A Viable LoRa Framework for Smart Cities. | 0 | 0.34 | 2018 |
An Architecture for Trustworthy Open Data Services. | 3 | 0.40 | 2015 |
LibVM: an architecture for shared library sandboxing | 1 | 0.38 | 2015 |
Evolving a Secure Internet. | 0 | 0.34 | 2013 |
Background to the Development of a Curriculum for the History of "Cyber" and "Communications" Security. | 0 | 0.34 | 2013 |
Using a Public Key Registry for Improved Trust and Scalability in National E-Health Systems | 0 | 0.34 | 2013 |
A Hardware Virtualization Based Component Sandboxing Architecture. | 1 | 0.36 | 2012 |
A Test Vehicle For Compliance With Resilience Requirements In Index-Based E-Health Systems. | 0 | 0.34 | 2011 |
An Efficient Public Key Management System: An Application In Vehicular Ad Hoc Networks. | 5 | 0.47 | 2011 |
A Business Continuity Management Simulator. | 0 | 0.34 | 2010 |
Open and trusted information systems/health informatics access control (OTHIS/HIAC) | 1 | 0.35 | 2009 |
Feasibility Of Automated Information Security Compliance Auditing | 0 | 0.34 | 2008 |
Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records | 1 | 0.43 | 2007 |
Modernising MAC: New forms for mandatory access control in an era of DRM | 0 | 0.34 | 2007 |
Application security - myth or reality? | 0 | 0.34 | 2007 |
The role of the self-defending object concept in developing distributed security-aware applications | 0 | 0.34 | 2006 |
DRM, trusted computing and operating system architecture | 15 | 1.23 | 2005 |
Using self-defending objects to develop security aware applications in Java™ | 5 | 0.61 | 2004 |
Trusted ...or... trustworthy: the search for a new paradigm for computer and network security | 2 | 0.48 | 2002 |
Signature Stripping: A Digital Dilemma | 2 | 0.58 | 2001 |
Certificate based PKI and B2B E-commerce: suitable match or not? | 1 | 0.39 | 2001 |
Non-Repudiation in the Digital Environment | 13 | 1.21 | 2000 |
A Secure Electronic Commerce Environment: Only with `Smart Cards' | 0 | 0.34 | 1999 |
Pki, Elliptic Curve Cryptography, And Digital Signatures | 14 | 1.04 | 1999 |
A Data Driven Model for Designing Applications with Smart Cards | 0 | 0.34 | 1998 |
Information Security in electronic Commerce. | 1 | 2.67 | 1997 |
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? | 0 | 0.34 | 1995 |
The CASS Shell | 1 | 0.38 | 1995 |
Commercial Key Escrow: An Australian Perspective | 1 | 0.39 | 1995 |
A note on supplying a trusted clock via a secure device | 0 | 0.34 | 1994 |
Security in Open and Distributed Systems | 0 | 0.34 | 1994 |
A Model for Information Security Management | 0 | 0.34 | 1993 |
IT Security: The Need for International Cooperation, Proceedings of the IFIP TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992 | 37 | 38.24 | 1992 |
Measuring the Strength of Ciphers | 0 | 0.34 | 1992 |
A Methodology for Describing Information and Physical Security Architectures | 8 | 1.44 | 1992 |
File security in WordPerfect 5.0 | 1 | 0.36 | 1991 |
Electronic Funds Transfer Systems | 0 | 0.34 | 1988 |
Privacy and security in Office Automation Systems | 0 | 0.34 | 1985 |
The CODASYL 1978 Data Base Proposals: An Overview and Discussion | 0 | 0.34 | 1979 |