Author of the publication

Evolving a Secure Internet.

, , and . SEC, volume 405 of IFIP Advances in Information and Communication Technology, page 42-54. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Goes There? Internet Banking: A Matter of Risk and Reward., and . ACISP, volume 3574 of Lecture Notes in Computer Science, page 336-357. Springer, (2005)The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications., and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 183-194. Springer, (2006)Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records., , , and . MedInfo, volume 129 of Studies in Health Technology and Informatics, page 498-502. IOS Press, (2007)Securing Grid Data Using Mandatory Access Controls., , and . ACSW, volume 68 of CRPIT, page 25-32. Australian Computer Society, (2007)A Hardware Virtualization Based Component Sandboxing Architecture., , and . J. Softw., 7 (9): 2107-2118 (2012)Commercial Key Escrow: An Australian Perspective.. Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, page 40-64. Springer, (1995)Certificate Based PKI and B2B E-Commerce: Suitable Match or Not?, and . SEC, volume 193 of IFIP Conference Proceedings, page 19-34. Kluwer, (2001)A taxonomy of electronic cash schemes., , , and . SEC, volume 92 of IFIP Conference Proceedings, page 337-348. Chapman & Hall, (1997)Feasibility of Automated Information Security Compliance Auditing., , , and . SEC, volume 278 of IFIP, page 493-508. Springer, (2008)Comparison of Block Ciphers., , and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 208-220. Springer, (1990)