, p34--40 ,
Journal Article,
PUBLISHED
|
Stephen Farrell, Paul HOffman, Michael Thomas, 'RFC7486, HTTP Origin-Bound Authentication (HOBA)', IETF, 2015, -,
Protocol or guideline,
PUBLISHED
URL
|
S.Farrell, 'RFC 7258/BCP 188 Pervasive Monitoring is an Attack', IETF, 2014, -,
Protocol or guideline,
PUBLISHED
DOI
|
S.Farrell, Why Pervasive Monitoring Is Bad, IEEE Internet Computing, 2014, p4 - 7,
Journal Article,
PUBLISHED
DOI
|
S.Farrell, 'RFC 6920 Naming Things with Hashes', IETF, 2013, -,
Protocol or guideline,
PUBLISHED
DOI
|
Christian Dannewitz, Dirk Kutscher, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl, Network of Information (NetInf) - An information-centric networking architecture, Computer Communications, 36, (7), 2013, p721-735 ,
Journal Article,
PUBLISHED
DOI
|
S.Farrell, CRiSIS 2012 security standards tutorial, Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on. IEEE, 2012,
Conference Paper,
PUBLISHED
DOI
|
S.Turner,S.Farrell,P.St-Andre, The Need for a Web Security API, W3C Identity in the Browser Workshop, Mountain View, Califronia, USA, 2011,
Conference Paper,
PUBLISHED
URL
|
Stephen Farrell, Leaky or Guessable Session Identifiers, IEEE Internet Computing, 15, (1), 2011, p88-91 ,
Journal Article,
PUBLISHED
TARA - Full Text
DOI
|
Farrell, S, McMahon, A, Meehan, E, Weber, S, Hartnett, K, Report on an Arctic summer DTN trial, WIRELESS NETWORKS, 17, 2011,
Journal Article,
PUBLISHED
TARA - Full Text
DOI
|
|