default search action
David Llewellyn-Jones
Person information
- affiliation: Liverpool John Moores University, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j12]Seb Aebischer, Claudio Dettoni, Graeme Jenkinson, Kat Krol, David Llewellyn-Jones, Toshiyuki Masui, Frank Stajano:
Deploying authentication in the wild: towards greater ecological validity in security usability studies. J. Cybersecur. 6(1) (2020) - [j11]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
A community-based social P2P network for sharing human life digital memories. Trans. Emerg. Telecommun. Technol. 31(4) (2020) - [j10]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring communities for sharing human digital memories in a social P2P network. Peer-to-Peer Netw. Appl. 13(5): 1629-1642 (2020) - [i1]Haseeb Ur Rahman, Madjid Merabti, David Llewellyn-Jones, Sud Sudirman, Anwar Ghani:
Structuring Communities for Sharing Human Digital Memories in a Social P2P Network. CoRR abs/2004.08441 (2020)
2010 – 2019
- 2018
- [c44]Graham Rymer, David Llewellyn-Jones:
Raven Authentication Service - Attacks and Countermeasures. Security Protocols Workshop 2018: 1-14 - [c43]Kat Krol, David Llewellyn-Jones, Seb Aebischer, Claudio Dettoni, Frank Stajano:
Intentionality and Agency in Security. Security Protocols Workshop 2018: 114-125 - 2016
- [j9]José Quiroga, Francisco Ortin, David Llewellyn-Jones, Miguel García:
Optimizing runtime performance of hybrid dynamically and statically typed languages for the .Net platform. J. Syst. Softw. 113: 114-129 (2016) - [c42]Tim Panton, David Llewellyn-Jones, Nathan Shone, Mahmoud Hashem Eiza:
Secure proximity-based identity pairing using an untrusted signalling service. CCNC 2016: 942-947 - [c41]David Llewellyn-Jones, Graeme Jenkinson, Frank Stajano:
Explicit Delegation Using Configurable Cookies. Security Protocols Workshop 2016: 141-152 - [c40]David Llewellyn-Jones:
Explicit Delegation Using Configurable Cookies (Transcript of Discussion). Security Protocols Workshop 2016: 153-164 - [c39]Ian Goldberg, Graeme Jenkinson, David Llewellyn-Jones, Frank Stajano:
Red Button and Yellow Button: Usable Security for Lost Security Tokens. Security Protocols Workshop 2016: 165-171 - 2015
- [j8]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
On the evaluation of reputation and trust-based schemes in mobile ad hoc networks. Secur. Commun. Networks 8(18): 4041-4052 (2015) - [c38]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones:
A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing. CIT/IUCC/DASC/PICom 2015: 618-625 - [c37]Curtis L. Maines, David Llewellyn-Jones, Stephen Tang, Bo Zhou:
A Cyber Security Ontology for BPMN-Security Extensions. CIT/IUCC/DASC/PICom 2015: 1756-1763 - [c36]Mustafa Anil Tuncel, Hulya Francis, Mark Taylor, David Llewellyn-Jones:
Visualdrives Forensic Tool. DeSE 2015: 107-111 - [c35]Curtis L. Maines, Stephen Tang, David Llewellyn-Jones:
VICTour 1.1: Introducing Virtual Learning Environments and Gamification. DeSE 2015: 159-164 - 2014
- [j7]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Creating human digital memories with the aid of pervasive mobile devices. Pervasive Mob. Comput. 12: 160-178 (2014) - [c34]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
The Big Data Obstacle of Lifelogging. AINA Workshops 2014: 922-926 - [p5]David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Extending AOP Principles for the Description of Network Security Patterns. Cyberpatterns 2014: 73-84 - [p4]Bo Zhou, David Llewellyn-Jones, David J. Lamb, Muhammad Asim, Qi Shi, Madjid Merabti:
A Heuristic Approach for Secure Service Composition Adaptation. Cyberpatterns 2014: 97-105 - [p3]Muhammad Asim, Bo Zhou, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
Dynamic Monitoring of Composed Services. Cyberpatterns 2014: 235-245 - 2013
- [j6]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones, Faycal Bouhafs:
Exploiting linked data to create rich human digital memories. Comput. Commun. 36(15-16): 1639-1656 (2013) - [j5]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Lightweight Sybil Attack Detection in MANETs. IEEE Syst. J. 7(2): 236-248 (2013) - [c33]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti:
Prototype for design-time secure and trustworthy service composition. CCNC 2013: 847-848 - [c32]Dhouha Ayed, Muhammad Asim, David Llewellyn-Jones:
An event processing approach for threats monitoring of service compositions. CRiSIS 2013: 1-10 - [c31]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Creating human digital memories for a richer recall of life experiences. ICNSC 2013: 246-251 - [c30]Mohd Rizuan Baharon, Qi Shi, David Llewellyn-Jones, Madjid Merabti:
Secure rendering process in cloud computing. PST 2013: 82-87 - [c29]Muhammad Asim, David Llewellyn-Jones, Brett Lempereur, Bo Zhou, Qi Shi, Madjid Merabti:
Event Driven Monitoring of Composite Services. SocialCom 2013: 550-557 - 2012
- [j4]Miguel García, David Llewellyn-Jones, Francisco Ortin, Madjid Merabti:
Applying dynamic separation of aspects to distributed systems security: A case study. IET Softw. 6(3): 231-248 (2012) - [j3]Qi Shi, Ning Zhang, David Llewellyn-Jones:
Efficient autonomous signature exchange on ubiquitous networks. J. Netw. Comput. Appl. 35(6): 1793-1806 (2012) - [c28]Chelsea Dobbins, Paul Fergus, Madjid Merabti, David Llewellyn-Jones:
Monitoring and measuring sedentary behaviour with the aid of human digital memories. CCNC 2012: 395-398 - [c27]Bo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb:
A Compose Language-Based Framework for Secure Service Composition. CyberSecurity 2012: 195-202 - [c26]Chelsea Dobbins, Paul Fergus, Madjid Merabti, David Llewellyn-Jones:
Remotely monitoring and preventing the development of pressure ulcers with the aid of human digital memories. ICC 2012: 6101-6105 - [c25]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Augmenting human digital memories with physiological data. NESEA 2012: 1-7 - [c24]Chelsea Dobbins, Madjid Merabti, Paul Fergus, David Llewellyn-Jones:
Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services. PerCom Workshops 2012: 64-69 - [c23]Michael Kennedy, David Llewellyn-Jones, Qi Shi, Madjid Merabti:
A framework for measuring security of services in ubiquitous computing environments. PerCom Workshops 2012: 112-117 - 2011
- [c22]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
The effect of direct interactions on reputation based schemes in mobile ad hoc networks. CCNC 2011: 297-302 - [c21]Abdullahi Arabo, Mike Kennedy, Qi Shi, Madjid Merabti, David Llewellyn-Jones, Kashif Kifayat:
Identity management in System-of-Systems Crisis Management situation. SoSE 2011: 37-42 - [c20]Per Håkon Meland, Juan Bareño Guerenabarrena, David Llewellyn-Jones:
The challenges of secure and trustworthy service composition in the Future Internet. SoSE 2011: 329-334 - [c19]Alexander John Karran, John Haggerty, David J. Lamb, Mark John Taylor, David Llewellyn-Jones:
A Social Network Discovery Model for Digital Forensics Investigations. WDFIA 2011: 160-170 - 2010
- [j2]Jean-Henry Morin, Shiguo Lian, Xin Wang, David Llewellyn-Jones:
Guest Editorial. J. Multim. 5(5): 401-403 (2010) - [c18]Chunlin Song, Sud Sudirman, Madjid Merabti, David Llewellyn-Jones:
Analysis of Digital Image Watermark Attacks. CCNC 2010: 1-5 - [c17]Bo Zhou, Oliver Drew, Abdullahi Arabo, David Llewellyn-Jones, Kashif Kifayat, Madjid Merabti, Qi Shi, Rachel Craddock, Adrian Waller, Glyn Jones:
System-of-systems boundary check in a public event scenario. SoSE 2010: 1-8 - [c16]Sohail Abbas, Madjid Merabti, David Llewellyn-Jones:
Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks. Wireless Days 2010: 1-6 - [p2]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Security in Wireless Sensor Networks. Handbook of Information and Communication Security 2010: 513-552
2000 – 2009
- 2009
- [c15]Benahmed Khelifa, Hafid Haffaf, Madjid Merabti, David Llewellyn-Jones:
Monitoring connectivity in wireless sensor networks. ISCC 2009: 507-512 - [c14]R. J. Thompson, A. G. Laws, Denis Reilly, A. Taleb-Bendiab, David Llewellyn-Jones:
Towards viable computer systems: a set theory interpretation of ecological dependence within Beer's self-organizing viable system model. MEDES 2009: 73-77 - 2008
- [c13]Paul Fergus, David Llewellyn-Jones, Amjad Shaheed, Madjid Merabti, Abdennour El Rhalibi:
Networked Appliances: Manipulation of 3D Multimedia Streams. CCNC 2008: 1117-1122 - [c12]John Haggerty, David Llewellyn-Jones, Mark John Taylor:
FORWEB: file fingerprinting for automated network forensics investigations. e-Forensics 2008: 29 - 2007
- [c11]Kashif Kifayat, Madjid Merabti, Qi Shi, David Llewellyn-Jones:
Applying Secure Data Aggregation techniques for a Structure and Density Independent Group Based Key Management Protocol. IAS 2007: 44-49 - [c10]Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Abdennour El Rhalibi:
Bridging the Gap between Networked Appliances and Virtual Worlds. AINA Workshops (1) 2007: 935-940 - [c9]Djamel Djenouri, Othmane Mahmoudi, Mohamed Bouamama, David Llewellyn-Jones, Madjid Merabti:
On Securing MANET Routing Protocol Against Control Packet Dropping. ICPS 2007: 100-108 - [c8]Paul Fergus, David Llewellyn-Jones, Madjid Merabti, Arshad Haroon:
Networked Appliances for Home Healthcare and Lifestyle Management. IHN 2007: 313-328 - 2006
- [j1]Madjid Merabti, David Llewellyn-Jones:
Digital Rights Management in Ubiquitous Computing. IEEE Multim. 13(2): 32-42 (2006) - [p1]Fausto J. Sainz de Salces, Michael Baskett, David Llewellyn-Jones, David England:
Ambient Interfaces for Elderly People at Home. Ambient Intelligence in Everyday 2006: 256-284 - 2005
- [c7]Mengjie Yu, David Llewellyn-Jones, A. Taleb-Bendiab:
An Knowledge Model for Self-regenerative Service Activations Adaptation Across Standards. CIS (1) 2005: 1074-1081 - [c6]Fausto J. Sainz de Salces, David England, David Llewellyn-Jones:
Designing for all in the house. CLIHC 2005: 283-288 - [c5]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Buffer Overrun Prevention Through Component Composition Analysis. COMPSAC (1) 2005: 156-163 - [c4]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
Short Paper: Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation. SecureComm 2005: 243-248 - 2004
- [c3]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
A security framework for executables in a ubiquitous computing environment. GLOBECOM 2004: 2158-2163 - [c2]David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob Askwith:
An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment. ITCC (1) 2004: 112-117 - 2002
- [c1]Y. Xue, David Llewellyn-Jones, Sean P. Lawrence:
On the Earth's surface energy exchange determination from ERS satellite ATSR data - heat exchange of coastal zones. IGARSS 2002: 1594-1596
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint