Nigel Jefferies
Cited by
Cited by
A proposed architecture for trusted third party services
N Jefferies, C Mitchell, M Walker
International conference on Cryptography: policy and algorithms, 98-104, 1995
2020 Vision
K David, D Dixit, N Jefferies
IEEE Vehicular Technology Magazine 5 (3), 22-29, 2010
Global vision for a wireless world
N Jefferies
18th wireless world research forum meeting, 2007
Wireless visions: a look to the future by the fellows of the WWRF
K David, N Jefferies
IEEE Vehicular Technology Magazine 7 (4), 26-36, 2012
Sporadic partitions of binomial coefficients
N Jefferies
Electronics Letters 27 (15), 1334-1336, 1991
Secure provision of UMTS services over diverse access networks
JC Francis, H Herbrig, N Jefferies
IEEE Communications Magazine 36 (2), 128-136, 1998
The wireless world initiative: a framework for research on systems beyond 3G
H Abramowicz, N Niebert, W Mohr, L Hiebinger, J von Haefen, A Aftelak, ...
Proc. of IST Mobile and Wireless Communications Summit, Lyon, France, 2004
WWRF setting the research agenda for the wireless world
N Jefferies
Int. Conf. On Beyond 3G Mobile Communications, 2008
Instant knowledge: Secure autonomous business collaboration
J Irvine, A McDiarmind, C Saunders, A Tomlinson, N Jefferies
Proceedings of the Wireless World Research Forum Meeting 20, Ottawa, Ontario …, 2008
Scenarios for future communications environments
PJ Turner, DR Basgeet, N Borselius, E Frazer, J Irvine, N Jefferies, ...
Southampton University, 2002
Trusted third party based key management allowing warranted interception
N Jefferies, C Mitchell, M Walker
Proceedings: Public Key Infrastructure Invitational Workshop. MITRE, McLean …, 1995
Security in third-generation mobile systems
N Jefferies
IEE Colloquium on Security in Networks (Digest No. 1995/024), 8/1-8/5, 1995
Instant knowledge: a secure mobile context-aware distributed recommender system
M Helmhout, A McDiarmid, A Tomlinson, J Irvine, C Saunders, ...
ICT Mobile Summit 2009, 2009
Practical solutions to key escrow and regulatory aspects
N Jefferies, C Mitchell, M Walker
Proceedings of Public Key Solutions 96, 1996
User 2020: A WWRF Vision
J Porras, K Heikkinen, M Kinnula, LT Sørensen, L Hennala, H Melkas, ...
Managing increasingly software dependent mobile systems
N Jefferies, J Irvine, A Munro, K Moessner
Second International Conference on 3G Mobile Communication Technologies, 247-251, 2001
Securing access to mobile networks beyond 3G
C Gehrmann, G Horn, N Jefferies, C Mitchell
Proceedings of the IST Communications Summit, 2001
Combining TTP-based key management with key escrow
C Mitchell, M Walker
University of London, Royal Holloway, Department of Computer Science, 1996
30 Radio-over-Fiber Architectures
K David, S Dixit, N Jefferies
IEEE Vehicular Technology Magazine, 2010
Providing secure personal mobility
N Jefferies
IEE Colloquium on UMPTS and UPT, 4/1-4/4, 1994
The system can't perform the operation now. Try again later.
Articles 1–20