Dr Geraint Price

  1. 2011
  2. Published

    User-friendly and certificate-free grid security infrastructure

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G. 2011 In : International Journal of Information Security. 10, 3, p. 137-153 17 p.

    Research output: Contribution to journalArticle

  3. 2008
  4. Published

    The Benefits and Drawbacks of Using Electronic Identities

    Price, G. 2008 In : Information Security Technical Report. 13, 2

    Research output: Contribution to journalArticle

  5. 2007
  6. Published

    A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    Crampton, J., Lim, H. W., Paterson, K. G. & Price, G. 2007 6th Annual PKI R&D Workshop 2007, Gaithersburg, MD, USA. 17-19 April.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  7. 2006
  8. Published

    Public Key Infrastructures: A Research Agenda

    Price, G. 2006 In : Journal of Computer Security. 14, 5

    Research output: Contribution to journalArticle

  9. 2005
  10. Published

    Certificate management using distributed trusted third parties

    Dent, A. W. & Price, G. 2005 Trusted Computing. Mitchell, C. J. (ed.). IEE Press, p. 251-270 20 p.

    Research output: Chapter in Book/Report/Conference proceedingChapter

  11. Published

    Interoperation Between a Conventional PKI and an ID-Based Infrastructure

    Price, G. & Mitchell, C. J. 2005 Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005. Revised Selected Papers. Chadwick, D. W. & Zhao, G. (eds.). Springer-Verlag, p. 73-85 13 p. (Lecture Notes in Computer Science; vol. 3545)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  12. Unpublished

    PKI - An Insider's View (Extended Abstract)

    Price, G. 2005

    Research output: Working paper

  13. Published

    PKI Challenges: An industry analysis

    Price, G. 2005 Applied Public Key Infrastructure 4th International Workshop: IWAP 2005, Singapore. 21-23 Sept 2005. Zhou, J., Kang, M-C., Bao, F. & Pang, H-H. (eds.). IOS Press, (FAIA)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  14. 2003
  15. Published

    A comparison between traditional Public Key Infrastructures and Identity-Based Cryptography

    Paterson, K. G. & Price, G. 2003 PKI re-visited - current issues and future trends: v. 8 n. 3 of Information Security Technical Report. Elsevier, p. 57-72

    Research output: Chapter in Book/Report/Conference proceedingChapter

  16. Published

    Belief and Trust in Fault Tolerance

    Price, G. 2003 Proceedings of the 1st International Workshop on Formal Aspects in Security and Trust (FAST 2003). Dimitrakos, T. & Martinelli, F. (eds.).

    Research output: Chapter in Book/Report/Conference proceedingChapter

  17. Published

    Client v. Server side Protocols, Interfaces and Storage

    Price, G. 2003 Security Protocols, 11th International Workshop, Cambridge, UK. 2-4 April, 2003. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  18. Published

    PKI revisited - current issues and future trends

    Price, G. (ed.), Piper, F. (ed.) & Paterson, K. G. (ed.) 2003 Unkown Publisher. (Information Security Technical Report)

    Research output: Book/ReportBook

  19. 2001
  20. Published

    Thwarting timing attacks using ATM networks

    Price, G. 2001 Security Protocols, 9th International Workshop, Cambridge, UK. 25-27 April, 2001. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  21. 2000
  22. Published

    Broadening the scope of Fault Tolerance within Secure services

    Price, G. 2000 Security Protocols, 8th International Workshop, Cambridge, UK. 3-5 April, 2000. Springer-Verlag, (Lecture Notes in Computer Science)

    Research output: Chapter in Book/Report/Conference proceedingChapter

  23. 1999
  24. Published