References
- "How to co-create content moderation policies: the case of the AutSPACEs project",
Data & Policy,
Volume 6,
15 May 2024.
More info....
Download: pdf.
,
- "Deploying authentication in the wild: Towards greater ecological validity in security usability studies",
Journal of Cybersecurity, Special Issue on Usable Security and Privacy,
Volume 6, Issue 1, tyaa010,
18 November 2020.
More info....
Download: pdf.
,
- "Raven Authentication Service: Attacks and Countermeasures", Twenty-sixth International Workshop on Security Protocols (SPW 2018), Cambridge, UK, 19-21 March 2018. (in press). More info.... ,
- "Intentionality and agency in security", Twenty-sixth International Workshop on Security Protocols (SPW 2018), Cambridge, UK, 19-21 March 2018. (in press). More info.... ,
- "Pico in the Wild: Replacing Passwords, One Site at a Time",
2nd European Workshop on Usable Security (EuroUSEC 2017),
Paris, France,
29 April 2017.
More info....
Download: pdf.
,
- "Seamless Authentication with Pico",
IEEE European Symposium on Security and Privacy (EuroS&P 2017),
Paris, France,
26-28 April 2017.
Short Talk.
More info....
Download: pdf.
,
- "Cracking PwdHash: A Bruteforce Attack on Client-side Password Hashing",
11th International Conference on Passwords (Passwords 2016),
Bochum, Germany,
7 December 2016.
More info....
Download: pdf.
,
- "Red button and yellow button: usable security for lost security tokens", Proceedings of the Security Protocols Workshop 2016, Brno, Czech Republic, 8 April 2016. More info.... ,
- "Explicit delegation using configurable cookies",
Proceedings of the Security Protocols Workshop 2016,
Brno, Czech Republic,
8 April 2016.
More info....
Download: pdf.
,
- "Optimizing runtime performance of hybrid dynamically and statically typed languages for the .Net platform", Journal of Systems and Software, Volume 113, Pages 114-129, March 2016. More info.... ,
- "Secure Proximity-Based Identity Pairing using an Untrusted Signalling Service",
IEEE Consumer Communications and Networking Conference (CCNC 2016),
Las Vegas, NV, USA,
9-12 January 2016.
More info....
Download: pdf, LaTeX.
,
- "On the evaluation of reputation and trust-based schemes in mobile ad hoc networks",
Security and Communication Networks,
Volume 8, Issue 18, pages 4041-4052,
December 2015.
More info....
Download: pdf.
,
- "A New Lightweight Homomorphic Encryption Scheme for Mobile Cloud Computing",
IEEE International Conference on Computer and Information Technology (CIT 2015 ),
Liverpool, UK,
26-28 October 2015 .
More info....
Download: pdf.
,
- "Secure Video Transcoding in Cloud Computing", 2nd International Conference on Cloud Security Management (ICCSM 2014), Reading, UK, 23 October 2014. More info.... ,
- "The big data obstacle of lifelogging", 28th International Conference on Advanced Information Networking and Applications Workshops (IEEE WAINA 2014), Victoria, BC, Canada, 13 May 2014. More info.... ,
- "Creating human digital memories with the aid of pervasive mobile devices", Pervasive and Mobile Computing, Volume 12, pp. 160-178, 1 June 2014. More info.... ,
- "An Event Processing Approach for Threats Monitoring of Service Compositions", 8th International Conference on Risks and Security of Internet and Systems (CRiSIS 2013), La Rouchelle, France, 23 October 2013. More info.... ,
- "Security Property Lifecycle Management for Secure Service Compositions", Cyber Security and Privacy, Communications in Computer Information Science, Volume 182, pp. 67-78, 12 October 2013. More info.... ,
- "Exploiting linked data to create rich human digital memories", Computer Communications, Volume 36, Issue 15-16, pp. 1639-1656, September-October 2013. More info.... ,
- "Event Driven Monitoring of Composite Services", ASE/IEEE International Conference on Social Computing (SocialCom 2013), Washington, DC, USA, 8 September 2013. More info.... ,
- "An Artificial Immune System Techniques for Critical Infrastructure Support ", The 14th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNet 2013), Liverpool, UK, 24-25 July 2013. More info.... ,
- "Secure Rendering Process in Cloud Computing", 11th Annual International Conference on Privacy, Security and Trust (PST 2013), Tarragona, Spain, 10 July 2013. More info.... ,
- "Requirements for Composite Security Pattern Specification",
2nd International Workshop on Cyberpatterns (Cyberpatterns 2013),
Abingdon, Oxfordshire , UK,
8-9 July 2013.
More info....
Download: pdf.
,
- "Performance Cost Evaluation of Aspect Weaving", The 36th Australasian Computer Science Conference (ACSC 2013), Adelaide, Australia, 29 January - 1 February 2013. ,
- "Prototype for Design-time Secure and Trustworthy Service Composition" (demo), 10th Annual IEEE Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, NV, USA, 11-14 January 2013. More info.... ,
- "A Compose Language-based Framework for Secure Service Composition", ASE International Conference on Cyber Security (CyberSecurity 2012), Washington D.C., USA, 14-16 December 2012. More info.... ,
- "Augmenting human digital memories with physiological data", 2012 IEEE 3rd International Conference on Networked Embedded Systems for Every Application (NESEA 2012), Liverpool, UK, 13-15 December 2012. More info.... ,
- "Dynamic Cascade Vulnerability Checks in Real-World Networks", Layered Assurance Workshop, Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida, USA, 11 December 2012. More info.... ,
- "Secure Service Composition Adaptation Based on Simulated Annealing", Layered Assurance Workshop, Annual Computer Security Applications Conference (ACSAC 2012), Orlando, Florida, USA, 11 December 2012. More info.... ,
- "A Lightweight Sybil Attack Detection in MANETs,", IEEE Systems Journal, Volume 7, Issue 2, pp. 236-248, 29 November 2012. More info.... ,
- "Efficient autonomous signature exchange on ubiquitous networks", Journal of Network and Computer Applications, Volume 35 Issue 6, pp.1793-1806, 1 November 2012. More info.... ,
- "A Heuristic Approach for Secure Service Composition Adaptation",
The First International Workshop on Cyberpatterns,
Abingdon, Oxfordshire , UK,
9-10 July 2012.
More info....
Download: pdf.
,
- "Dynamic Monitoring of Composed Services",
The First International Workshop on Cyberpatterns,
Abingdon, Oxfordshire , UK,
9-10 July 2012.
More info....
Download: pdf.
,
- "Extending AOP Principles for the Description of Network Security Patterns",
The First International Workshop on Cyberpatterns,
Abingdon, Oxfordshire, UK,
9-10 July 2012.
More info....
Download: pdf.
,
- "Enhancing Security of Data and Their Related Processing in Cloud Computing",
13th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2012),
Liverpool, UK,
25-26 June 2012.
More info....
Download: pdf.
,
- "Remotely Monitoring and Preventing the Development of Pressure Ulcers with the Aid of Human Digital Memories", MobiCheSS Workshop, The 47th IEEE International Conference on Communications (ICC 2012), Ottawa, Canada, 10-15 June 2012. ,
- "Applying dynamic separation of aspects to distributed systems security: a case study", IET Software, Volume 6, Issue 3, pp. 165-282, June 2012. More info.... ,
- "A framework for measuring security of services in ubiquitous computing environments", IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2012), Lugano, Switzerland, 19-23 March 2012. More info.... ,
- "Capturing and sharing human digital memories with the aid of ubiquitous Peer-to-Peer mobile services", IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops 2012), Lugano, Switzerland, 19-23 March 2012. More info.... ,
- "Monitoring and measuring sedentary behaviour with the aid of human digital memories", CeHPSA Workshop, The 9th IEEE International Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, Nevada, USA, 14-17 January 2012. ,
- "A Social Network Discovery Model for Digital Forensics Investigations", 6th IEEE Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 2011), Kingston University, London, UK, 7 July 2011. More info.... ,
- "Identity Management in System-of-Systems Crisis Management Situation", 6th IEEE International Conference on System of Systems Engineering (SoSE 2011), Albuquerque, New Mexico, USA, 27-30 June 2011. More info.... ,
- "The Challenges of Secure and Trustworthy Service Composition in the Future Internet", 6th IEEE International Conference on System of Systems Engineering (SoSE 2011), Albuquerque, New Mexico, USA, 27-30 June 2011. ,
- "A Framework for Providing a Secure System of Systems Composition", The 12th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2011), Liverpool, UK, 27-28 June 2011. More info.... ,
- "A Digital Forensic Investigation Model and Tool for Online Social Networks", 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, 27-28 June 2011. More info.... ,
- "Using Network Structure to Enhance Security and Trust of Ubiquitous Computing Services", 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, 27-28 June 2011. More info.... ,
- "Towards a Framework for Capturing and Distributing Rich Interactive Human Digital Memories", 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, 2011, 27-28 June 2011. More info.... ,
- "Identity-based Attacks Against Reputation-based Systems in MANETs", 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, 2011, 27-28 June 2011. More info.... ,
- "Memory Threads: Organizing Digital Memories to Organize Social P2P Networks", 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, 27-28 June 2011. More info.... ,
- "Secure Service Composition for P2P Home Networked Appliances", ", 12th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2011), Liverpool, UK, 27-28 June 2011. More info.... ,
- "The Effect of Direct Interactions on Reputation Based Schemes in Mobile Ad hoc Networks",
5th IEEE Workshop on Personalized Networks (PerNets 2011), IEEE Consumer Communications and Networking Conference (CCNC 2011),
Las Vegas, NV, USA,
9 January 2011.
More info....
Download: pdf.
,
- "State-of-the-Art in System-of-Systems Security for Crisis Management",
Fourth Annual Layered Assurance Workshop (LAW 2010),
Austin, Texas, USA,
6-7 December 2010.
More info....
Download: pdf.
,
- "A Security Scheme for Home Networked Appliances",
The Fourth Annual Layered Assurance Workshop (LAW 2010),
Austin, Texas, USA,
6-7 December 2010.
More info....
Download: pdf.
,
- "Deterring Whitewashing Attacks in Reputation Based Schemes for Mobile Ad hoc Networks",
IFIP Wireless Days 2010,
Venice, Italy,
20-22 October 2010.
More info....
Download: pdf.
,
- "System-of-Systems Boundary Check in a Public Event Scenario",
5th International Conference on Systems of Systems Engineering (SoSE 2010),
Loughborough, UK,
22-24 June 2010.
Winner of the Conference Best Paper Award.
More info....
Download: pdf.
,
- "System-of-Systems Security: A Survey",
The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010),
Liverpool, UK,
21-22 June 2010.
More info....
Download: pdf.
,
- "MAC Layer DoS Attacks in IEEE 802.11 Networks",
The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010),
Liverpool, UK,
21-22 June 2010.
More info....
Download: pdf.
,
- "A Survey of Reputation Based Schemes for MANET",
The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010),
Liverpool, UK,
21-22 June 2010.
More info....
Download: pdf.
,
- "Investigating Sharing in Memory for Life Systems",
The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010),
Liverpool, UK,
21-22 June 2010.
More info....
Download: pdf.
,
- "A Digital Forensic Investigation Model for Online Social Networking",
The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010),
Liverpool, UK,
21-22 June 2010.
More info....
Download: pdf.
,
- "Group-based Key Management for Mobile Sensor Networks", 33rd IEEE Sarnoff Symposium (Sarnoff 2010), Princeton, NJ, USA, 12-14 April 2010. More info.... ,
- "Security in Wireless Sensor Networks", Handbook of Information and Communication Security, Springer Berlin Heidelberg, 23 February 2010. Book Chapter. Eds. Peter Stavroulakis, Mark Stamp. ISBN 978-3-642-04116-7.. More info.... ,
- "Analysis of Digital Image Watermark Attacks", 6th IEEE International Workshop on Digital Rights Management, Satellite Workshop of 7th IEEE Consumer Communications & Networking Conference (IEEE CCNC 2010), Las Vegas, Nevada, USA, 13th January, 2010. More info.... ,
- "Signal Strength Based Sybil Attack Detection in Wireless Ad hoc Networks", Developments in eSystems Engineering (DeSE 2009), Abu Dhabi, UAE, 14-16 December 2009. More info.... ,
- "Trusted Digital Rights Management in Peer-to-Peer Communities", Developments in eSystems Engineering (DeSE 2009), Abu Dhabi, UAE, 14-16 December 2009. More info.... ,
- "A Peer-to-peer Digital Human Life Memory Store for Sharing Serendipitous Moments" (book chapter), Ubiquitous Multimedia Computing, Chapman & Hall/CRC Studies in Informatics Series, CRC Press, 24 November 2009. Edited by Qing Li, Timothy K. Shih, G.Q. Zhang. ISBN 9781420093384. More info.... ,
- "Towards Viable Computer Systems: a Set Theory Interpretation of Ecological Dependence within Beers Self-Organizing Viable System Model", The International ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2009), Lyon, France, 27-30 October 2009. More info.... ,
- "A Cybernetic Case Study of Viable Computing Systems: A Framework for Requisite Variety via Algorithmic Hot-Swapping", 8th IEEE International Conference on Cybernetic Intelligent Systems, Birmingham, UK, 9-10 September 2009. More info.... ,
- "Monitoring connectivity in Wireless Sensor Networks",
IEEE Symposium on Computers and Communications (ISCC'09),
Sousse, Tunisia,
5-8 July 2009.
More info....
Download: pdf.
,
- "An Efficient Multi-Parameter Group Leader Selection Scheme for Wireless Sensor Networks",
First International Conference on Network and Service Security (n2s 2009),
Paris, France,
24-26 June 2009.
More info....
Download: pdf.
,
- "A Reputation Based Scheme to Deter Identity Based Attacks for Clustered MANETs", The 10th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2009), Liverpool, UK, 22-23 June 2009. More info.... ,
- "Identifying Personal Memories and Shared Experience Using P2P Networks", The 10th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2009), Liverpool, UK, 22-23 June 2009. More info.... ,
- "Personal Sensor Networks Enriching Personal Digital Memories",
2nd Whole Body Interaction Workshop, HCI2008,
Liverpool, UK,
1 September 2008.
(Position paper).
More info....
Download: pdf.
,
- "A Framework for Sharing and Storing Serendipity Moments in Human Life Memory",
The First IEEE International Conference on Ubi-media Computing (U-Media 2008),
Lanzhou University, China,
15-16 July 2008.
More info....
Download: pdf.
,
- "Data Flow Security Analysis for System-of-Systems in a Public Security Incident",
The 3rd Conference on Advances in Computer Security and Forensics (ACSF 2008),
Liverpool, UK,
10-11 July 2008.
More info....
Download: pdf.
,
- "Sharing and Storing Serendipity Moments in Human Life Memory", 9th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2008), Liverpool, UK, 23-34 June 2008. More info.... ,
- "Identity Management in Mobile Ad-hoc Networks (IMMANets): A Survey", 9th Annual Postrgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2008), Liverpool, UK, 23-24 June 2008. More info.... ,
- "Networked Appliances: Manipulation of 3D Multimedia Streams", 4th IEEE International Workshop on Networking Issues in Multimedia Entertainment (NIME 2008), Fifth IEEE Consumer Communications and Networking Conference (CCNC 2008), Las Vegas, NV, USA, 12 January 2008. More info.... ,
- "FORWEB: File Fingerprinting for Automated Network Forensics Investigations,",
First International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics 2008),
Adelaide, Australia,
21-23 January 2008.
More info....
Download: pdf.
,
- "Networked Appliances for Home Healthcare and Lifestyle Management",
1st International Home Networking Conference (IHN'07),
Paris, France,
10-12 December 2007.
More info....
Download: pdf.
,
- "Viable Computer Systems: A Cybernetic Approach to Autonomic Computing",
IEEE SMC UK&RI 6th Conference on Cybernetic Systems 2007,
Dublin, Ireland,
6-7 September 2007.
More info....
Download: pdf.
,
- "Applying Secure Data Aggregation Techniques for a Structure and Density Independent Group Based Key Management Protocol", The Third IEEE International Symposium on Information Assurance and Security (IAS 2007), Manchester, UK, 29-31 August 2007. More info.... ,
- "On Securing MANET Routing Protocol Against Control Packet Dropping",
IEEE International Conference on Pervasive Services (ICPS'07),
Istanbul, Turkey,
15-20 July 2007.
More info....
Download: pdf.
,
- "Analysis and Detection of Access Violations in Componentised Systems",
2nd Conference on Advances in Computer Security and Forensics (ACSF 2007),
Liverpool, UK,
12-13 July 2007.
More info....
Download: pdf.
,
- "The Performance of Dynamic Group-Based Key Establishment (DGKE) under Node Capture Attacks in Wireless Sensor Networks", 2nd Conference on Advances in Computer Security and Forensics (ACSF 2007), Liverpool, UK, 12-13 July 2007. More info.... ,
- "Modelling Node Capture Attacks in Wireless Sensor Networks Using Simulation", 23rd Annual UK Performance Engineering Workshop, Edge Hill University, UK, 9-10 July 2007. More info.... ,
- "Security in Mobile Wireless Sensor Networks", 8th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2007), Liverpool, UK, 28-29 June 2007. More info.... ,
- "Sharing Human Life Memories using Peer-to-Peer Networking", 8th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNet 2007), Liverpool, UK, 28-29 June 2007. More info.... ,
- Special Issue on "Advances in Smart Home Security", International Journal of Smart Home, Science & Engineering Research Support Center (SERSC), June 2007. ISSN 1975-4094. Member of the Guest Editorial Board. More info....
- "Group-Based Secure Communication for Large Scale Wireless Sensor Networks",
Journal of Information Assurance and Security (JIAS),
Volume 2, Issue 2,
June 2007.
More info....
Download: pdf.
,
- "Bridging the Gap Between Networked Appliances and Virtual Worlds", 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshop on Telecommunication Networking, Applications and Systems (TeNAS07), Niagara, Canada, 21-23 May 2007. IEEE Computer Society. More info.... ,
- "Application Independent Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks", China Communications, vol. 4 (1), pp. 14-27, February 2007. China Institute of Communications. More info.... ,
- "Infinitely Adaptable Gaming: Harnessing the Power of Distributed Network Environments and Component Reuse", Fourth Annual International Conference in Computer Game Design and Technology (GDTW 2006), Liverpool, UK, 15-16 November 2006. More info.... ,
- "Dynamic Group-Based Key Establishment for Large-scale Wireless Sensor Networks", First International Conference on Communications and Networking in China (Chinacom 2006), Beijing, China, 25-27 October 2006. (Invited). More info.... ,
- "Community Trust DRM in Peer-to-peer Networks",
9th International Symposium on Wireless Personal Multimedia Communications (WPMC 2006), Special Session of Digital Right Management,
San Diego, CA, USA,
17-20 September 2006.
More info....
Download: pdf.
,
- "Pushing the Security Boundaries of Ubiquitous Computing",
1st Conference on Advances in Computer Security and Forensics (ACSF 2006),
Liverpool, UK,
13-14 July 2006.
More info....
Download: pdf.
,
- "Key Management for Wireless Sensor Networks in Building Environments",
PGNet 2006,
Liverpool, UK,
26-27 June 2006.
More info....
Download: pdf.
,
- "Digital Rights Management in Ubiquitous Computing", IEEE Multimedia, vol. 13(2), pp. 32-42, April-June 2006. More info.... ,
- "Improving Interoperation Security through Instrumentation and Analysis",
First International Workshop on Interoperability Solutions to Trust, Security, Policies and QoS for Enhanced Enterprise Systems (IS-TSPQ 06),
Bordeaux, France,
21 March 2006.
More info....
Download: pdf.
,
- "Ambient Interfaces for Elderly People in the Home",
Lecture Notes in Artificial Intelligence (LNAI 3864),
Springer-Verlag, book chapter,
March 2006.
Download: SpringerLink.
,
- "A Knowledge Model for Self-regenerative Service Activations Adaptation across Standards",
Lecture Notes in Computer Science, vol. 3801/2005,
Springer Berlin / Heidelberg,
December 2005.
More info....
Download: SpringerLink.
,
- "Designing for all in the house", Proceedings of the 2005 Latin American conference on Human-computer interaction, ACM Press, Cuernavaca, Mexico, 23-26 October 2005. More info.... ,
- "Harnessing Emergent Ubiquitous Computing Properties to Prevent Malicious Code Propagation" (Short paper),
International ICST Conference on Security and Privacy in Communication Networks (SecureComm 2005),
Athens, Greece,
5-9 September 2005.
More info....
Download: pdf.
,
- "Designing Ambient Home Interfaces for Elderly People", Workshop on Ambient Intelligence and (Everyday) Life, San Sebastian, Spain, 21-22 July 2005. More info.... ,
- "Buffer Overrun Prevention Through Component Composition Analysis",
29th Annual International Computer Software and Applications Conference (COMPSAC 2005),
Edinburgh, UK,
July 2005.
More info....
Download: pdf.
,
- "Topology creation and adaptive routing for wireless sensor network in building environment", 6th Annual Postgraduate Symposium on Convergence of Telecommunications, Networking and Broadcasting (PGNet 2005), Liverpool, UK, June 2005. More info.... ,
- "Multimodal Interfaces in a Ubiquitous Computing Environment" (mini paper),
3rd UK-UbiNet Workshop,
Bath, UK,
February 2005.
More info....
Download: pdf.
,
- "DRM in a Ubiquitous Computing Environment", (mini paper),
IEEE Consumer Communications and Networking Conference (CCNC 2005),
Las Vegas, USA,
January 2005.
More info....
Download: pdf.
,
- "A Security Framework for Executables in a Ubiquitous Computing Environment",
Globecom 2004,
Dallas, USA,
November/December 2004.
More info....
Download: pdf.
,
- "Utilising Component Composition for Secure Ubiquitous Computing" (mini paper),
2nd UK-Ubinet Workshop,
Cambridge, UK,
May 2004.
More info....
Download: pdf.
,
- "An Extensible Framework for Practical Secure Component Composition in a Ubiquitous Computing Environment",
2004 International Symposium on Information Technology (ITCC 2004),
Las Vegas, NV, USA,
5-8 April 2004.
More info....
Download: pdf.
,
- "Countable Pseudo-Recursively Saturated Models of Presburger Arithmetic" (Ph.D. thesis),
The University of Birmingham, UK,
November 2001.
More info....
Download: ps, pdf, dvi.
,