Biography

See my CV at https://www.cs.tcd.ie/Stephen.Farrell/me/public-resume.html

Publications and Further Research Outputs

  • Carlo Caini, Haitham Cruickshank, Stephen Farrell, and Mario Marchese, Delay- and Disruption-Tolerant Networking (DTN): An Alternative Solution for Future Satellite Networking Applications, Proceedings of the IEEE, 99, (11), 2011, p1980 - 1997Journal Article, 2011, DOI
  • Christian Dannewitz, Dirk Kutscher, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl, Network of Information (NetInf) - An information-centric networking architecture, Computer Communications, 36, (7), 2013, p721-735Journal Article, 2013, DOI
  • S.Farrell, S.Weber,A,McMahon,E.Meehan,K.Hartnett, N4C DTN Router Node: 2009 Results, 2010 Plans, ExtremeCom 2010 workshop, 2010Conference Paper, 2010, URL
  • Stephen Farrell, Endpoint Discovery and Contact Graph Routing in space and terrestrial DTNs, 5th Advanced satellite multimedia systems conference (asma) and the 11th signal processing for space communications workshop (spsc), 2010, pp89 - 93Conference Paper, 2010, DOI
  • Stephen Farrell, Applications Directly using Cryptography, IEEE Internet Computing, 14, (3), 2010, p84 - 87Journal Article, 2010, DOI
  • S.Farrell, 'RFC 5755, An Internet Attribute Certificate Profile for Authorization', IETF, 2010, -Protocol or guideline, 2010, DOI
  • S.Turner,S.Farrell,P.St-Andre, The Need for a Web Security API, W3C Identity in the Browser Workshop, Mountain View, Califronia, USA, 2011Conference Paper, 2011, URL
  • Stephen Farrell, Security in the Wild, IEEE Internet Computing, 15, (3), 2011, p86 - 91Journal Article, 2011, DOI
  • S.Farrell, CRiSIS 2012 security standards tutorial, Risk and Security of Internet and Systems (CRiSIS), 2012 7th International Conference on. IEEE, 2012Conference Paper, 2012, DOI
  • S.Farrell, 'RFC 6920 Naming Things with Hashes', IETF, 2013, -Protocol or guideline, 2013, DOI
  • S.Farrell, Why Pervasive Monitoring Is Bad, IEEE Internet Computing, 2014, p4 - 7Journal Article, 2014, DOI
  • S.Farrell, 'RFC 7258/BCP 188 Pervasive Monitoring is an Attack', IETF, 2014, -Protocol or guideline, 2014, DOI
  • Stephen Farrell, Paul HOffman, Michael Thomas, 'RFC7486, HTTP Origin-Bound Authentication (HOBA)', IETF, 2015, -Protocol or guideline, 2015, URL
  • Farrell, Stephen, Requirements Analysis Required--Otherwise Targeted Monitoring Enables Pervasive Monitoring, Computer, (3), 2016, p34--40Journal Article, 2016
  • Stephen Farrell, Vinny Cahill, Dermot Geraghty, Ivor Humphreys, and Paul McDonald, When TCP Breaks: Delay- and Disruption-Tolerant Networking, IEEE Internet Computing, 10, (4), 2006, p72 - 78Journal Article, 2006, DOI
  • Paul McDonald, Dermot Geraghty, Ivor Humphreys, Stephen Farrell, Assessing the Environmental Impact of Transport Noise Using Wireless Sensor Networks, Transportation Research Record, 87th Annual Meeting Transportation Research Board, Washington, January 13-17, Transportation Research Board, 2008, pp133-139Conference Paper, 2008, DOI , URL
  • Farrell, Stephen Cahill, Vinny , Evaluating LTP-T: A DTN-Friendly Transport Protocol, International Workshop on Satellite and Space Communications, 2007. IWSSC '07., 2007, p178-181Journal Article, 2007, DOI , TARA - Full Text
  • Farrell, S., Cahill, V. , Security considerations in space and delay tolerant networks, Proceedings - SMC-IT 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology , 2006, 2006,, 2006, pp29-36Conference Paper, 2006, DOI , URL , TARA - Full Text
  • McDonald, P , Geraghty, D , Humphreys, I., Farrell, S., Cahill, V. , Sensor network with delay tolerance (SeNDT), Proceedings of 16th International Conference on Computer Communications and Networks (ICCCN 2007), 16th International Conference on Computer Communications and Networks (ICCCN 2007), Honolulu, HI , 13-16 Aug. 2007, IEEE, 2007, pp1333 - 1338Conference Paper, 2007, DOI , URL , TARA - Full Text
  • Stephen Farrell and Vinny Cahill., Delay- and Disruption-Tolerant Networking. , st edition, London, Artech House, 2006, 246 pages.ppBook, 2006
  • Muhammad, F.S. Franck, L. Farrell, S. , Transmission protocols for challenging networks: : LTP and LTP-T, International Workshop on Satellite and Space Communications, 2007 (IWSSC '07) , Salzburg , 13-14 Sept., IEEE, 2007, pp145 - 149Conference Paper, 2007, DOI , TARA - Full Text
  • Stephen Farrell and Christian D. Jensen, "End-by-Hop" Data Integrity , Lecture Notes in Computer Science, 4th European workshop on Security and Privacy in Ad-hoc and Sensor Networks, Cambridge, UK, 2-3 July, edited by Frank Stajano, Catherine Meadows, Srdjan Capkun, Tyler Moore , 4572, Springer, 2007, pp142-155Conference Paper, 2007, DOI
  • Stephen Farrell, Security Boundaries, IEEE Internet Computing, 12, (1), 2008, p93 - 96Journal Article, 2008, DOI , URL , TARA - Full Text
  • Stephen Farrell, Portable storage and data loss, IEEE Internet Computing, 12, (3), 2008, p90-93Journal Article, 2008, DOI , URL , TARA - Full Text
  • Stephen Farrell, Password policy purgatory, IEEE Internet Computing, 12, (5), 2008, p84-87Journal Article, 2008, DOI , URL , TARA - Full Text
  • Fall, K.; Farrell, S., DTN: An Architectural Retrospective, IEEE Journal on Selected Areas in Communications, 26, (5), 2008, p828 - 836Journal Article, 2008, DOI , URL , TARA - Full Text
  • Farrell, S. , Why Don't We Encrypt Our Email?, IEEE Internet Computing, 13, (1), 2009, p82 - 85Journal Article, 2009, DOI , URL , TARA - Full Text
  • Farrell, S. , Keys don't grow in threes, IEEE Internet Computing, 13, (3), 2009, p96 - 95Journal Article, 2009, DOI , URL , TARA - Full Text
  • Farrell, S., API Keys to the Kingdom, IEEE Internet Computing, 13, (5), 2009, 91 - 93Journal Article, 2009, DOI , URL , TARA - Full Text
  • McMahon, A. Farrell, S. , Delay- and Disruption-Tolerant Networking, IEEE Internet Computing, 13, (6), 2009, p82 - 87Journal Article, 2009, DOI , URL , TARA - Full Text
  • Farrell, S., Why didn't we spot that? , IEEE Internet Computing, 14, (1), 2010, p84 - 87Journal Article, 2010, DOI , URL , TARA - Full Text
  • Stephen Farrell, Leaky or Guessable Session Identifiers, IEEE Internet Computing, 15, (1), 2011, p88-91Journal Article, 2011, DOI , URL , TARA - Full Text
  • Farrell, S, McMahon, A, Meehan, E, Weber, S, Hartnett, K, Report on an Arctic summer DTN trial, WIRELESS NETWORKS, 17, 2011Journal Article, 2011, DOI , URL , TARA - Full Text
  • Vinny Cahill and Stephen Farrell and Joerg Ott,, Special Issue of Computer Communications on Delay and Disruption Tolerant Networking - Editorial , Computer Communications, 32, (16), 2009, p1685-1686Journal Article, DOI , URL