The SCEAS System
Navigation Menu

Search the dblp DataBase


Larry Korba: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. George Yee, Larry Korba, Ronggong Song
    Ensuring Privacy for E-Health Services. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:321-328 [Conf]
  2. Nigel H. Lin, Larry Korba, George Yee, Timothy K. Shih, Hsiau Wen Lin
    Security and Privacy Technologies for Distance Education Applications. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:580-586 [Conf]
  3. George Yee, Larry Korba
    An Agent Architecture for e-Services Privacy Policy Compliance. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:374-379 [Conf]
  4. George Yee, Larry Korba, Ronggong Song, Ying-Chieh Chen
    Towards Designing Secure Online Games. [Citation Graph (0, 0)][DBLP]
    AINA (2), 2006, pp:44-48 [Conf]
  5. Ronggong Song, Larry Korba, George Yee
    Privacy Rights Management for Privacy Compliance Systems. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:620-625 [Conf]
  6. Ronggong Song, Larry Korba
    Scalability of Agent-Based Onion Routing Network. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2004, pp:65-69 [Conf]
  7. Larry Korba, Steve Kenny
    Towards Meeting the Privacy Challenge: Adapting DRM. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:118-136 [Conf]
  8. Larry Korba, Yuefei Xu, Ronggong Song, George Yee
    Environmentally-Aware Security Enforcement (EASE) for Cooperative Design and Engineering. [Citation Graph (0, 0)][DBLP]
    CDVE, 2005, pp:140-148 [Conf]
  9. Larry Korba, Ronggong Song, George Yee, Andrew Patrick
    Automated Social Network Analysis for Collaborative Work. [Citation Graph (0, 0)][DBLP]
    CDVE, 2006, pp:1-8 [Conf]
  10. George Yee, Larry Korba
    Future Interactions in Policy-Driven Privacy Management. [Citation Graph (0, 0)][DBLP]
    FIW, 2003, pp:231-238 [Conf]
  11. Larry Korba
    Privacy in Distributed Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:306- [Conf]
  12. Larry Korba
    Towards Secure Agent Distribution and Communication. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  13. Khalil El-Khatib, Larry Korba, Ronggong Song, George Yee
    Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2003, pp:359-366 [Conf]
  14. Larry Korba
    Variable Aperture Sonar for Mobile Robots. [Citation Graph (0, 0)][DBLP]
    ICRA, 1994, pp:3136-3141 [Conf]
  15. George Yee, Larry Korba
    Privacy Policy Compliance for Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:158-165 [Conf]
  16. George Yee, Larry Korba
    Negotiated Security Policies for E-Services and Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:605-612 [Conf]
  17. Ronggong Song, Larry Korba
    Anonymous Internet Communication Based on IPSec. [Citation Graph (0, 0)][DBLP]
    Communication Systems: The State of the Art (IFIP World Computer Congress), 2002, pp:199-214 [Conf]
  18. Ying-Chieh Chen, Jing-Jang Hwang, Ronggong Song, George Yee, Larry Korba
    Online Gaming Cheating and Security Issue. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:518-523 [Conf]
  19. Ronggong Song, Larry Korba
    How to Make E-cash with Non-Repudiation and Anonymity. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:167-172 [Conf]
  20. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 2004, pp:618-624 [Conf]
  21. Larry Korba, Fuhua Lin
    Towards Policy-Driven Agent Development and Management. [Citation Graph (0, 0)][DBLP]
    MATA, 2000, pp:115-128 [Conf]
  22. Larry Korba, Ronggong Song
    Scalability, Security Technologies and Mobile Applications. [Citation Graph (0, 0)][DBLP]
    MATA, 2004, pp:217-223 [Conf]
  23. Larry Korba, Ronggong Song, George Yee
    Anonymous Communications for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    MATA, 2002, pp:171-181 [Conf]
  24. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    A novel solution for achieving anonymity in wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    PE-WASUN, 2004, pp:30-38 [Conf]
  25. Ying-Chieh Chen, Patrick S. Chen, Ronggong Song, Larry Korba
    Online Gaming Crime and Security Issue - Cases and Countermeasures from Taiwan. [Citation Graph (0, 0)][DBLP]
    PST, 2004, pp:131-136 [Conf]
  26. George Yee, Larry Korba
    Specifying Personal Privacy Policies to Avoid Unexpected Outcomes. [Citation Graph (0, 0)][DBLP]
    PST, 2005, pp:- [Conf]
  27. George Yee, Larry Korba
    Bilateral E-services Negotiation Under Uncertainty. [Citation Graph (0, 0)][DBLP]
    SAINT, 2003, pp:352-355 [Conf]
  28. Ronggong Song, Larry Korba, George Yee
    AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2005, pp:33-42 [Conf]
  29. George Yee, Larry Korba, Ronggong Song
    Ensuring Privacy for Buyer-Seller E-Commerce. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:13-24 [Conf]
  30. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2005, v:28, n:10, pp:1193-1203 [Journal]
  31. Steve Kenny, Larry Korba
    Applying digital rights management systems to privacy rights management. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2002, v:21, n:7, pp:648-664 [Journal]
  32. Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba
    Performance evaluation of an anonymity providing protocol for wireless ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2006, v:63, n:11, pp:1094-1109 [Journal]
  33. Larry Korba, Ronggong Song, George Yee, Andrew S. Patrick, Scott Buffett, Yunli Wang, Liqiang Geng
    Private Data Management in Collaborative Environments. [Citation Graph (0, 0)][DBLP]
    CDVE, 2007, pp:88-96 [Conf]
  34. Liqiang Geng, Howard J. Hamilton, Larry Korba
    Expectation Propagation in GenSpace Graphs for Summarization. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2007, pp:449-458 [Conf]
  35. Ronggong Song, Larry Korba, George Yee, Ying-Chieh Chen
    Protection of Virtual Property in Online Gaming. [Citation Graph (0, 0)][DBLP]
    DMS, 2005, pp:119-124 [Conf]
  36. Ronggong Song, Larry Korba, George Yee
    Agent-based Transactions for Home Energy Services. [Citation Graph (0, 0)][DBLP]
    DMS, 2005, pp:367-372 [Conf]

  37. Using Data Mining Methods to Predict Personally Identifiable Information in Emails. [Citation Graph (, )][DBLP]

  38. Finding Topics in Email Using Formal Concept Analysis and Fuzzy Membership Functions. [Citation Graph (, )][DBLP]

  39. Private Data Discovery for Privacy Compliance in Collaborative Environments. [Citation Graph (, )][DBLP]

  40. Cooperative Visualization of Privacy Risks. [Citation Graph (, )][DBLP]

  41. Towards Distributed Privacy for CSCW. [Citation Graph (, )][DBLP]

  42. Analysis of Smart Card-Based Remote User Authentication Schemes. [Citation Graph (, )][DBLP]

  43. Adapting LDA Model to Discover Author-Topic Relations for Email Analysis. [Citation Graph (, )][DBLP]

  44. An Efficient Privacy-Preserving Data Mining Platform. [Citation Graph (, )][DBLP]

  45. Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining. [Citation Graph (, )][DBLP]

  46. Exploiting Multiple Features with MEMMs for Focused Web Crawling. [Citation Graph (, )][DBLP]

  47. Assessing the Likelihood of Privacy Policy Compliance. [Citation Graph (, )][DBLP]

  48. Privacy management system using social networking. [Citation Graph (, )][DBLP]

Search in 0.057secs, Finished in 0.059secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002