Up a level |
Thomas, Richard James ORCID: https://orcid.org/0000-0002-7199-1265 (2019). A systematic development of a secure architecture for the European Rail Traffic Management System. University of Birmingham. Ph.D.
Li, Rujia (2022). Design and evaluation of blockchain-based security protocols. University of Birmingham. Ph.D.
Smyth, Ben (2011). Formal verification of cryptographic protocols with automated reasoning. University of Birmingham. Ph.D.
Lomuscio, Alessio (1999). Knowledge sharing among ideal agents. University of Birmingham. Ph.D.
Denzel, Michael (2018). Malware tolerance: Distributing trust over multiple devices. University of Birmingham. Ph.D.
Yu, Jiangshan (2016). Mitigating private key compromise. University of Birmingham. Ph.D.
Qunoo, Hasan Najib Yousif (2012). Modelling and verifying dynamic access control policies using knowledge-based model checking. University of Birmingham. Ph.D.
Batten, Ian Gilbert (2016). Trusted execution: applications and verification. University of Birmingham. Ph.D.
Salaiwarakul, Anongporn (2010). Verification of secure biometric authentication protocols. University of Birmingham. Ph.D.
Koleini, Masoud (2012). Verification of temporal-epistemic properties of access control systems. University of Birmingham. Ph.D.
Grewal, Gurchetan S (2015). Voting on the internet. University of Birmingham. Ph.D.