Conferences in DBLP
Antonio Cerone Representing ASN.1 in Z. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:9-16 [Conf ] Mark Evered Flexible Enterprise Access Control with Object-oriented View Specification. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:17-24 [Conf ] Peggy Fung , Lam-for Kwok , Dennis Longley Electronic Information Security Documentation. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:25-31 [Conf ] Patrick C. K. Hung , Kamalakar Karlapalem A Secure Workflow Model. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:33-41 [Conf ] Audun Jøsang , Gunnar Sanderud Security in Mobile Communications: Challenges and Opportunities. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:43-48 [Conf ] Qiong Liu , Reihaneh Safavi-Naini , Nicholas Paul Sheppard Digital Rights Management for Content Distribution. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:49-58 [Conf ] Benjamin W. Long Formalising Key-Distribution in the Presence of Trust using Object-Z. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:59-66 [Conf ] Patrick G. McLean A Secure Pervasive Environment. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:67-75 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapali Viswanathan Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:77-86 [Conf ] Kerry L. Taylor , James Murty Implementing Role Based Access Control for Federated Information Systems on the Web. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:87-95 [Conf ] Yiu Shing Terry Tin , Colin Boyd , Juanma González Nieto Provably Secure Key Exchange: An Engineering Approach. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:97-104 [Conf ] Weiliang Zhao , Vijay Varadharajan , Yi Mu A Secure Mental Poker Protocol Over The Internet. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:105-109 [Conf ] Philipp Amann , Gerald Quirchmayr Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing.. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:119-131 [Conf ] Kenneth A. Hawick , Heath A. James Middleware for Context Sensitive Mobile Applications. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:133-141 [Conf ] Jadwiga Indulska , Peter Sutton Location Management in Pervasive Systems. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:143-151 [Conf ] Teddy Mantoro , Chris Johnson Location History in a Low-cost Context Awareness Environment. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:153-158 [Conf ] Sven Meyer , Andry Rakotonirainy A Survey of Research on Context-Aware Homes. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:159-168 [Conf ] Jason B. Scholz , Mark W. Grigg , Paul Prekop , Mark Burnett Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:169-176 [Conf ] Todd Simcock , Stephen Peter Hillenbrand , Bruce H. Thomas Developing a Location Based Tourist Guide Application. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:177-183 [Conf ] Ken Taylor , Doug Palmer Applying Enterprise Architectures and Technology to the Embedded Devices Domain. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:185-190 [Conf ]