Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Remote Revocation of Smart Cards in a Private DRM System., , and . ACSW, volume 44 of CRPIT, page 169-178. Australian Computer Society, (2005)Private collaborative forecasting and benchmarking., , , , and . WPES, page 103-114. ACM, (2004)Portable and Flexible Document Access Control Mechanisms., and . ESORICS, volume 3193 of Lecture Notes in Computer Science, page 193-208. Springer, (2004)Real-Time Network-Based Anomaly Intrusion Detection., , , , and . Scalable Computing: Practice and Experience, (2001)Succinct specifications of portable document access policies., and . SACMAT, page 41-50. ACM, (2004)Statistical analysis of malformed packets and their origins in the modern internet., and . Internet Measurement Workshop, page 83-88. ACM, (2002)