Faculty of Engineering, Built Environment and Information Technology
School of Information Technology
Department of Computer Science
Venter, HS
BSc IT (RAU) BSc (Hons CS)(RAU) MSc (RAU) PhD (RAU) - Senior Lecturer
Contact Details
Research Interests
Research Output
Contact Details:
Telephone number: 012 420 3654
Fax number: 012 362 5188
E-mail address: hventer@cs.up.ac.za
Research Interests:
Computer and Information Security with specific reference to Distributed Systems Security and Privacy
Research Output:
Papers in refereed, published conference proceedings:
Laubscher R, Rabe D, Olivier MS, Eloff JHP, Venter HS: 2005. Applying Forensic Principles to Computer-Based Assessment. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 105-112.
Fei K, Eloff JHP, Venter HS, Olivier MS: 2005. Exploring Forensic Data with Self-Organizing Maps. In Advances in digital forensics: IFIP International Conference on Digital Forensics, Springer, pp 113-123.
Morkel T, Olivier MS, Eloff JHP, Venter HS: 2005. One-Time Passwords in a Mobile Environment using Steganography. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 13-19.
Croft NJ, Olivier MS, Venter HS: 2005. Codec-Hopping: Secure and Private Voice Communication in Bandwidth Constrained Networks. In Proceedings of the 1st International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, Diavlos Publications, pp 85-91.
Tillwick H, Neumann T, Olivier MS, Venter HS, Eloff JHP: 2005. Polar: Proxies collaborating to achieve anonymous web browsing. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 317-324.
Venter HS, Olivier MS, Eloff JHP, Botes ME: 2005. Balancing patient privacy and treatment facility accountability using a centralised pseudonymous HIV/AIDS database. In Proceedings of the Fifth International Network Conference (INC 2005), University of the Aegean and University of Plymouth, pp 377-384.
Laubscher R, Olivier MS, Venter HS, Eloff JHP, Rabe DJ: 2005. The Role of Key Loggers in Computer-based Assessment Forensics. In Research for a Changing World - Proceedings of SAICSIT 2005, South African Institute for Computer Scientists and Information Technologists, pp 123-130.
Wojcik M, Venter HS, Eloff JHP, Olivier MS: 2005. Incorporating Prejudice into Trust Models to Reduce Network Overload. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 195-200.
Rossudowski AM, Venter HS: 2005. The use of smart cards to perform ATM transactions in an off-line environment. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 427-432.
Tshivhase FE, Venter HS, Eloff JHP: 2005. Implementing Application and Network Security using Aspect-oriented Programming. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 471-475.
Oyomno W, Venter HS: 2005. Link Layer Type-Tagging in Fixed-Phrase Speaker Verification Systems. In Southern African Telecommunication Networks and Applications Conference SATNAC (2005) Proceedings, SATNAC, pp 493-499.
|