Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Knowing what to think by knowing who you are., , , , and . British Journal for Social Psychology, (1990)Symbiosis Among IT Security Standards, Policies, and Criteria.. Security and Control of Information Technology in Society, volume A-43 of IFIP Transactions, page 145-159. North-Holland, (1993)Computer networks - a tutorial (4. ed.)., and . IEEE, (1984)Editorial: why bad things happen to good systems, and what to do about it., and . ACSAC, page 306-307. IEEE, (1994)A higher level of computer security through active policies., and . Comput. Secur., 14 (2): 147-157 (1995)Measuring and modelling man-computer interaction., , and . SIGME, page 136-142. ACM, (1973)NBS Network Measurement Methodology Applied to Synchronous Communications., and . SIGMETRICS Perform. Evaluation Rev., 10 (2): 29-36 (1981)End-To-End Encryption Implementation Problems in an Asynchronous Network.. INFOCOM, page 257-264. IEEE, (1983)The Relationship of System & Product Specifications and Evaluations.. ACSAC, page 112-113. IEEE Computer Society, (2004)An Architecture for a Scientific Visualization System., , , , , and . IEEE Visualization, page 107-114. IEEE Computer Society, (1992)