Items where Research Group is "Cyber Security Privacy and Trust Laboratory

Group by: Creators | Item Type | Status | No Grouping
Jump to: B | F | G | J | K | P | W
Number of items: 11.

B

Beck, R., Hinkel, K., Eisner, W., Liu, L., Fall, K., Burleigh, S., Torgerson, L., Hooke, A., Durst, R., Pleva, D., Ivancic, W., Paulsen, P., Lambert, C., Groves, S., LeBrun, J., Norda, J., Li, J., Garuba, M., Bulger, R., Sheehan, G., Doria, A., Uden, M., Bathrick, W., Small, C., Seibert, M., Hoang, N., Machida, R., Smith, S., Ellis, B., Ferl, J., Parr, G., Peoples, C., Scotney, B., Moore, A., Freudinger, L. and Maffei, A. (2007) GPSDTN: Predictive velocity-enabled delay-tolerant networks for arctic research and sustainability. In: Second International Conference on Internet Monitoring and Protection, ICIMP 2007. The Institute of Electrical and Electronics Engineers (IEEE), USA. ISBN 0-7695-2911-9

Berthier, Y., Chen, T., Mont, M.C., He, L., Labbe, P., Parr, G., State, R., Reda, R. and Sundhar, R.S.S. (2007) Second International Conference on Internet Motintoring and Protection: Preface. In: UNSPECIFIED.

Buckley, Oliver and John, Nigel W (2007) Efficient modelling of soft tissue using particle systems. Studies in Health Technology and Informatics, 125. pp. 55-57. ISSN 0926-9630

F

Fong, Ching-Hang, Parr, Gerard and Morrow, Philip (2007) Performance evaluation of a mobile agent based framework for security event management in IP networks. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 4773. pp. 476-486.

G

Giang, Pho Duc, Hung, Le Xuan, Shaikh, Riaz Ahmed, Zhung, Yonil, Lee, Sungyoung, Lee, Young Koo and Lee, Heejo (2007) A trust-based approach to control privacy exposure in Ubiquitous Computing environments. In: 2007 IEEE International Conference on Pervasive Services, ICPS. 2007 IEEE International Conference on Pervasive Services, ICPS . UNSPECIFIED, TUR, pp. 149-152. ISBN 1424413265

J

Jameel, Hassan, Shaikh, Riaz Ahmed, Lee, Heejo and Lee, Sungyoung (2007) Human identification through image evaluation using secret predicates. In: Topics in Cryptology. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) . Springer-Verlag Berlin Heidelberg, USA, pp. 67-84. ISBN 9783540693277

K

Kulkarni, P., Dinit, P., McClean, S., Parr, G. and Black, M. (2007) A lightweight, scalable and distributed admission control algorithm for voice traffic. In: IEEE International Conference on Communications. The Institute of Electrical and Electronics Engineers (IEEE), GBR, pp. 556-561. ISBN 1-4244-0353-7

P

Peoples, Cathryn, Parr, Gerard, Scotney, Bryan and Moore, Adrian (2007) A Reconfigurable Context-Aware Protocol Stack for Interplanetary Communication. In: International Workshop on Satellite and Space Communications. The Institute of Electrical and Electronics Engineers (IEEE), pp. 281-285.

Peoples, Cathryn, Parr, Gerard, Scotney, Bryan and Moore, Adrian (2007) A reconfigurable context-a ware protocol stack for interplanetary communication. In: 2007 International Workshop on Satellite and Space Communication, IWSSC'07. The Institute of Electrical and Electronics Engineers (IEEE), AUT, pp. 281-285. ISBN 978-1-4244-0938-9

W

Wang, Yunfeng, Liu, Niansheng, Parr, Gerard and Guo, Donghui (2007) Research on cryptographical properties of the piecewise linear chaotic map with a segment number parameter. In: 2007 IEEE International Workshop on Anti-counterfeiting, Security, Identification, ASID. The Institute of Electrical and Electronics Engineers (IEEE), CHN, pp. 227-231. ISBN 1-4244-1035-5

Wood, Lloyd, Peoples, Cathryn, Parr, Gerard, Scotney, Bryan and Moore, Adrian (2007) TCP's protocol radius: The distance where timers prevent communication. In: 2007 International Workshop on Satellite and Space Communication, IWSSC'07. The Institute of Electrical and Electronics Engineers (IEEE), AUT, pp. 163-167. ISBN 978-1-4244-0938-9

This list was generated on Sat Feb 22 23:00:40 2025 UTC.