The SCEAS System
Navigation Menu

Conferences in DBLP

ACSW Frontiers (acsw)
2003 (conf/acsw/2003)

  1. Antonio Cerone
    Representing ASN.1 in Z. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:9-16 [Conf]
  2. Mark Evered
    Flexible Enterprise Access Control with Object-oriented View Specification. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:17-24 [Conf]
  3. Peggy Fung, Lam-for Kwok, Dennis Longley
    Electronic Information Security Documentation. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:25-31 [Conf]
  4. Patrick C. K. Hung, Kamalakar Karlapalem
    A Secure Workflow Model. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:33-41 [Conf]
  5. Audun Jøsang, Gunnar Sanderud
    Security in Mobile Communications: Challenges and Opportunities. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:43-48 [Conf]
  6. Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard
    Digital Rights Management for Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:49-58 [Conf]
  7. Benjamin W. Long
    Formalising Key-Distribution in the Presence of Trust using Object-Z. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:59-66 [Conf]
  8. Patrick G. McLean
    A Secure Pervasive Environment. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:67-75 [Conf]
  9. Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan
    Five Sealed-bid Auction Models. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:77-86 [Conf]
  10. Kerry L. Taylor, James Murty
    Implementing Role Based Access Control for Federated Information Systems on the Web. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:87-95 [Conf]
  11. Yiu Shing Terry Tin, Colin Boyd, Juanma González Nieto
    Provably Secure Key Exchange: An Engineering Approach. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:97-104 [Conf]
  12. Weiliang Zhao, Vijay Varadharajan, Yi Mu
    A Secure Mental Poker Protocol Over The Internet. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:105-109 [Conf]
  13. Philipp Amann, Gerald Quirchmayr
    Foundation of a Framework to Support Knowledge Management in the Field of Context-Aware and Pervasive Computing.. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:119-131 [Conf]
  14. Kenneth A. Hawick, Heath A. James
    Middleware for Context Sensitive Mobile Applications. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:133-141 [Conf]
  15. Jadwiga Indulska, Peter Sutton
    Location Management in Pervasive Systems. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:143-151 [Conf]
  16. Teddy Mantoro, Chris Johnson
    Location History in a Low-cost Context Awareness Environment. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:153-158 [Conf]
  17. Sven Meyer, Andry Rakotonirainy
    A Survey of Research on Context-Aware Homes. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:159-168 [Conf]
  18. Jason B. Scholz, Mark W. Grigg, Paul Prekop, Mark Burnett
    Development of the software infrastructure for a ubiquitous computing environment - the DSTO iRoom. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:169-176 [Conf]
  19. Todd Simcock, Stephen Peter Hillenbrand, Bruce H. Thomas
    Developing a Location Based Tourist Guide Application. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:177-183 [Conf]
  20. Ken Taylor, Doug Palmer
    Applying Enterprise Architectures and Technology to the Embedded Devices Domain. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:185-190 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002