A proposed architecture for trusted third party services N Jefferies, C Mitchell, M Walker Cryptography: Policy and Algorithms: International Conference Brisbane …, 1996 | 142 | 1996 |
Wireless visions: a look to the future by the fellows of the WWRF K David, N Jefferies IEEE Vehicular Technology Magazine 7 (4), 26-36, 2012 | 17 | 2012 |
Global vision for a wireless world N Jefferies 18th wireless world research forum meeting, 2007 | 14 | 2007 |
Secure provision of UMTS services over diverse access networks JC Francis, H Herbrig, N Jefferies IEEE Communications Magazine 36 (2), 128-136, 1998 | 12 | 1998 |
Sporadic partitions of binomial coefficients N Jefferies Electronics Letters 15 (27), 1334-1336, 1991 | 12 | 1991 |
The wireless world initiative: a framework for research on systems beyond 3G H Abramowicz, N Niebert, W Mohr, L Hiebinger, J von Häfen, A Aftelak, ... Proc. of IST Mobile and Wireless Communications Summit, Lyon, France, 2004 | 11 | 2004 |
WWRF setting the research agenda for the wireless world N Jefferies Int. Conf. On Beyond 3G Mobile Communications, 2008 | 8 | 2008 |
Security in third-generation mobile systems N Jefferies IEE Colloquium on Security in Networks (Digest No. 1995/024), 8/1-8/5, 1995 | 8 | 1995 |
Instant knowledge: Secure autonomous business collaboration J Irvine, A McDiarmind, C Saunders, A Tomlinson, N Jefferies Proceedings of the Wireless World Research Forum Meeting 20, Ottawa, Ontario …, 2008 | 7 | 2008 |
Trusted third party based key management allowing warranted interception N Jefferies, C Mitchell, M Walker Proceedings: Public Key Infrastructure Invitational Workshop. MITRE, McLean …, 1995 | 7 | 1995 |
Scenarios for future communications environments PJ Turner, DR Basgeet, N Borselius, E Frazer, J Irvine, N Jefferies, ... ECS Dept., Southampton Univ., UK, Tech. Rep. ECSTR-IAM02–005, 2002 | 6 | 2002 |
Practical solutions to key escrow and regulatory aspects N Jefferies, C Mitchell, M Walker Proceedings of Public Key Solutions 96, 1996 | 5 | 1996 |
User 2020: A WWRF Vision J Porras, K Heikkinen, M Kinnula, LT Sørensen, L Hennala, H Melkas, ... | 4 | 2014 |
Instant knowledge: a secure mobile context-aware distributed recommender system M Helmhout, A McDiarmid, A Tomlinson, J Irvine, C Saunders, ... ICT Mobile Summit 2009, 2009 | 4 | 2009 |
Managing increasingly software dependent mobile systems N Jefferies, J Irvine, A Munro, K Moessner Second International Conference on 3G Mobile Communication Technologies, 247-251, 2001 | 3 | 2001 |
The Wireless world research forum looks to the future K David, S Dixit, N Jefferies IEEE Vehicular Technology Magazine 5 (3), 2010 | 2 | 2010 |
Securing access to mobile networks beyond 3G C Gehrmann, G Horn, N Jefferies, C Mitchell Proceedings of the IST Communications Summit, 2001 | 2 | 2001 |
Combining TTP-based key management with key escrow C Mitchell, M Walker University of London, Royal Holloway, Department of Computer Science, 1996 | 2 | 1996 |
30 Radio-over-Fiber Architectures K David, S Dixit, N Jefferies IEEE Vehicular Technology Magazine, 2010 | 1 | 2010 |
Providing secure personal mobility N Jefferies IEE Colloquium on UMPTS and UPT, 4/1-4/4, 1994 | 1 | 1994 |