Output 2006
Research articles in refereed specialist journals
Lecture Notes in Computer Science
Article Title
Brandi W, Olivier MS: 2006. Extending P3P to facilitate proxies which pose as a potential threat to privacy. 4083 / Sep, pp 81-90.
Van Staden W, Olivier MS: 2006. Extending SQL to allow the active usage of purposes. 4083 / Sep, pp 123-131.
Neumann T, Tillwick H, Olivier MS: 2006. Information leakage in ubiquitous voice-over-IP communications. In Third International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2006), 4083 / Sep, Springer, pp 233-242.
Schoeman IL, Engelbrecht AP: 2006. Niching for dynamic environments using particle swarm optimization. 4247, pp 134-141.
Anguelov R, Markov S, Sendov B: 2006. On the normed linear space of Hausdorff continuous functions. 3743, pp 281-288.
Wojcik M, Eloff JHP, Venter HS: 2006. Trust model architecture: Defining prejudice by learning. 4083 / Sep, pp 182-191.
Morkel T, Eloff JHP, Olivier MS: 2006. Using image steganography for decryptor distribution. 4277 / Nov, pp 322-330.
Omran MGH, Engelbrecht AP, Salman A: 2006. Using the ring neighborhood topology with self-adaptive differential evolution. 4221, pp 976-979.
|