|
Search the dblp DataBase
Shane Balfe:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Shane Balfe, Eimear Gallery
Mobile Agents and the Deus Ex Machina. [Citation Graph (0, 0)][DBLP] AINA Workshops (2), 2007, pp:486-492 [Conf]
- Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson
Trusted Computing: Providing Security for Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP] Peer-to-Peer Computing, 2005, pp:117-124 [Conf]
- Shane Balfe, Shiqun Li, Jianying Zhou
Pervasive Trusted Computing. [Citation Graph (0, 0)][DBLP] SecPerU, 2006, pp:88-94 [Conf]
- Shiqun Li, Shane Balfe, Jianying Zhou, Kefei Chen
Enforcing Trust in Pervasive Computing with Trusted Computing Technology. [Citation Graph (0, 0)][DBLP] CRITIS, 2006, pp:195-209 [Conf]
- Shane Balfe, Anish Mohammed
Final Fantasy - Securing On-Line Gaming with Trusted Computing. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:123-134 [Conf]
Towards Secure E-Commerce Based on Virtualization and Attestation Techniques. [Citation Graph (, )][DBLP]
Securing Grid Workflows with Trusted Computing (Extended Abstract). [Citation Graph (, )][DBLP]
Trust management for secure information flows. [Citation Graph (, )][DBLP]
e-EMV: emulating EMV for internet payments with trusted computing technologies. [Citation Graph (, )][DBLP]
The fable of the bees: incentivizing robust revocation decision making in ad hoc networks. [Citation Graph (, )][DBLP]
Augmenting Internet-Based Card Not Present Transactions with Trusted Computing (Extended Abstract). [Citation Graph (, )][DBLP]
Securing Grid Workflows with Trusted Computing. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.003secs
|