Nigel Jefferies
TitleCited byYear
A proposed architecture for trusted third party services
N Jefferies, C Mitchell, M Walker
International conference on Cryptography: policy and algorithms, 98-104, 1995
1231995
2020 Vision
K David, D Dixit, N Jefferies
IEEE Vehicular Technology Magazine 5 (3), 22-29, 2010
532010
Global vision for a wireless world
N Jefferies
18th wireless world research forum meeting, 2007
152007
Sporadic partitions of binomial coefficients
N Jefferies
Electronics Letters 27 (15), 1334-1336, 1991
121991
Wireless visions: a look to the future by the fellows of the WWRF
K David, N Jefferies
IEEE Vehicular Technology Magazine 7 (4), 26-36, 2012
112012
Secure provision of UMTS services over diverse access networks
JC Francis, H Herbrig, N Jefferies
IEEE Communications Magazine 36 (2), 128-136, 1998
111998
The wireless world initiative: a framework for research on systems beyond 3G
H Abramowicz, N Niebert, W Mohr, L Hiebinger, J von Haefen, A Aftelak, ...
Proc. of IST Mobile and Wireless Communications Summit, Lyon, France, 2004
102004
WWRF setting the research agenda for the wireless world
N Jefferies
Int. Conf. On Beyond 3G Mobile Communications, 2008
82008
Instant knowledge: Secure autonomous business collaboration
J Irvine, A McDiarmind, C Saunders, A Tomlinson, N Jefferies
Proceedings of the Wireless World Research Forum Meeting 20, Ottawa, Ontario …, 2008
72008
Scenarios for future communications environments
PJ Turner, DR Basgeet, N Borselius, E Frazer, J Irvine, N Jefferies, ...
ECS Dept., Southampton Univ., UK, Tech. Rep. ECSTR-IAM02–005, 2002
72002
Trusted third party based key management allowing warranted interception
N Jefferies, C Mitchell, M Walker
Proceedings: Public Key Infrastructure Invitational Workshop. MITRE, McLean …, 1995
61995
Security in third-generation mobile systems
N Jefferies
IET Digital Library, 1995
61995
Instant knowledge: a secure mobile context-aware distributed recommender system
M Helmhout, A McDiarmid, A Tomlinson, J Irvine, C Saunders, ...
ICT Mobile Summit 2009, 2009
42009
Practical solutions to key escrow and regulatory aspects
N Jefferies, C Mitchell, M Walker
Public Key Solutions’ 96, 1996
41996
Managing increasingly software dependent mobile systems
N Jefferies, J Irvine, A Munro, K Moessner
Second International Conference on 3G Mobile Communication Technologies, 247-251, 2001
32001
Securing access to mobile networks beyond 3G
C Gehrmann, G Horn, N Jefferies, C Mitchell
Proceedings of the IST Communications Summit, 2001
22001
User 2020: A WWRF Vision
J Porras, K Heikkinen, M Kinnula, LT Sørensen, L Hennala, H Melkas, ...
12014
30 Radio-over-Fiber Architectures
K David, S Dixit, N Jefferies
IEEE Vehicular Technology Magazine, 2010
12010
Combining TTP-based key management with key escrow
C Mitchell, M Walker
University of London, Royal Holloway, Department of Computer Science, 1996
11996
Providing secure personal mobility
N Jefferies
IEE Colloquium on UMPTS and UPT, 4/1-4/4, 1994
11994
The system can't perform the operation now. Try again later.
Articles 1–20