Andrew Martin
Andrew Martin
Professor of Systems Security, University of Oxford
Verified email at - Homepage
Cited by
Cited by
Uncertainty in predictions of the climate response to rising levels of greenhouse gases
DA Stainforth, T Aina, C Christensen, M Collins, N Faull, DJ Frame, ...
Nature 433 (7024), 403-406, 2005
Threat-based security analysis for the internet of things
AW Atamli, A Martin
2014 International Workshop on Secure Internet of Things, 35-43, 2014
Smart grid metering networks: A survey on security, privacy and open research issues
P Kumar, Y Lin, G Bai, A Paverd, JS Dong, A Martin
IEEE Communications Surveys & Tutorials 21 (3), 2886-2927, 2019
Using propositional logic for requirements verification of service workflow
L Da Xu, W Viriyasitavat, P Ruchikachorn, A Martin
IEEE Transactions on Industrial Informatics 8 (3), 639-646, 2012
Association of parameter, software, and hardware variation with large-scale behavior across 57,000 climate models
CG Knight, SHE Knight, N Massey, T Aina, C Christensen, DJ Frame, ...
Proceedings of the National Academy of Sciences 104 (30), 12259, 2007
Modelling and automatically analysing privacy properties for honest-but-curious adversaries
A Paverd, A Martin, I Brown
Tech. Rep, 2014
SWSpec: The requirements specification language in service workflow environments
W Viriyasitavat, L Da Xu, A Martin
IEEE Transactions on Industrial Informatics 8 (3), 631-638, 2012
Trust in the Cloud
IM Abbadi, A Martin
information security technical report 16 (3-4), 108-114, 2011
Lightweight authentication and key agreement for smart metering in smart energy networks
P Kumar, A Gurtov, M Sain, A Martin, PH Ha
IEEE Transactions on Smart Grid 10 (4), 4349-4359, 2018
Trusted computing and provenance: Better together
J Lyle, A Martin
Usenix, 2010
The ten-page introduction to Trusted Computing
A Martin
A set-theoretic model for real-time specification and reasoning
CJ Fidge, IJ Hayes, AP Martin, AK Wabenhorst
Mathematics of Program Construction: 4th International Conference, MPC'98 …, 1998
A survey of trust in workflows and relevant contexts
W Viriyasitavat, A Martin
IEEE Communications Surveys & Tutorials 14 (3), 911-940, 2011
Security principles for public-resource modeling research
D Stainforth, A Martin, A Simpson, C Christensen, J Kettleborough, T Aina, ...
13th IEEE International Workshops on Enabling Technologies: Infrastructure …, 2004
myTrustedCloud: trusted cloud infrastructure for security-critical computation and data management
D Wallom, M Turilli, A Martin, A Raun, G Taylor, N Hargreaves, ...
Proceedings of the WICSA/ECSA 2012 Companion Volume, 82-83, 2012
Security and privacy in smart grid demand response systems
A Paverd, A Martin, I Brown
Smart Grid Security: Second International Workshop, SmartGridSec 2014 …, 2014
A tactic calculus—abridged version
AP Martin, PHB Gardiner, JCP Woodcock
Formal Aspects of Computing 8, 479-489, 1996
Scoping the cyber security body of knowledge
A Rashid, G Danezis, H Chivers, E Lupu, A Martin, M Lewis, C Peersman
IEEE Security & Privacy 16 (3), 96-102, 2018
Hardware security for device authentication in the smart grid
AJ Paverd, AP Martin
Smart Grid Security: First International Workshop, SmartGridSec 2012, Berlin …, 2013
Exploring the use of Intel SGX for secure many-party applications
KA Küçük, A Paverd, A Martin, N Asokan, A Simpson, R Ankele
Proceedings of the 1st Workshop on System Software for Trusted Execution, 1-6, 2016
The system can't perform the operation now. Try again later.
Articles 1–20