The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Andrew Hutchison: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alapan Arnab, Andrew Hutchison
    Fairer usage contracts for DRM. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2005, pp:1-7 [Conf]
  2. Christian Sauter, Othmar Morger, Thomas Mühlherr, Andrew Hutchison, Stephanie Teufel
    CSCW for Strategic Management in Swiss Enterprises: an Empirical Study. [Citation Graph (0, 0)][DBLP]
    ECSCW, 1995, pp:115-0 [Conf]
  3. Andrew Hutchison, Marc G. Welz
    Incremental Security in Open, Untrusted Networks. [Citation Graph (0, 0)][DBLP]
    FTDCS, 1999, pp:151-154 [Conf]
  4. Andrew Hutchison, Othmar Morger, Christian Sauter, Stephanie Teufel
    Current Usage and Potential of Computer Supported Cooperative Work in Swiss Banks: An Empirical Study. [Citation Graph (0, 0)][DBLP]
    ICIS, 1995, pp:313-324 [Conf]
  5. Matthem Berry, Andrew Hutchison, Elton Saul
    Predicting the Performance of Transactional Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 1999, pp:161-178 [Conf]
  6. Elton Saul, Andrew Hutchison
    Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II. [Citation Graph (0, 0)][DBLP]
    Conference on Information Security Management & Small Systems Security, 2001, pp:73-86 [Conf]
  7. Andrew Hutchison
    CSCW as opportunity for business process re-engineering. [Citation Graph (0, 0)][DBLP]
    Business Process Re-Engineering, 1994, pp:309-318 [Conf]
  8. Marc G. Welz, Andrew Hutchison
    Interfacing Trusted Applications with Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 2001, pp:37-53 [Conf]
  9. Andrew Hutchison
    gGSS-API: a group enhanced generic security service. [Citation Graph (0, 0)][DBLP]
    SEC, 1997, pp:101-110 [Conf]
  10. Andrew Hutchison, Kurt Bauknecht
    Cryptographic key distribution and authentication protocols for secure group communication. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:492-493 [Conf]
  11. Elton Saul, Andrew Hutchison
    A Generic Graphical Specification Environment for Security Protocol Modelling. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:311-320 [Conf]

  12. Persistent access control: a formal model for DRM. [Citation Graph (, )][DBLP]


  13. Verifiable digital object identity system. [Citation Graph (, )][DBLP]


  14. Using Payment Gateways to Maintain Privacy in Secure Electronic Transactions. [Citation Graph (, )][DBLP]


  15. Back to the Holodeck: new life for virtual reality? [Citation Graph (, )][DBLP]


  16. Ticket Based Identity System for DRM. [Citation Graph (, )][DBLP]


  17. Requirement Analysis of Enterprise DRM Systems. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002