The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Mark Looi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi
    A user-centric anonymous authorisation framework in e-commerce environment. [Citation Graph (0, 0)][DBLP]
    ICEC, 2004, pp:138-147 [Conf]
  2. Richard Au, Mark Looi, Paul Ashley
    Towards a New Authorisation Paradigm for Extranets. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:18-29 [Conf]
  3. Agung Prasetijo, Paul Ashley, Mark Looi, Andrew Clark, Gary Gaskell
    A Three-Party HTTP Proxy to Support Internet Content Regulation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:89-96 [Conf]
  4. Mark Looi, Paul Ashley, Loo Tang Seet, Richard Au, Gary Gaskell, Mark Vandenwauver
    Enhancing SESAMEV4 with Smart Cards. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:193-202 [Conf]
  5. Jason Reid, Mark Looi
    Making Sense of Smart Card Security Certifications. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:225-240 [Conf]
  6. Chris Wullems, Harikrishna Vasanta, Mark Looi, Andrew Clark
    A Broadcast Authentication and Integrity Augmentation for Trusted Differential GPS in Marine Navigation. [Citation Graph (0, 0)][DBLP]
    Cryptographic Algorithms and their Uses, 2004, pp:125-139 [Conf]
  7. Richard Au, Mark Looi, Paul Ashley
    Cross-domain one-shot authorization using smart cards. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:220-227 [Conf]
  8. Gary Gaskell, Mark Looi
    Integrating Smart Cards Into Authentication Systems. [Citation Graph (0, 0)][DBLP]
    Cryptography: Policy and Algorithms, 1995, pp:270-281 [Conf]
  9. Richard Au, Ming Yao, Mark Looi, Paul Ashley
    Secure Client Agent Environment (SCAE) for World Wide Web. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2002, pp:234-243 [Conf]
  10. Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi
    A Secure Anonymous Authorisation Architecture for E-Commerce. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:106-111 [Conf]
  11. Kevin Tham, Mark Looi, Ernest Foo
    Ubiquitous Authorization Scheme Based on Device Profile. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2006, pp:312-321 [Conf]
  12. Richard Au, Ming Yao, Mark Looi
    Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. [Citation Graph (0, 0)][DBLP]
    IAT, 2003, pp:519-522 [Conf]
  13. Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet
    Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:369-381 [Conf]
  14. Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell
    A security architecture for third generation wireless systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:15-32 [Conf]
  15. Richard Au, Ming Yao, Mark Looi
    Agent-Based Privilege Negotiation for E-commerce on World Wide Web. [Citation Graph (0, 0)][DBLP]
    ICWE, 2003, pp:68-71 [Conf]
  16. Chris Wullems, Mark Looi, Andrew Clark
    Enhancing the Security of Internet Applications using location: A New Model for Tamper-resistant GSM Location. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1251-1258 [Conf]
  17. Harikrishna Vasanta, Yiu Shing Terry Tin, Colin Boyd, Mark Looi, Juan Manuel González Nieto
    A Secure Framework for User Privacy in Heterogeneous Location Networks. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:264-274 [Conf]
  18. Chris Wullems, Mark Looi, Andrew Clark
    Towards Context-aware Security: An Authorization Architecture for Intranet Environments. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:132-137 [Conf]
  19. Jason Smith, Selwyn Russell, Mark Looi
    Security as a Safety Issue in Rail Communications. [Citation Graph (0, 0)][DBLP]
    SCS, 2003, pp:79-88 [Conf]
  20. Mark Looi, William J. Caelli
    A note on supplying a trusted clock via a secure device. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:7, pp:611-613 [Journal]
  21. Ed Dawson, Andrew Clark, Mark Looi
    Key management in a non-trusted distributed environment. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2000, v:16, n:4, pp:319-329 [Journal]

  22. Towards Intrusion Detection for Encrypted Networks. [Citation Graph (, )][DBLP]


  23. A Multicast Routing Scheme for Efficient Safety Message Dissemination in VANET. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002