Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Open and Trusted Information Systems/Health Informatics Access Control (OTHIS/HIAC)., , , , and . AISC, volume 98 of CRPIT, page 99-108. Australian Computer Society, (2009)Performance and Scalability Assessment for Non-Certificate-Based Public Key Management in VANETs., , , and . Int. J. Inf. Secur. Priv., 6 (1): 33-56 (2012)An Architecture to Facilitate Security Assurance and Legal Compliance for Call Auditing in the Wholesale Electricity Market., , , and . IEEE Access, (2021)Security and Performance in IoT: A Balancing Act., , , , and . IEEE Access, (2020)A Viable LoRa Framework for Smart Cities., , , , , , and . PACIS, page 59. (2018)Visually Sealed and Digitally Signed Documents., , , and . ACSC, volume 26 of CRPIT, page 287-294. Australian Computer Society, (2004)Utilizing SELinux to Mandate Ultra-secure Access Control of Medical Records., , , and . MedInfo, volume 129 of Studies in Health Technology and Informatics, page 498-502. IOS Press, (2007)A Design for a Secure Energy Market Trading System in a National Wholesale Electricity Market., , , , and . IEEE Access, (2020)An Experimental Field Comparison of Wi-Fi HaLow and LoRa for the Smart Grid., , , and . Sensors, 23 (17): 7409 (September 2023)An Architecture for Trustworthy Open Data Services., , , and . IFIPTM, volume 454 of IFIP Advances in Information and Communication Technology, page 149-162. Springer, (2015)